News

What's happening in the security industry.

Bad Apple, former executive who made millions by misappropriation of Apple’s secrets is jailed.

December 11, 2014

A former Apple executive who made millions by selling information about the firm to its suppliers has been sentenced to a year in jail. Paul Shin Devine must also repay almost $4.5m (£2.8m) of the money he made. Manufacturers paid Devine to find out about Apple products and practices to help them negotiate better deals. Devine […]

Read More

North Korea pouring resources into Cyber Warriors, creating its most Elite and Dangerous Military Unit.

December 8, 2014

SEOUL (Reuters) – Despite its poverty and isolation, North Korea has poured resources into a sophisticated cyber-warfare cell called Bureau 121, defectors from the secretive state said as Pyongyang came under the microscope for a crippling hack into computers at Sony Pictures Entertainment. A North Korean diplomat has denied Pyongyang was behind the attack that […]

Read More

Increased number of Ousted ‘Spies’ Indicates New Rules of Global Espionage

The media frenzy surrounding the recent deportations of several suspected Russian spies — reminiscent of the theatricality surrounding Cold War-era spy swaps — says as much about Russia’s and the West’s newfound interest in publicizing espionage as it does about a marked increase in intelligence gathering activities, pundits told The Moscow Times. Russia’s Foreign Ministry said in a statement Monday that it had expelled a number of Polish diplomats […]

Read More

The Cyber Threat

December 7, 2014

The cyber Threat Hardly a week goes by without news of another big company being hacked. The list of victimized corporations keeps growing as retailers, such as Home Depot and Target, admit their point-of-sale devices exposed customers’ sensitive information. Recently, JP Morgan also confessed its customers’ private contact information had been compromised. With the media […]

Read More

The biggest cyber-security risk may be internally from Employees.

December 5, 2014

There are a number of ways cybercriminals can infiltrate an enterprise, but new research suggests that the biggest weakness to most companies may be the employees themselves. Malicious actors are increasingly utilizing a technique known as social engineering. While there are multiple forms of social engineering attacks, the most common come in the form of […]

Read More

Major cyber attack in next 10 years say Security experts

December 4, 2014

It’s been a whole decade since the Pew Research Center first partnered with Elon University’s Imagining the Internet Center to survey experts about the future of cyber threats, and plenty has changed in that time. While many in the cyber security community considered 2013 to be the worst year so far for data breaches, 2014 is […]

Read More

The Sony Hack FBI Probing,as Data leaks Emerage

WASHINGTON – The FBI said Tuesday it was investigating a cyberattack on Sony Pictures, amid reports that employee information as well as new films were being leaked online. “The FBI is working with our interagency partners to investigate the recently reported cyber intrusion at Sony Pictures Entertainment,” a spokesman for the US federal law enforcement agency […]

Read More

Sony cyber attack linked to North Korea

December 2, 2014

Following a breach in Sony’s cybersecurity that saw personal information of Hollywood A-listers as well as major films leaked onto the web last week, US officials are stepping in. In what may be a first ever destructive cyber attack on a company on US soil, Sony employees were greeted with a picture of skull on their computer […]

Read More

GCHQ tapped into Irish internet cables

November 30, 2014

Snowden documents reveal how British intelligence target Irish internet traffic Britain’s Government Communications Headquarters in Cheltenham New documents released this week via the National Security Agencywhistleblower Edward Snowden outline how Irish subsea telecommunications cables have been targeted by British intelligence. The documents detail a whole series of underwater cables – essentially the backbone that connects Ireland to the globe – […]

Read More

Cellular Spies in the sky

November 27, 2014

Dirtboxes – Cellular Spies in the Sky Last week the Wall Street Journal broke a story on cellular spying that has troublesome implications for wireless security experts and privacy advocates. According to anonymous sources cited by the paper, the United States government is mounting devices known as dirtboxes on small planes and using them to sweep up […]

Read More

Chinese great firewall,hack-proof computer network is being built

November 9, 2014

China said to be building the world’s first hack-proof computer network  £60million fibre-optic cable is being developed between Beijing and Shanghai Network will secure government, financial and military information from hacker China is building the world’s first hack-proof computer network in a bid to give it the edge in its cyberwar against the West, it […]

Read More

Estonian man faces cyber scam charges in US

November 7, 2014

 An Estonian man accused of being part of a ring that swindled advertisers out of millions of dollars by “hijacking” online traffic was hauled before a US judge. Vladimir Tsastsin, 34, was extradited to a federal court in New York to face charges including computer intrusion, wire fraud and money laundering, according to US prosecutors. […]

Read More

More drones spotted over French nuclear power stations

November 2, 2014

French authorities detect drones over two nuclear power plants, the latest in a baffling series of incidents across the country A nuclear reactor at Penly, northern France, where a drone was spotted flying overheard, operated by unknown persons. Photograph: PASCAL ROSSIGNOL/REUTERS French authorities said on Friday they had detected drones over two nuclear power plants, […]

Read More

Counter-espionage laws passed in china

 China passed a counter-espionage law on Saturday aimed at tightening state security and helping build a “comprehensive” national security system, state media reported. The law will allow authorities to seal or seize any property linked to activities deemed harmful to the country, the Xinhua news agency said. Authorities can also ask organizations or individuals to […]

Read More

Did Russia Just Hack the White House?

October 31, 2014

A successful breach of unclassified computer networks led to disruptions at the executive mansion in recent weeks. Intruders are trying to crash the White House inside and out. While the Secret Service tries to clamp down on people jumping the fence along Pennsylvania Avenue, federal authorities have been battling gatecrashers of the cyber variety. Hackers […]

Read More

Microsoft Office! Software contains dangerous bug

October 27, 2014

  Beware! Microsoft announced the flaw in a recent security advisory note It affects every supported version of Windows, except Windows Server 2003 If a user opens an infected Office file, a hacker can gain access to their PC Hackers have already started exploiting the flaw with PowerPoint files A temporary fix has been issued […]

Read More

Hacking air gapped networks by using lasers and drones

A group of Israeli researchers has demonstrated at the last Black Hat Conference how to hack air gapped networks by using lasers and drones. A lot of people believe that it is possible to secure a computer keeping it off, security specialists define a network separated by the Internet, or by any other unsecure networks, as “Air gapped […]

Read More

Surprise! Flashlight apps might be spying on you

  Mobile apps have too much access to our data Flashlight apps might seem like the most innocuous type of smartphone apps, but many of them have (perhaps surprising) spying capabilities. SnoopWall tested ten of the top Android flashlight apps and found their permissions settings allow them to do things like take pictures and videos, modify […]

Read More

Israel’s Iron Dome defense was compromised by Chinese Hackers who Stole the Plans

September 4, 2014

China-based hackers stole plans for Israel’s Iron Dome missile defense system in 2011 and 2012, according to an investigation by a Maryland-based cyber security firm first reported by independent journalist Brian Krebs. The hackers also stole plans related to other missile interceptors, including the Arrow 3, which was designed by Boeing and other U.S.-based companies. According […]

Read More

GCHQ organises game to spot new recruits

With cyber crime on the rise, spy agency GCHQ is organising an online game to spot potential new recruits with the right cyber security skills – pitching candidates in a battle against a fictitious foe called The Flag Day Associates  Spy agency GCHQ has launched a “virtual game” to find and recruit talented hackers, calling […]

Read More

FBI Informant Led Cyber Attacks On Turkish Government

Hector Xavier Monsegur agreed to take down key hacking figures in return for avoiding a 20-year prison sentence for cyber crimes. A hacker turned FBI informant led cyber attacks on Turkey’s government while under US supervision, a new report claims. Hector Xavier Monsegur – known online as Sabu – agreed to take down key figures […]

Read More

JPMorgan hack said to start months ago exploiting multiple flaws

September 2, 2014

Hackers burrowed into the databanks of JPMorgan Chase & Co. and deftly dodged one of the world’s largest arrays of sophisticated detection systems for months. The attack, an outline of which was provided by two people familiar with the firm’s investigation, started in June at the digital equivalent of JPMorgan’s front door, an overlooked flaw […]

Read More

Coded Backdoor Found in China-made Netis, Netcore Router

      Routers manufactured and sold by Chinese security vendor have a hard-coded password that leaves users with a wide-open backdoor that could easily be exploited by attackers to monitor the Internet traffic. The routers are sold under the brand name Netcore in China, and Netis in other parts of the world, including South Korea, Taiwan, Israel […]

Read More

Stealing encryption keys just by touching your laptop

As far sci-fi movies have been entertaining the public, but their ideas have always been a matter of adoption in real life. Just like in any other sci-fi movie, simply touching a laptop can be enough to extract the cryptographic keys used to secure data stored on it. A team of computer security experts at Tel Aviv University […]

Read More

Listening device discovered @ Ford Head Quarters

July 25, 2014

Recently fired engineer investigated……….. Detroit— The FBI searched Ford Motor Co.’s world headquarters while investigating one of the automaker’s engineers and seized listening devices, computers and financial records, according to search warrants obtained by The News on Thursday. A lawyer for the mechanical engineer said Ford’s security team feared she was stealing trade secrets by […]

Read More