Similar Articles |
|
National Defense December 2011 Stew Magnuson |
Defense Department Partners With Industry To Stem Staggering Cybertheft Losses The amount of intellectual property hackers are stealing from U.S. companies and sending to China is said to be staggering. The private sector's crown jewels are being moved off nominally secure networks and transmitted to the Asian nation every day: usually from 9 to 5 -- Beijing time. |
National Defense July 2012 Stew Magnuson |
U.S. Government Attempts to Thwart Chinese Network Intrusions If the might of the Chinese government -- as many believe -- is behind this massive operation, what can the might of the U.S. government do to help companies facing the onslaught? |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
CIO August 27, 2010 Kim S. Nash |
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
National Defense December 2015 Lloyd McCoy Jr. |
Defense Department Plays Key Role in Industrial Base Oversight The Defense Department and other federal agencies have been directed to identify and protect critical infrastructure sectors specific to their mission. |
National Defense June 2011 Stew Magnuson |
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. |
The Motley Fool December 5, 2010 Dean Takahashi. |
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
Searcher October 2007 Paul S. Piper |
Phish Pharming: A Newer, More Profitable Aquaculture Detecting e-mail scams. |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
InternetNews January 27, 2010 |
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. |
National Defense June 2013 Stew Magnuson |
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
National Defense November 2012 Erwin et al. |
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. |
National Defense October 2007 Breanne Wagner |
Computer Crimes Keep Government and Industry on the Defensive The complexity of new malicious code and the elusive nature of cyber attackers have become significant impediments to detecting or preventing most intrusions. |
National Defense June 2013 Valerie Insinna |
Defense Department Infrastructure Still Vulnerable to Cyber-Attacks, Critics Say The Defense Department knows how to fight a kinetic war with bullets, bombs and boots on the ground, but it is still figuring out what a cyberwar would look like and how it would be fought. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. |
Registered Rep. August 16, 2013 Lauren Barack |
Hackers At The Gate "FINRA expects cyber security to remain a regulatory focus for the foreseeable future," Susan Axelrod, FINRA's executive vice president for Regulatory Operations said at the PLI Seminar in October. |
National Defense November 2011 Eric Beidel |
Coast Guard Cyberdefense Office: Small but Mighty Like the Army, Navy, Air Force and Marine Corps, the Coast Guard suffers thousands of attacks on its networks each month. |
National Defense January 2016 Stephanie Meloni |
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. |
Popular Mechanics April 17, 2008 Joe Pappalardo |
Hack Attack on Tibet Groups Could Hint at China's Anti-U.S. Tactic As Buddhist monks in exile mourn fellow Tibetans killed in the recent conflict with China, U.S.-based nonprofit organizations are facing spam attacks, fake smear campaigns and other threats to digital privacy. |
National Defense February 2011 Lawrence P. Farrell Jr. |
To Improve Cyber-Security, U.S. Needs Cohesive Public-Private Partnership NDIA member companies recently put together a white paper on the necessity to better acquire and field cyber-capabilities. |
InternetNews October 31, 2007 Andy Patrizio |
Symantec's Latest: Customized Threat Protection Symantec announced a custom threat analysis and protection service through its Global Services Security Response unit. Managed Threat Analysis, is designed to help companies facing more targeted attacks from criminals looking to steal intellectual property. |
Popular Mechanics April 2009 Glenn Derene |
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
BusinessWeek April 10, 2008 |
China's Response to BusinessWeek A spokesperson of the Chinese Embassy to the United States responds to questions sent to authorities in Beijing and Washington regarding cyber crimes. |
National Defense January 2016 Allyson Versprille |
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said. |
Fast Company Victor Kotsev |
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. |
National Defense August 2011 Eric Beidel |
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. |
InternetNews January 15, 2010 David Needle |
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. |
Popular Mechanics January 13, 2010 Glenn Derene |
Why China Needs Google More Than Google Needs China Yesterday Google announced that Gmail accounts of Chinese dissidents had been hacked as part of a broad spying operation apparently tied to the Chinese government. |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
National Defense March 2015 Sarah Sicard |
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. |
IndustryWeek July 1, 2007 Brad Kenney |
From ID To IP Theft Manufacturing companies have tended to lag behind the financial, health care and energy industries in the area of information security, even though manufacturers clearly have a lot to lose. |
Fast Company Pavithra Mohan |
Obama Administration Proposes Sanctions In Retaliation For Chinese Cyberhacks In an effort to curb cyberhacking, the White House is currently developing economic sanctions that would impede the operations of Chinese companies in the U.S., the Washington Post reports. |
InternetNews June 2, 2011 |
Google Blames China for Gmail Hack According to Google, their security systems discovered a phishing campaign that had targeted Gmail in an effort to obtain user passwords. |
Search Engine Watch June 5, 2010 Johnny Widerlund |
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them. |
Inc. April 2007 Dan Briody |
Full Coverage How to hedge your cyber risk with insurance. |
InternetNews October 8, 2009 |
FBI Holds Its Own Phish Phry Fed crackdown nets the largest number of defendants ever charged in a cyber crime scam. |
InternetNews February 17, 2005 Michael Singer |
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. |
CRM September 2012 Kelly Liyakasa |
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. |
The Motley Fool November 14, 2011 Katie Spence |
Cyber Attacks Capable of Crashing the U.S. Economy? With cyber attacks becoming more prevalent, these companies are stepping in to provide solutions. |
InternetNews February 17, 2010 |
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take. |
InternetNews March 31, 2010 |
Vietnamese Activists Hit With Malware: Google As it continues to spar with the Chinese government over Internet censorship, Google warns of an apparently unconnected attack in the region targeting Vietnamese activists. |
InternetNews November 11, 2005 Roy Mark |
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. |