Categories » Persistent Threats

NSA Director: China Can Damage US Power Grid

NSA Director: China can damage US power grid

This System Will Self Destruct: Crimeware Gets Powerful New Functions

Refurbished BlackEnergy does Windows and Linux—even Cisco routers. Continue reading

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

Radio-frequency hack developed by researchers in Israel would let attackers steal data remotely from even air-gapped computers not connected to the internet. The post How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data appeare… Continue reading

WW2 Technology ‘Plan B’ for GPS

World War Two tech to back up GPS Continue reading

U.S. Nuclear Regulator Hacked Three Times in Three Years- 19 August 2014

19 August 2014- ThreatPost U.S. Nuclear Regulator Hacked Three Times in Three Years

Hackers Penetrated Systems of Key Defense Contractors- 18 September 2014

18 September 2014- Help Net Security Hackers penetrated systems of key defense contractors

North Korea Cyber Warfare Capabilities Exposed- 2 September 2014

2 September 2014- ZDNet North Korea cyber warfare capabilities exposed

Iran’s Emergence as a Cyber Power- 20 August 2014

20 August 2014- Strategic Studies Institute Iran’s Emergence as a Cyber Power

Hackers Stole Security Check Info on at Least 25,000 DHS Employees- 30 August 2014

30 August 2014- Ars Technica Hackers stole security check info on at least 25,000 DHS employees

Hackers Launch All-Out Assault on Norway’s Oil and Gas Industry- 31 August 2014

31 August 2014- Vice Motherboard Hackers Launch All-Out Assault on Norway’s Oil and Gas Industry

The Long Game: How Hackers Spent Months Pulling Bank Data from JPMorgan- 29 August 2014

29 August 2014- Ars Technica The long game: How hackers spent months pulling bank data from JPMorgan

Community Health Says Data Stolen in Cyber Attack from China-18 August 2014

18 August 2014- Reuters Community Health says data stolen in cyber attack from China

Background Check Firm Hit by Breach- 7 August 2014

7 August 2014 Background Check Firm Hit by Breach

Chinese Hackers Extending Reach to Smaller U.S. Agencies, Officials Say- 15 July 2014

15 July 2014- New York Times Chinese Hackers Extending Reach to Smaller U.S. Agencies, Officials Say

Canada Says China Hacked Science Agency Computers- 30 July 2014

30 July 2014- SecurityWeek Canada Says China Hacked Science Agency Computers

Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System- 28 July 2014

28 July 2014- Krebs on Security Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System

Dragonfly: Western Energy Companies Under Sabotage Threat- 30 June 2014

30 June 2014- Symantec Dragonfly: Western Energy Companies Under Sabotage Threat

Cyber Attacks Analyzed by Mikko Hypponen- 10 July 2014

10 July 2014 MIT Technology Review Cyber Attacks analysed by Mikko Hypponen

North Korea “Doubles Cyber War Personnel- 6 July 2014

6 July 2014- Channel NewsAsia “N Korea “doubles cyber war personnel””

2014: The Year Extortion Went Mainstream- 14 June 2014

14 June 2014- Krebs on Security 2014: The Year Extortion Went Mainstream