Cybersecurity & Espionage Articles
Original article at Forbes.com
When eBay merchant Mr. Balaj was looking through a pile of hi-fi junk at an auction in the U.K., he came across an odd-looking device. Easily mistaken for a child’s tablet, it had the word “Cellebrite” written on it. To Mr. Balaj, it appeared to be a worthless piece of electronic flotsam, so he left it in his garage to gather dust for eight months. But recently he’s learned just what he had his hands on: a valuable, Israeli-made piece of technology called the Cellebrite UFED.
0 Comments
Original article at DarkReading.com
A new report from Risk Based Security (RBS) shows that a total of 22,022 security vulnerabilities were disclosed in 2018. The number is projected to increase substantially once vulnerabilities that were disclosed after the report was compiled are added to the total. Last year for instance RBS initially reported a total of 20,832 vulnerabilities. It later revised that figure to 22,230 after accounting for flaws in 2017 that were disclosed after the report was ready. Original article at CNN.com
Top cybersecurity firm CrowdStrike saw "a big resurgence" last year in efforts by China-based groups to break into the systems of American businesses for commercial gain — a trend that "shows no sign of stopping," said Michael Sentonas, the company's vice president of security technology. Original article at TheatPost.com
More than one in 10 data breaches now involve “physical actions,” according to a recent report. These include leveraging physical devices to aid an attack, but also hacks that involve breaking into hardware and remote attacks on physical infrastructure. The stat underscores the realities of a shrinking gap between physical and cyber infrastructures. And, according to security professionals, one that should be forcing individuals, businesses and governments to combine both cyber- and physical security efforts, experts say. Learning From Apple's Spying Incidents - How To Protect Your Company From Corporate Espionage2/11/2019 Original article at Forbes.com
The two recent incidents at Apple remind is us that Corporate Espionage is a serious threat that your board should be aware of. For the second time in 6 months, Apple, working with the FBI, is accusing a Chinese national engineer of stealing trade secrets related to self-driving cars. The investigation was started when another employee reported seeing Jizhong Chen taking photographs in a sensitive area. Original article at CNN.com
According to court documents, Zhao entered the Joint Interagency Task Force South military property, located on Naval Air Station Key West, on September 26 without permission "by circumnavigating the installation's primary fence line, and entering the military property from the beach." Upon clearing the base's main fence line, Zhao went directly to an area that contains a range of satellite dishes and antennas called "the Farm," court documents say. Zhao took videos and multiple photographs of the equipment in the Farm, the court said. Original article at FoxNews.com
“The Chinese counter-intelligence threat is more deep, more diverse, more vexing, more challenging, more comprehensive and more concerning than any counterintelligence threat that I can think of," FBI Director Christopher Wray testified at a Senate Intelligence Committee hearing last week. Original article at the Miami Herald
Zhao Qianli says he’s a musicology student from China who traveled to the United States for a summer exchange program. After he finished his studies in September, he booked a flight to Miami and then headed for Key West. But rather than see the Hemingway House and other sights, Qianli got caught by Key West police for trespassing onto the high-security Naval Air Station. He later told federal authorities that he lost his way on the tourist trail and did not realize it was a military base. Original article at E-IR.info
Cyber threats are today perceived as a top national security concern as governments warn against attacks against vulnerable critical infrastructure. In 2012, for instance, the then US Defence Secretary warned of a cyber ‘Pearl Harbor’ against the power grid or the financial system, both of which are reliant on computer networks for their operation (Bumiller and Shanker 2012). According to a 2016 survey, 73 percent of Americans believed cyber terrorism presented a ‘critical threat’ to the United States (McCarthy 2016). |
Cyber-CyI find interesting articles on the web that are simple, down-to-earth, easy to understand, and (hopefully) informative for non-technical readers. Archives
November 2022
Categories |