Please turn on your JavaScript for this page to function normally.
Chinese army announces drill to test its digitalized forces

The Chinese People’s Liberation Army (PLA) has announced it will be holding a military exercise in June, aimed at testing “new types of combat forces including …

U.S. weapons systems designs reportedly stolen by hackers

Hackers – more than likely Chinese – have stolen designs for two dozen U.S. weapons systems during a series of raids, a previously undisclosed section of a report …

APT1 is back, attacks many of the initial U.S. corporate targets

The APT1 hacker group is back to its old tricks, targeting a big number of organizations and businesses and, among them, many of those that they have previously breached, …

U.S. DOJ accuses journalist of espionage

Last week’s revelation that the U.S. DOJ has successfully subpoenaed two months’ worth of telephone toll records for phones of AP journalist has created quite an …

Aurora attackers were looking for Google’s surveillance database

When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some …

Large cyber espionage emanating from India

Norman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a …

Pentagon report accuses China military of cyber espionage

The Pentagon has come out and said it: “China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, …

APT1 cyber espionage group is back to their old tricks

Despite Mandiant’s prediction that the release of their report on the attack methodology of the so-called APT1 (or “Comment Crew”) cyber espionage group …

U.S. judge says FBI can’t hack crime suspect’s computer

A judge of the U.S. District Court for the Southern District of Texas has denied FBI’s petition to install spying software on and using the built-in camera of an …

Data thieves and their motives

Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, according to a new Verizon report. Taking the top spot for all …

Ideas for deterring cyber espionage attacks

There has been much talk about whether the cyber espionage attacks should be considered acts of war, and about what can be done to prevent them. Retaliation being hard to …

Chinese university tied to “APT1” army cyber unit

By now everybody in the security industry has read the Mandiant APT1 report or at least a TEXTsummary of it, and has heard the many voices of either agreement or dissent …

Don't miss

Cybersecurity news