Read more about cyber espionage
Bookmark and Share
  • Data broker databases breached, stolen info used by ID theft service

    25.09.2013

    Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be used to compromise online accounts and facilitate identity theft.

  • Belgacom was breached by Britain's GCHQ

    20.09.2013

    Earlier this week, the primarily state owned Belgacom - the largest telecom in Belgium, with customers such as the European Commission, Council and Parliament - has made public the fact that their internal computer system have been breached by an "unknown third party".

  • Chinese hackers for hire tied to Bit9 and Aurora attacks

    18.09.2013

    The existence, the modus operandi and details of successful campaigns of another Chinese hacking group have been revealed by Symantec researchers, who have managed to tie to several high-profile compromises in the last few years, most notably that of Bit9.

  • Largest Belgian telecom breached by the NSA?

    16.09.2013

    Belgacom, primarily state owned and the largest telecom in Belgium, has announced that its internal IT systems have been breached and compromised with malware by an "unknown third party".

  • NSA impersonated Google in MitM attacks

    16.09.2013

    After all the recent revelations about the NSA and their surveillance and encryption-foiling activities, would it surprise you to know that the agency or its British counterpart GCHQ also impersonated Google, Yahoo and Microsoft in Man-in-the-Middle attacks aimed at intercepting user communications? Ryan Gallagher over at The Slate was the first to report on the revelation for the English speaking public by digging into the reporting of Brazilian TV show Fantastico, whose reporters had a chance to go through a set of documents leaked by NSA whistleblower Edward Snowden to Guardian journalist Glenn Greenwald: However, in some cases GCHQ and the NSA appear to have taken a more aggressive and controversial route—on at least one occasion bypassing the need to approach Google directly by performing a man-in-the-middle attack to impersonate Google security certificates.




Spotlight

Nine patterns make up 92 percent of security incidents

Posted on 23 April 2014.  |  Researchers have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that vary from industry to industry.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //