One single Chinese military unit has been stealing massive amounts of computer data from around the globe, dating back to 2006—allegedly.
In a report by Mandiant, a private American information security firm, the firm alleges that the Chinese government is authorizing and ordering a secret cyber-warfare unit.
According to Mandiant’s report, this unit of the Chinese army is solely responsible for stealing “hundreds of terabytes of data from at least 141 organizations.”
By MICHAEL MCCAUL. Before the devastating attacks of Sept. 11, 2001, it was difficult for most Americans to fathom such a tragedy on U.S. soil. It later became clear that we had not seen the warning signs. Today, advances in technology that connect utilities, industries and information in real time have changed the nature of the threats facing the nation.
Espionage, Cyberwarfare and Cybercrime it is all data. Team Cymru has released a new study today that shows how foreign states are using the internet to steal classified information and data from United States soil. Recently Mandiant released their report on Chinese Espionage and the Chinese declined that report. It shows that Espionage is a serious threat.
All warfare is based on deception that is what Sun Tzu said in his book Art of War. Sun Tzu was an ancient Chinese military general, strategist and philosopher who is traditionally believed to be the author of the well known book "The Art of War", an influential ancient Chinese book on military strategy.
As Sun Tzu died at 496 BC his tactics are still conform the present day. Cyberwarzone will show you some of his tactics that are used in the area of cyber warfare.
A very fun and nice commercial by Kaspersky. Kaspersky is one of the leading security companies and they are not afraid to show it. They made a new video that shows how the commen System Administrator or Network Administrator needs to fight against malware and espionage. Who will win? Watch the video.
Meet Max, the IT Security Manager. See how Max, with the help of Kaspersky Lab, tackles the IT security battle in this new animation. Find out how IT security takes back control of the endpoint in this animation.
Times Square a major commercial intersection in Midtown Manhattan, New York has just been hit by multiple drones. The MQ-1 Predator drones that were supposed to keep the city safe were hijacked by an radio signal that came from the One Times Square building - in the same time the command and control center of the MQ-1 Predator drones lost their connection and control of the drones.
You might have seen him on the NATO CCDCOE Conference in Tallinn or you might know him as Toomas Hendrik Ilves the current President of Estonia. Estonia had a rough year in 2007 when Estonia got hit by an cyber attack.
The attack was stopped in two weeks and that was when Estonia said we are going to spend our attention on cyber security and our understanding of cyber security.