In an age where cybersecurity is of foremost interest for governments and businesses, public and private organizations must deploy risk-intelligence governance to secure their digital communications and resources from eavesdropping, theft or attack, according to a new paper from Rice University’s Baker Institute for Public Policy.
America’s Department of Defense has released its annual report on China’s military capabilities. The report includes “electronic warfare” and “information dominance” as part of a larger campaign it says is an “essential element, if not a fundamental prerequisite” of China’s defense planning.
North Korea is barely connected to the global internet. But it’s trying to step up its hacker game by breaking into hostile networks, according to a new Pentagon report. North Korea appears to be feeling its way around in the dark of the internet and seeing what it can get away with.
The woman was talking on her iPhone, and never saw coming her induction into a large and growing subset of crime victims. But there it happened shortly after noon on April 15, on a busy corner of Main Street in Flushing, Queens. A teenager zipped past, snatching the phone out of her hand and kept running.
Most people don't know what happens in the small office space in the Loveland Police Department in Colorado that has a sign in the window to designate it the "Cyber Crimes Unit." Most people don't want to know — an office door that even others within the department prefer to see closed.
He’s 26, likes industrial and electronic music, has a bleached-blond Mohawk haircut and sometimes, Mikhail Davidov said, he starts his day “at the crack of noon.” The late hours are in front of a computer, working on reverse engineering, tearing apart computer programs to find their vulnerabilities. Sometimes he works 18 hours straight.
Is someone from your organization stealing trade secrets and selling them to your competitors? Does your organization struggle with detecting and stopping Internet attacks? Researchers in the UTSA College of Business have received two grants totaling $1 million to help companies better detect insider threats and enhance computer security.
Inside the tightly controlled security area of Symantec's Dublin headquarters, a screen on the wall flashes up hacking hotspots as they are detected around the world. Last year the company estimated it blocked nearly 250,000 cyber attacks. One out of every 532 websites was infected with viruses, it said, and 1.6 million instances of malware were detected.
Hamza Bendelladj, an Algerian national also known as Bx1, will be arraigned on federal cyber crime charges for his role in developing, marketing, distributing, and operating the malicious computer virus SpyEye. Bendelladj, 24, was indicted by a federal grand jury in Atlanta, Ga., on December 20, 2011.
The Dutch government has presented a draft bill that aims to give law enforcement the power to hack into computer systems — including those located in foreign countires — to do research, gather and copy evidence or block access to certain data.
Whether the insider threat or the external threat is more serious has been the subject of perennial discussion ever since the concept of threats to information systems emerged. And there is no end in sight. The insider threat is a particularly intractable problem because there are so many ways insiders can steal information from an enterprise network.
QinetiQ, a UK-based defense contractor, has its fingers all over some of the US Defense Department's most sensitive systems. The company's subsidiaries provide robots, diagnostic systems, intelligence systems for satellites, drones and even "cyber-security" to the US Department of Defense. But for at least three years, QinetiQ was apparently unintentionally supplying its expertise to another customer: China.
When a suspect is apprehended, their computers, phones and other devices become important sources of evidence. But mining all that data – a typical case can involve several terabytes of information — takes time, and usually requires specially trained officers. Backlogs can delay investigations for weeks.
U.S. intelligence agencies traced a recent cyber intrusion into a sensitive infrastructure database to the Chinese government or military cyber warriors, according to U.S. officials. The compromise of the U.S. Army Corps of Engineers’ National Inventory of Dams (NID) is raising new concerns that China is preparing to conduct a future cyber attack against the national electrical power grid.
Tracing malware and breaches to their attackers is not straightforward — anyone can hide behind layers of IP addresses — but China has been confirmed as a major player in cyberespionage in multiple reports this month, as both Verizon and FireEye independently have released data that points the finger at the country for the bulk of cyberspying activity.