04 Jun 2013

Silicon Valley at front line of global cyber war

“Chinese President Xi Jinping and American counterpart Barack Obama will talk cyber-security this week in California, but experts say the state’s Silicon Valley and its signature high-tech firms should provide the front lines in the increasingly aggressive fight against overseas hackers. With China seeking to grow its economy and expand

Read More
03 Jun 2013

Army releases new leaders’ handbook on cybersecurity

“The Army published a new handbook this month to provide leaders of all levels with the information and tools needed to address today’s cybersecurity challenges, and to ensure organizations adopt the necessary practices to protect their information and the Army network. ‘We must change our culture, enforce compliance, and ensure

Read More
03 Jun 2013

U.S. and China to Hold Talks on Hacking

” The United States and China have agreed to hold regular, high-level talks on how to set standards of behavior for cybersecurity and commercial espionage, the first diplomatic effort to defuse the tensions over what the United States says is a daily barrage of computer break-ins and theft of corporate

Read More
03 Jun 2013

Any iOS device can be hacked within one minute with modified charger

Think you are safe plugging your phone into that USB charger at the airport or hotel? Think again. “Security researchers have discovered a way to push software onto an iOS device using a modified charger. The team at George Institute of Technology says its charger was able to upload arbitrary

Read More
01 Jun 2013

Chuck Hagel accuses China over ‘cyber intrusions’

“The US defence secretary has accused China of ‘cyber intrusions’, in one of the most direct rebukes from the US. Chuck Hagel reiterated concern over the threat of cyber attacks before adding: ‘Some of which appear to be tied to the Chinese government and military.’ He was speaking at a

Read More
31 May 2013

Hackers Are Spying On You: Inside the World of Digital Espionage

“Winding through corridors lined with poison-tipped umbrellas, pistols fashioned from lipstick tubes, and bulky button-hole cameras, visitors to Washington’s International Spy Museum will soon be confronted by a modern, quotidian tool of the trade: a small black laptop. According to the computer’s owner, it was employed over a three-year period

Read More
31 May 2013

Why Iran’s Hackers Might Be Scarier Than China’s

“May was a grim month for American cybersecurity. First, the Obama administration accused China of hacking government computers, potentially to exploit weaknesses in the US military. Then, US officials announced that hackers, believed to be sponsored by the Iranian government, had successfully broken into computer networks that run US energy

Read More
31 May 2013

Hack in the USSR: cybercriminals find haven in .su domain space

“The Soviet Union disappeared from the map more than two decades ago, but online an ‘evil empire’ is thriving. Security experts say the .su internet suffix assigned to the USSR in 1990 has turned into a haven for hackers who’ve flocked to the domain space to send spam and steal

Read More
31 May 2013

Cyber threats pose ‘stealthy, insidious’ danger: defense chief

“Defense Secretary Chuck Hagel said on Friday that cyber threats posed a ‘quiet, stealthy, insidious’ danger to the United States and other nations, and called for ‘rules of the road’ to guide behavior and avoid conflict on global computer networks.” Source: Cyber threats pose ‘stealthy, insidious’ danger: defense chief |

Read More
30 May 2013

Despite opposition, Google will make critical security exploits public after seven days

“Google’s security researchers are well known for uncovering vulnerabilities in other people’s products. Standard operating procedure is to give the affected company sixty days before publishing the problem, keeping things under wraps until a fix can be shipped out. But when it comes to critical vulnerabilities that are actively being

Read More