Read more about cyber espionage
Bookmark and Share
  • German intelligence agency helped NSA spy on EU companies

    24.04.2015

    Germany's Federal Intelligence Service (BND) has been aiding the US NSA spy on European companies and politicians since 2008, possibly even earlier, Der Spiegel claims (via Google Translate).

  • White House cyber attackers linked to OnionDuke APT actor

    22.04.2015

    It's widely believed that the October 2014 breaches of US State Department and White House computer systems have been executed by Russian hackers.

  • Pawn Storm cyberspies still at work, target NATO and the White House

    17.04.2015

    Pawn Storm, the long-standing economic and political cyber-espionage operation that has been first detailed in October 2014, continues unabated.

  • New trend in cybercriminal activity: APT wars

    15.04.2015

    Kaspersky Lab has recorded a rare and unusual example of one cybercriminal attacking another.

  • US to enact sanctions against foreign cyber attackers

    02.04.2015

    US president Barack Obama has signed on Wednesday a new executive order aimed at imposing "sanctions on individuals or entities that engage in malicious cyber-enabled activities that create a significant threat to the national security, foreign policy, or economic health or financial stability of the United States." "The malicious cyber-enabled activity must have the purpose or effect of significantly harming or compromising critical infrastructure; misappropriating funds or economic resources, trade secrets, personal identifiers, or financial information for commercial or competitive advantage or private financial gain; knowingly receiving or using trade secrets that were stolen by cyber-enabled means for commercial or competitive advantage or private financial gain; disrupting the availability of a computer or network of computers (for example, through a denial of service attack); and attempting, assisting or providing material support for any of the above activities," the president explained.




Spotlight

Best practices for ensuring compliance in the age of cloud computing

Here are the major considerations organizations should incorporate into their compliance programs, as well as pitfalls that can be avoided to ensure businesses stay compliant while using cloud computing.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Sep 3rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //