The Pentagon has come out and said it: “China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S.
Despite Mandiant's prediction that the release of their report on the attack methodology of the so-called APT1 (or "Comment Crew") cyber espionage group would lead to them changing their attack techniques and consequently make them harder to track in the future, it seems that the group laid has bucked the expectations.
A judge of the U.S. District Court for the Southern District of Texas has denied FBI's petition to install spying software on and using the built-in camera of an unidentified suspect's computer in order to discover his or her identity and gather evidence of the crime from the computer's hard drive, memory and storage.
Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, according to a new Verizon report.
There has been much talk about whether the cyber espionage attacks should be considered acts of war, and about what can be done to prevent them.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.