“As U.S. President Donald Trump re-imposed harsh economic sanctions on Iran last month, hackers scrambled to break into personal emails of American officials tasked with enforcing them, The Associated Press has found — another sign of how deeply cyberespionage is embedded into the fabric of US-I...
Posts Tagged: Espionage
“Australia’s leading foreign affairs think tank has been the subject of at least two cyber attacks from China, in an apparent effort to view its dealings with the federal government and foreign dignitaries. The attacks on the Lowy Institute mirrored a Chinese campaign against think tanks in the ...
“The intelligence community wants to make the spaces government officials use to review and discuss sensitive information impervious to digital spying. The Intelligence Advanced Research Projects Activity plans to fund research to further lock down sensitive compartmented information facilities, o...
“Tiny surveillance microchips, produced by Chinese company SuperMicro, were placed inside hardware within data centers used by Apple, Amazon and other large U.S. tech companies, Bloomberg reported on Thursday. The chips were allegedly used to gather information like trade secrets and intellec...
From 2010 to 2012, China was able to dismantle significant portions of the CIA’s network of agents across the country, executing dozens of suspected spies. It now appears that problems in and hacks of the CIA’s communications systems led to China’s penetration of the network. The system itself...
Security researchers at Symantec identified a major breach of satellite operators, defense contractors, and telecoms in the U.S. and southeast Asia by Chinese hackers. Symantec reported that the hack was likely driven by national espionage efforts working to intercept military and civilian communica...
By Bob Gourley If you are an enterprise technologist you are probably pretty busy, right? And you are almost certainly numbed by the constant stories of cyber espionage, especially reports of data theft coming out of China. If you have been numbed with all the reporting please shake it off and dive ...
One of the most important books for understanding modern cyber threat’s is one of the first books on the dynamics of this new domain. It is Clifford Stoll’s The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. This book documents the steps taken by Stoll to t...