Tag: corporate

Hackers Are Playing The Game For Big Money Jackpots

Hackers Are Playing The Game For Big Money Jackpots

| June 9, 2012 | 2 Replies

Tomer Teller CNBC   Back in 2010, the FBI joined law enforcement agencies across the globe in shutting down a criminal operation that stole some $70 million from U.S. banks. The gang’s weapon of choice was not a machine gun or a set of safe-cracking tools. Instead, the gang relied on the infamous ZeuS Trojan […]

Read More

Hackers Have Backdoor Access US Weapons Systems Via Microchip

Hackers Have Backdoor Access US Weapons Systems Via Microchip

| June 9, 2012 | 1 Reply

Mark Clayton Christian Science Monitor   A secret nanoscale “backdoor” etched into the silicon of a supposedly secure programmable chip could give cyberattackers access to classified US weapons systems, including guidance, flight control, networking, and communications systems, according to a new report by cybersecurity researchers in Britain. The Cambridge University study is apparently the first public documentation […]

Read More

FEMA Sponsored Cyber Attack Simulation on Critical U.S. Infrastructure

FEMA Sponsored Cyber Attack Simulation on Critical U.S. Infrastructure

| June 6, 2012 | 4 Replies

Chris Dougherty Virtual Threat Contributing Writer   President Barack Obama and several senior U.S. officials participated in a FEMA sponsored cyber attack simulation on Tuesday.   The simulation focused on how the U.S.  government would react to cyber warfare  targeting the country’s critical infrastructure.  The exercise was designed in part to help pinpoint weaknesses in official policies and procedures following […]

Read More

Google Adds Cyberattack Warning For Victims of State-Sponsored Attacks

Google Adds Cyberattack Warning For Victims of State-Sponsored Attacks

| June 6, 2012 | 3 Replies

  News.com.au   GOOGLE has added a feature to warn users whose accounts it believes are targets of “state-sponsored attacks”. Google, however, closed its search engine in China in 2010 after saying it no longer wanted to cooperate with Beijing’s internet censorship following hacking attacks traced to China. A message that says “Warning: We believe […]

Read More

NSA Utah Data Center Largest Spy Compound Ever – Part 2

NSA Utah Data Center Largest Spy Compound Ever – Part 2

| June 2, 2012 | 8 Replies

James Bamford Wired.com (Threat Level)   Continued from: NSA Utah Data Center Largest Spy Compound Ever – Part 1 For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail. William Binney was a senior NSA crypto-mathematician largely responsible for automating the agency’s worldwide eavesdropping […]

Read More

NSA Utah Data Center Largest Spy Compound Ever – Part 1

NSA Utah Data Center Largest Spy Compound Ever – Part 1

| June 1, 2012 | 14 Replies

James Bamford Wired.com (Threat Level)     The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s the heart of Mormon country, […]

Read More

NYTimes.com Site Vulnerability Allows Attacker to Post Fake Story

NYTimes.com Site Vulnerability Allows Attacker to Post Fake Story

| May 25, 2012 | 3 Replies

Chris Dougherty Virtual Threat Contributing Writer   In this day and age we all depend heavily on the Internet and social networking to stay informed about important happenings around the world and in our own communities. What many people may not realize is the fact that there is a cyber war occurring beneath the covers […]

Read More

Android Smartphone Hackers Building Malware in Russia

Android Smartphone Hackers Building Malware in Russia

| May 18, 2012 | 6 Replies

Antone Gonsalves CSO   The malware business growing around Google Android — now the leading smartphone operating system — is still in its infancy. Today, many of the apps built to steal money from Android users originate from Russia and China, so criminal gangs there have become cyber-trailblazers. Sophos and Symantec on Wednesday released their […]

Read More

Cyber Spies Are Exploiting Your Mac and Windows Computers

Cyber Spies Are Exploiting Your Mac and Windows Computers

| May 18, 2012 | 3 Replies

Antone Gonsalves CSO   Cyber spies have planted Java- and Flash-exploiting malware on Web sites focused on human rights, defense and foreign policy. Over the last two weeks, the Shadowserver Foundation, a nonprofit group that tracks Internet threats, has discovered several such compromised Web sites that download the malware through visitors’ browsers. The malware, which […]

Read More

10 Hacking Incidents That Made History

10 Hacking Incidents That Made History

| May 18, 2012 | 1 Reply

Joan Goodchild PC Advisor – UK   Hacking has been around for decades. Today’s crimes are often financially-motivated fraud. Here are ten hacking incidents that made history In our first Rogues Gallery, we looked at ten infamous social engineers — con men who exploited human weaknesses rather than technical vulnerabilities. But there have been computer and network hacks […]

Read More