Categories

A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

Seoul Claims North Developed Huge Cyber Army

South Korean defense minister Kim Kwan-jin reckons Pyongyang has 3,000 highly trained hackers tasked with stealing military secrets and disrupting systems.

N.Korean Rally Goers Raise Fists in Condemnation

In a warning clearly designed to set the alarm bells ringing in Seoul, Kim said that Seoul’s near neighbour to the north poses a clear threat

More…

Proposed U.S. Law Would Punish Hackers Backed by Government

A day before Chinese President Xi Jinping visits the United States, three U.S. lawmakers plan to propose a new law that would punish hackers backed by China, Russia or other foreign governments for cyber spying and theft.

 

Mike Rogers

The new bill that would go after specific hackers from “offending nations” with “real

More…

F-35B and Other U.S. Weapons Systems Hacked by China

Many of the Pentagon’s most advanced weapon systems — including the F-35 Joint Strike Fighter and PAC-3 Patriot missile system — were compromised by Chinese hackers, according to a classified document obtained by the Washington Post.

F-35b Hovering

The list of weapons was part of an earlier DoD report condemning

More…

Reporters Branded as Hackers for Finding Google Breach

Call it security through absurdity: a pair of telecom firms have branded reporters for Scripps News as “hackers” after they discovered the personal data of over 170,000 customers—including social security numbers and other identifying data that could be used for identity theft—sitting on a publicly accessible server.

While the reporters claim to

More…

Israeli Hackers Seize Control of Anonymous Operated Website

For the second time in one week, Israeli hackers seize control of website for those seeking to hack Israeli sites, posts pro-Israel facts, video.

Hacker collective Anonymous Photo: Screen capture

Israeli hackers took over OpIsrael.com on Tuesday, a website meant to coordinate the cyber-attacks on Israeli sites.

A hacker calling himself EhIrS

More…

NATO Report: Killing Hackers OK

hacking book cover

A landmark document created at the request of NATO has proposed a set of rules for how international cyberwarfare should be conducted. Written by 20 experts in conjunction with the International Committee of the Red Cross and the US Cyber Command, theTallinn Manual on the International Law Applicable to Cyber Warfare analyzes the

More…

The Oil Exploration Hackers

world oil prices

Oil Explorers Beware: Hackers Are Eyeing What You Know

The World Runs on Oil

While most would think that the risks junior oil and gas companies are taking in exploring new frontiers as far away as the remote reaches of Africa are related to government instability and conflict, another risk they face is right

More…

Anonymous Assists in Tracking Source of Chinese Hacking

An American computer security company released an explosive report Tuesday linking a Chinese military unit to a growing number of cyber attacks against American companies, organizations and government agencies.

But some of those connections — including profiles of the individual hackers in China — could not have been made without the work of

More…

Chinese Hackers Attacking U.S. Overall, Not Just Media

china-hacker

Last month the New York Times announced that Chinese hackers had stolen every employee’s corporate password, and not to be outdone, the Wall Street Journal and Bloomberg News then revealed that they’d been targeted as well (though hackers failed to infiltrate Bloomberg News). Now the Washington Post More…

Grey Area Developing Between Government Cyber Spies and Criminal Hackers

cyber-security

The world of criminal computer hacking has traditionally been far removed from the cyber-spying efforts of governments, but security experts say several recent cases suggest the lines are starting to blur.

Enterprising hackers are now using tools built for raiding online bank accounts to target corporate and government secrets, either on a for-hire basis

More…

Washington Post Targeted by Chinese Hackers

hacking book cover

A sophisticated cyberattack targeted The Washington Post in an operation that resembled intrusions against other major American news organizations and that company officials suspect was the work of Chinese hackers, people familiar with the incident said.

Post company officials confirmed the broad outlines of the infiltration, which was discovered in 2011 and

More…

N.Y. Times Under Attack for Last 4 Months

chinese-hackers

For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

The New York Times published an article in October about the wealth of the family of China’s prime minister, Wen Jiabao, in both English and Chinese.

After

More…

Anonymous Promises Weekly Attacks to Continue

“You should have expected us.”

anonymous hacktivist

It’s the calling card that Anonymous has signed-off their online assaults with since the start of their Internet crusades. As the hacktivists continue to come down hard on the websites of corrupt corporations and governments, they’re offering the warning once more.

Anonymous is cautioning future

More…

Hackers Targeting U.S. Infrastructure

Power Plant Control Room

Just hours before reports emerged that hackers were for the first time attempting to take over specific infrastructure plants, a former CIA director told ABC News that weaknesses in critical infrastructure systems in the U.S. were among the country’s greatest threats to national security.

“One of [the

More…

sharethis_button(); }?>