LATEST ARTICLES

2017

  [2017]  [2016]  [2015]  [2014]  [2013]  [2012]  [2011]
"AI, IoT and the end of Moore's Law add to US national security worries"    ZD Net May 11, 2017
"Trump signs executive order on cybersecurity, White House now runs the show"    The Register May 11, 2017
"Ten-X Wins Settlement from CREXi in Trade Secret Theft Lawsuit"    PR Newswire May 10, 2017
"Trade Secret Cases Surge as Race for New Tech, Top Talent Heats Up"    Bloomberg May 10, 2017
"Microsoft’s recent success in blocking zero-day attacks is eerily good"    ARS Technica UK May 10, 2017
"Trump's cybersecurity executive order: 4 things you need to know"    TechRepublic May 10, 2017
"China, India named and shamed on lax IP"    Securing Industry May 2, 2017
"IBM Supply Chain Breached as Storwize USBs Ship With Malware"    Security Week May 1, 2017
"USTR Releases 2017 Special 301 Report on Intellectual Property Rights"    Office of United States Trade Representative Apr 28, 2017
"Malicious emails at five-year high"    Australian Business Review Apr 28, 2017
"Report: Cyberespionage now most popular form of cybercrime in many industries"    Tech Republic Apr 27, 2017
"Email access: cyber espionage and ransomware attacks are on the increase - Verizon"    Information Age Apr 27, 2017
"Cyber attacks ten years on: from disruption to disinformation"    The Conversation Apr 26, 2017
"Just Ivanka: As her fame skyrockets, Trump daughter launches legal battle to protect her first name"    National Post Apr 21, 2017
"Hackers are after your intellectual property, not only your money"    National Cyber Security Apr 20, 2017
"Tesla settles lawsuit with former head of its Autopilot system Read more: http://www.nasdaq.com/article/tesla-settles-lawsuit-with-former-head-of-its-autopilot-system-20170419-01376#ixzz4fHSjkTER"    NASDAQ Apr 19, 2017
"Where Trump Goes Next on Trade"    IPP Review Apr 19, 2017
"Five reasons to worry about the ShadowBrokers hack"    The Hill Apr 18, 2017
"Brexit: foreign states may have interfered in vote, report says"    The Guardian Apr 12, 2017
"Observations on China’s New International Cyberspace Cooperation Strategy"    Lawfare Apr 7, 2017
"IACC Welcomes Presidential Executive Order to Enhance Intellectual Property Enforcement"    PR Newswire Apr 3, 2017
"“Hackers-For-Hire” Tried To Swipe Baidu’s Driverless Car Tech"    PYMNTS Mar 23, 2017
"Hackers Reportedly Tried to Steal Self-Driving Car Secrets From Chinese Web Company Baidu"    Slate Mar 21, 2017
"Hackers took down Adobe Reader, Apple Safari, Microsoft Edge, and Ubuntu Linux PWN2OWN 2017"    Threatpost Mar 16, 2017
"Trump taps NSA hacker Rob Joyce for National Security Council cyber role"    Matthew Aid Mar 15, 2017
"Wide Swath of Corporate America Exposed in D&B Leak"    Info Security Magazine Mar 13, 2017
"Google has asked a judge to freeze Uber's use of self-driving-car tech"    Business Insider Mar 10, 2017
"Pentagon: Russia, China Able to Launch Catastrophic Cyber Attacks on U.S. Infrastructure for Next 10 Years"    Free Beacon Mar 10, 2017
"Fabricate and NOT stitch your security for today's hostile threat landscape"    Networks Asia Mar 10, 2017
"China Slams US For ‘Stealing Secrets’ After Hacking America For Years"    The Daily Caller Mar 9, 2017
"CIA contractors likely source of latest WikiLeaks release, say US officials"    Christian Science Monitor Mar 8, 2017
"Wikileaks' CIA dump looks like a dud for now"    Chicago Tribune Mar 8, 2017
"Wikileaks' CIA hacking revelations: Cyber security experts respond with a collective 'meh'"    Mirror (UK) Mar 8, 2017
"What WikiLeaks’ massive CIA leak tells us about cybersecurity"    Sophos Mar 8, 2017
"Connectivity The Wikileaks CIA Stash May Prove Interesting, But Not Necessarily for the Hacks"    Technology Review Mar 7, 2017
"Observations on China’s New International Cyberspace Cooperation Strategy"    Lawfare Blog Mar 7, 2017
"Does the Google-Uber Lawsuit Hold the Key to Self-driving Cars?"    Wharton Mar 2, 2017
"Intelligence community seeks answers in aftermath of Harold Martin case"    Cyberscoop Feb 28, 2017
"Xiaomi, Huawei, Oppo turn to cutting-edge technology to take on global giants"    LiveMint Feb 28, 2017
"Google lawsuit against Uber could mean multi-billion dollar settlement and possibly jail for some"    NextBigFuture Feb 28, 2017
"Uber accused of 'calculated theft' of Google's self-driving car technology"    The Guardian Feb 23, 2017
"Clash Of The Autonomous Titans: Alphabet's Waymo Sues Uber Claiming Tech Theft"    Forbes Feb 23, 2017
"Framework and Terminology for Understanding Cyber-Enabled Economic Warfare"    Foundation for Defense of Democracies Feb 22, 2017
"US Government Hacked With Its Own Spyware?"    National Cyber Security Ventures Feb 20, 2017
"Roots of innovation: 45 countries ranked in global IP index"    Next Silicon Valley Feb 16, 2017
"A Tale of Two Trading Partners"    Global Trade Magazine Feb 16, 2017
"CyberX Discovers Operation BugDrop: A Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations"    Yahoo Finance Feb 16, 2017
"‘No doubt’ Russians tried to undermine US election"    Irish Times Feb 14, 2017
"Ex-NSA contractor pleads not guilty to spying charges in federal court"    Matthew Aid Feb 14, 2017
"Cyber Spies: In-House Legal Fights Back Against Cyberespionage"    Legaltech News Feb 9, 2017
"Former NSA contractor may have stolen 75% of TAO’s elite hacking tools"    ARS Technica Feb 6, 2017
"Trump Delays Signing Cyber Order to Focus on Immigration Suit"    Singapore Hardware Zone Feb 2, 2017
"Shocking details as Russian spies charged with treason"    CBS NEWS Feb 1, 2017
"Tesla News This Week Includes Theft, Intrigue, and Politics"    TorqueNews Jan 31, 2017
"Trump hits control-Z on cybersecurity order: No reason given for delay"    The Register Jan 31, 2017
"Twist Bioscience Files Response to Agilent Technologies Lawsuit"    Genomeweb Jan 30, 2017
"Trump trade war with China - the implications"    The Financial Express Jan 28, 2017
"Trump talks tough on China’s hacking. Why not Russia’s?"    Politico Jan 28, 2017
"Global IP Protection Group Names New CEO"    Market Wired Jan 25, 2017
"NY Appeals Court Decision Signals that Cybersecurity Whistleblowing Implicates Corporate Theft"    National Law Review Jan 25, 2017
"Ex-Goldman Sachs programmer found guilty, again, of source code theft"    ARS Technica Jan 24, 2017
"What Donald Trump’s appointments reveal about his incoming administration"    The Economist Jan 21, 2017
"Alibaba's Ma makes star turn as Davos pivots to China"    Channel News Asia Jan 20, 2017
"Where Will The Cards Fall When Trump Reshuffles The Deck On IP Policy?"    Forbes Jan 20, 2017
"Trump team challenge: Hardening critical infrastructure"    Asia Times Jan 20, 2017
"Jack Ma says the US wasted all the money it made on globalization in fighting costly wars"    Shanghaiist Jan 19, 2017
"Thomas Wright: The dangerous side to the art of the deal"    Nikkei Asian Review Jan 19, 2017
"Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace"    The Diplomat Jan 19, 2017
"Just Discovered Fruitfly Malware Uses Pre-OS X Code"    Mac Observer Jan 18, 2017
"Four Cyber Trends To Watch in 2017"    Gov Tech Works Jan 18, 2017
"Zuckerberg takes the stand in Oculus trade secrets trial"    The Verge Jan 17, 2017
" Office of United States Trade Representative : USTR Releases 2016 Report to Congress on China’s WTO Compliance"    USTR Jan 17, 2017
"Top 5 State-Sponsored Hacking Collectives"    The Merkle Jan 10, 2017
"US losing dominance in cyber war"    Centre Daily Times Jan 10, 2017
"Massive cyber attack affecting 500 industrial companies in 50 countries, says Kaspersky"    Roborics & Automation News Jan 5, 2017
"How Will Criminal Trade Secret Prosecutions Fare Under President Trump?"    JD Supra Jan 5, 2017
"Cyberwar for Sale"    New York Times Jan 4, 2017
"Wilbur Ross’ Chinese love affair"    Politico Jan 2, 2017

2016

"Yahoo under scrutiny after latest hack, Verizon seeks new deal terms"    4-Traders Dec 15, 2016
"Industry welcomes US's 'robust' plan on IP infringement"    Securing Industry Dec 14, 2016
"U.S. files first charges in generic drug price-fixing probe"    Reuters Dec 14, 2016
"France launches first cyber-warfare unit"    LangueDocLiving Dec 13, 2016
"How A Single Typo Led To The Unraveling Of Hillary Clinton’s Campaign"    Huffington Post Dec 13, 2016
"The Failed Trans-Pacific Partnership: What It Might Have Meant To Biotech and Pharma"    JD Supra Dec 12, 2016
"Executive report lays blueprint for IP enforcement"    US DHS ICE Dec 12, 2016
"Real deal: Hackers steal steelmaker trade secrets"    The Register Dec 8, 2016
"ThyssenKrupp’s Trade Secrets Targeted in ‘Massive’ Cyber Attack"    Insurance Journal Dec 8, 2016
"Data Theft At ThyssenKrupp Highlights Industrial Espionage Threat"    InformationWeek Dec 8, 2016
"China-championed Asia trade pact should wrap up fast, ADB says"    Malaymail Online Dec 6, 2016
"Cyber Attacks on U.S. Companies in 2016"    Heritage Foundation Dec 2, 2016
"Cyber Attacks on U.S. Companies in 2016"    Heritage Foundation Dec 2, 2016
"About 15,000 illegal websites seized and 48,000 erroneous ecommerce links removed over the past year"    Voice Online Nov 28, 2016
"How a Grad Student Found Spyware that Could Control Anybody's iPhone From Anywhere in the World"    Vanity Fair Nov 28, 2016
"Fake goods pose real threat"    The Monitor Nov 25, 2016
"Symantec: Hackers Are Becoming Expert IP Hunting Professionals"    Silicon (UK) Nov 15, 2016
"Two Men Charged With Stealing Defense Contractor's Trade Secrets"    Hartford Courant Nov 14, 2016
"Happenstance and enemy action"    The Economist Nov 12, 2016
"Russian 'Dukes' of Hackers Pounce on Trump Win"    Krebs on Security Nov 10, 2016
"7 Shocking Statistics on Small Business Data Theft"    Business 2 Community Nov 9, 2016
"'It's heart-wrenching': Independent designers face a flood of knock-off products"    Globe and Mail (UK) Nov 7, 2016
"The Government's "Jaws" & the Threat to Intellectual Property & Trade Secrets"    Fox News Nov 4, 2016
"Windows computers vulnerable to attack tied to DNC hackers, Microsoft warns"    Washington Post Nov 2, 2016
"SPECIAL REPORT-John Brennan's attempt to lead the CIA into the age of cyberwar"    Reuters Nov 2, 2016
"UK Government launches new National Cyber Security Strategy today"    SC Magazine Nov 1, 2016
"NSA security gaps revealed after suspect arrested in breach"    Seattle Times Oct 28, 2016
"Strengthening our cyber defences: A person, a bank, a country - it's a free-for-all"    Straits Times Oct 23, 2016
"Check out the Maps of the DDos Attacks! See Right Where the Hackers Hit!"    OSINT Oct 22, 2016
"How Podesta became a cybersecurity poster child"    Politico Oct 21, 2016
"Hacking vendetta seen in attack on East Coast web host"    Chicago Tribune Oct 21, 2016
"Pakistan Government Officials Targeted with RATs in Cyber-Espionage Campaign"    Cyber Security Review Oct 21, 2016
"Former Secretary of Defense: 'I have wasted more money on IT than anyone in history'"    ZD Net Oct 19, 2016
"Which country has the best hackers: Russia or China?"    InfoWorld Oct 18, 2016
"Nation-State Hackers Hit Japanese Nuclear Facility"    Info Security Magazine Oct 18, 2016
"A New Spy Scandal Exposes the Corruption of Privatized Intelligence"    The Nation Oct 14, 2016
"6 US Soldiers, 2 Civilians Charged in Theft of Sensitive Army Gear"    VOA News Oct 8, 2016
"NSA contractor arrested in alleged theft of classified material"    The Hill Oct 8, 2016
"NSA contractor charged with stealing secret data"    Reuters Oct 6, 2016
"FBI Searching for Suspect in Theft of Intellectual Property"    Houston Patch Oct 4, 2016
"Houston Energy Company Targeted in Unique Theft"    ABC 13 Oct 4, 2016
"Breaking News: Yahoo Secretly Copied Customers Emails for US Intelligence Community"    Matthew Aid Oct 4, 2016
"Quadsys Five walk free after hacking rival company"    The Register Sep 30, 2016
"The Internet of Things Goes Rogue"    Technology Review Sep 30, 2016
"Yahoo Says Hackers Stole Data on 500 Million Users in 2014"    New York Times Sep 23, 2016
"In Yahoo Breach, Hackers May Seek Intelligence, Not Riches"    ABC News Sep 23, 2016
"Yahoo's future in doubt as BT and Sky users are hauled into biggest ever hack"    The Guardian Sep 23, 2016
"Weapon systems will remain vulnerable to hackers for decades, Air Forces Cyber Commander says"    FedScoop Sep 23, 2016
"It's strange Yahoo took 2 years to discover a data breach, security experts say"    LA Times Sep 23, 2016
"Big Security Bug Affects Hundreds Of Thousands Of Cisco Devices"    Fortune Sep 22, 2016
"Trade Secrets: Changes In The Law On Protection Of Trade Secrets In The United States And European Union"    JD Supra Sep 22, 2016
"Yahoo is expected to confirm massive data breach, impacting hundreds of millions of users"    CNBC Sep 22, 2016
"Malware Evades Detection With Novel Technique"    Threatpost Sep 22, 2016
"The Cyber Cold War: the Newest Front in Political & Corporate Espionage"    Info Security Magazine Sep 21, 2016
"GCHQ plans to protect the country with a national firewall"    Security Affairs Sep 18, 2016
"Congressional Report Slams OPM on Data Breach"    Krebs on Security Sep 16, 2016
"The Threat Landscape as Seen Through FireEye's Eyes"    Cyberwire Sep 14, 2016
"Nation's first CISO brings vision, strategy to cybersecurity mission"    Federal Times Sep 14, 2016
"Data is the currency of the cyber world"    Tech Central Sep 13, 2016
"Russians and Chinese Hacking U.S. “All The Time,” Spy Director Claims"    District Sentinel Sep 7, 2016
"Cyber commander: U.S. not drawing 'red lines' in cyberspace"    Fed Scoop Sep 7, 2016
"Congressional Probe Says OPM Hackers Arrived in 2012 and We Will Never Know What They Took"    Nextgov Sep 7, 2016
"Fact Sheet: The 2016 G-20 Summit in Hangzhou, China"    4 Traders Sep 5, 2016
"Huawei tries again in Australia"    Telecom Asia Sep 5, 2016
"Former electronic spy chief urges Ottawa to prepare for ‘cyber war’"    Cyber Attacks Squad News Sep 1, 2016
"Annual Cybercrime Costs to Double to $6 Trillion by 2021"    Info Security Sep 1, 2016
"'Guccifer' Hacker Gets 52 Months in US Prison"    VOA Sep 1, 2016
"Clinton: Treat cyberattacks 'like any other attack'"    The Hill Aug 31, 2016
"Microsoft joining China's cybersecurity council paves the way for better relations between the two largest internet markets"    Business Insider Aug 29, 2016
"FBI: Election Systems Hacked in 2 States"    Newser Aug 29, 2016
"Will The Election Be Hacked: FBI Finds "Foreigners" Breached Two State Election Databases"    Zero Hedge Aug 29, 2016
"India and the Scorpene Leak: Untangling the Knots"    The Diplomat Aug 27, 2016
"China Is Fueling a Submarine Arms Race in the Asia-Pacific"    Foreign Policy Aug 26, 2016
"Patchwork cyberespionage group expands targets from governments to wide range of industries"    Symantec Aug 25, 2016
"This Government Agency’s Cover-Up May Have Hindered US Cybersecurity"    Daily Signal Aug 25, 2016
"Fear or greed: what drives the response to Chinese investment in Australia?"    WA Today (AU) Aug 19, 2016
"Here's why the NSA won't release a 'smoking gun' implicating Russia in these major hacks"    Business Insider Aug 19, 2016
"Evidence mounts that NSA computer code was stolen"    National Cybersecurity Aug 18, 2016
"Clinton Foundation announces it will stop accepting foreign and corporate donations if Hillary Clinton is elected President"    NY Daily News Aug 18, 2016
"Sage Employee Arrested At Heathrow Airport"    Tech Week Europe Aug 18, 2016
"Opinion: Why political campaigns need chief information security officers"    Christian Science Monitor Aug 17, 2016
"China's Launch of Quantum Satellite Major Step in Space Race"    Popular Mechanics Aug 17, 2016
"Organizations in 30 Countries Targeted in "Operation Ghoul""    Security Week Aug 17, 2016
"Did NSA Get Hacked?"    Nextgov Aug 16, 2016
"No One Wants To Buy Those Stolen NSA-Linked 'Cyberweapons'"    Wired Aug 16, 2016
"Confirmed: hacking tool leak came from “omnipotent” NSA-tied group"    ARS Technica Aug 16, 2016
"Did 'Shadow Brokers' steal NSA cyberweapons?"    Christian Science Monitor Aug 16, 2016
"New Information Stealing Trojan Steals and Uploads Corporate Files"    Bleeping Computer Aug 12, 2016
"U.S. Intelligence to Help Companies Avert Supply-Chain Hacking"    Bloomberg Aug 10, 2016
"America Finally Takes on an IP Criminal"    Economics21 Aug 9, 2016
"U.S. cyber arsenal is smaller than imagined — on purpose"    The Hill Aug 9, 2016
"The Hacking Teams: who they are, what they want, and how they hack"    Tech Republic Aug 9, 2016
"ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms"    SecureList Aug 8, 2016
"Cybergate: 5 major political cyber attacks"    Computer Business Review Aug 8, 2016
"Symantec Discovers Strider, A New CyberEspionage Group"    Information Week Aug 8, 2016
"Guarding The Grid"    Information Week Aug 8, 2016
"Precision Discovery, Inc. Announces ERA, a Tool to Protect Valuable Intellectual Property"    PR Newswire Aug 3, 2016
"Russian hackers keep business booming for Irvine cybersecurity firm"    LA Times Aug 2, 2016
"DIA cyber officer profiles global threat actors"    C4ISRNET Aug 1, 2016
"Analyzing Clinton's Positions on Cybersecurity, Privacy"    Bank Info Security Jul 25, 2016
"Top Republican lawmaker resigns suddenly citing "cyber security issues""    Daily Herald Jul 24, 2016
"These are the most feared hacker groups in the world"    Business Insider Jul 22, 2016
"Majority Of Companies Say Trade Secrets Likely Compromised"    Information Week Jul 21, 2016
"Predicting heightened malicious cyber activity, the old fashioned way"    The Hill Jul 20, 2016
"IP3C Launched from Europe to Stop Online Intellectual Property Abuse"    Spam Fighter Jul 20, 2016
"Notorious Hacker ‘Phineas Fisher’ Says He Hacked The Turkish Government"    Motherboard Jul 20, 2016
"GE, Huawei to partner on Internet of Things "    USA Today Jul 20, 2016
"Hacker Selling Entire US Voters’ Registration Records on Dark Net"    Hack Read Jul 18, 2016
"The EU GDPR: The clock is ticking for UK businesses"    IT Pro Portal Jul 17, 2016
"Canadian Man Behind Popular 'Orcus RAT'"    Krebs on Security Jul 16, 2016
"Nation-backed malware that infected energy firm is 1 of 2016’s sneakiest"    ARS Technica Jul 12, 2016
"Stealthy cyberespionage malware targets energy companies"    CSO Online Jul 12, 2016
"USAF Wants Cyber-Hard Supply Chain For B-21"    Aviation Week Jul 12, 2016
"U.S. officials seize $6.5m in counterfeit goods in Puerto Rico"    Retail Dive Jul 8, 2016
"Hacker Group DROPPING ELEPHANT Targets China and Asian Regional Entities"    Matthew Aid Jul 8, 2016
"Huawei proves Samsung is infringing its patents"    China Daily Jul 7, 2016
"APT Group 'Patchwork' Cuts-and-Pastes a Potent Attack"    ThreatPost Jul 7, 2016
"Why rogue employees may pose bigger threat to corporate data than hackers"    Christian Science Monitor Jul 7, 2016
"‘Zero Days’ details U.S. vulnerability to cyberattacks"    Seattle Times Jul 7, 2016
"Opinion: The U.S. doesn’t even enforce trade rules, never mind enact favorable deals"    Market Watch Jul 7, 2016
"How the Trade Secrets Act Will Benefit Manufacturers"    Industry Week Jul 7, 2016
"Attention, small biz using Symantec AV: Smash up your PCs, it's the safest thing to do"    The Register Jul 6, 2016
"UK Employee Theft Statistics Report More Thefts by Senior Management"    LPM Insider Jul 5, 2016
"Hackers use 'cyber weapons' rather than malware to evade detection when deploying attacks, study finds"    International Business Times Jul 1, 2016
"The US Really Does Want to Constrain Commercial Espionage: Why Does Nobody Believe It?"    Lawfare Jul 1, 2016
"Alibaba Group Hosts Inaugural Summit for International IP Rights Holders"    Market Watch Jun 30, 2016
"Qualcomm files 17 new complaints in China courts against smartphone maker Meizu"    Reuters Jun 30, 2016
"Terror-suspect database used by banks, governments, has been leaked"    CSO Online Jun 29, 2016
"New Balance ordered to pay 5 million RMB for infringing on Chinese company's trademark"    Shanghai List Jun 28, 2016
"Putting the Brakes on Intellectual Property Crime Trio Pirated Mercedes-Benz Diagnostic Software"    FBI Jun 24, 2016
"U.S. lottery firm says its 'most-prized' secrets have been taken"    Brantford Expositor Jun 24, 2016
"From Articulation to Implementation:Enabling progress on cybersecurity norms"    Microsoft Jun 23, 2016
"Intel Security: Connecting with strangers on LinkedIn puts firms at risk of phishing attacks"    The Inquirer Jun 23, 2016
"Apple’s Loss in Chinese Patent Fight Seen Emboldening Rivals"    Bloomberg Jun 21, 2016
"Kaspersky battles hackers in internet’s ‘dark ages’"    Seattle Times Jun 21, 2016
"Russia, China to Sign Intellectual Property Deal on Rocket Tech"    Sputnik News Jun 20, 2016
"US Deputy Homeland Security Secretary: US-Israel to sign automated cyber information sharing agreement"    Jerusalem Post Jun 20, 2016
"Someone Got Into 45 Million Accounts From Hundreds Of Car, Tech, Sports Forums"    Nextgov Jun 20, 2016
"U.S. Cyber Command Chief on What Threats to Fear the Most"    Wall Street Journal Jun 19, 2016
"Apple IPhones Found to Have Violated Chinese Rival’s Patent"    Bloomberg Jun 17, 2016
"Trade Secrets Now Federally Protected Intellectual Property"    JDSupra Jun 16, 2016
"A Chaotic Whodunnit Follows The DNC’s Trump Research Hack"    Wired Jun 15, 2016
"White House Cyber Commission May Endorse Security Ratings System for Software"    OSINT Jun 15, 2016
"Unit 8200: Israel’s cyber spy agency"    Veterans Today Jun 10, 2016
"A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet"    New York Times Jun 10, 2016
"U.S.-India cyber agreement puts more pressure on China"    FedScoop Jun 10, 2016
"Researchers Demo How To Build Nearly Invisible Backdoor In Computer Chips"    Information Week Jun 6, 2016
"The Long and Winding Road to US-India Cyber Cooperation"    The Wire Jun 6, 2016
"Chinese tech giant Huawei under U.S. investigation for North Korea ties"    UPI Jun 3, 2016
"There's a Stuxnet Copycat, and We Have No Idea Where It Came From"    Motherboard Jun 2, 2016
"China Gains Stealth Access to World's Hotels"    EIN Newsdesk Jun 2, 2016
"Federal Reserve was hacked more than 50 times in the past five years"    The Guardian Jun 1, 2016
"Critical flaws on HP, Dell, Acer, Asus and Lenovo laptops let hackers take over in 10 minutes"    International Business Times May 31, 2016
"Oil’s collapse puts secrets at risk"    San Antonio Express-News May 31, 2016
"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes"    McAfee May 31, 2016
"Hackers offering Microsoft Windows zero-day exploit for $90,000"    SC Magazine May 31, 2016
"This Map Locates Where Governments Hack Activists and Reporters"    TechWorm May 27, 2016
"List of data breaches and cyber attacks in May 2016"    IT Governance May 27, 2016
"A First Look at America’s Supergun"    Wall Street Journal May 26, 2016
"Samsung Electronics Hints at Counter-Suit Against China's Huawei"    KBS World Radio May 25, 2016
"China's Huawei files patent suits against Samsung Elec"    Reuters May 24, 2016
"Here's how the US military is beating hackers at their own game"    Tech Insider May 24, 2016
"U.S. targets spying threat on campus with proposed research clampdown"    Reuters May 20, 2016
"House defense bill elevates cyber force, defying White House"    The Hill May 19, 2016
"Foreign Hackers May Be Targeting US Presidential Candidates"    NextGov May 19, 2016
"Cyber's Hot, but Low-Tech Spies Are Still a Threat"    The National Interest May 18, 2016
"Here's How to End the Fog of Cyber War"    Scientific American May 18, 2016
"Hackers Target Think Tanks to Get a Peek at U.S. Government Strategy"    Bloomberg May 12, 2016
"Protecting America's Secret Sauce: The Defend Trade Secrets Act Signed Into Law"    Huffington Post May 11, 2016
"Obama signs trade secrets bill, allowing companies to sue "    USA Today May 11, 2016
"Data-hungry cyber hackers turn gaze to connected autos"    Financial Times May 11, 2016
"Shared Interests and Responsibility: The US and China Must Join to Promote a Rules-based Cyberspace"    World Post May 11, 2016
"US’s DARPA developing technology to identify and track hackers worldwide"    Techworm May 7, 2016
"World War Web: Are nation state attacks really on the rise?"    IT Pro May 6, 2016
"U.S. tech firms urge presidential candidates to embrace trade, high-tech visas"    Reuters May 5, 2016
"Romanian hacker Guccifer: I breached Clinton server, 'it was easy'"    Fox News May 4, 2016
"‘Guccifer’ claims he hacked Hillary Clinton’s ‘completely unsecured’ server"    Washington Times May 4, 2016
"Hacker 'Guccifer': I Got Inside Hillary Clinton's Server"    NBC News May 4, 2016
"Spy malware has been delivered through Office macros for a decade: Report"    IT World Canada May 4, 2016
"The Pentagon Wants to ‘Fingerprint’ the World’s Hackers"    Defense One May 4, 2016
"Election fraud feared as hackers target voter records"    The Hill May 2, 2016
"Sneak attack on bank-message system led to global breach"    Seattle Times Apr 30, 2016
"Tick Cyber-Espionage Group Targets Japanese Companies with Daserf Backdoors"    Softpedia Apr 29, 2016
"Analysis: Are US, Israel winning or losing newest cyber battles"    The Jerusalem Post Apr 28, 2016
"Analysis: Are US, Israel winning or losing newest cyber battles"    Jerusalem Post Apr 28, 2016
"US keeps China, India on intellectual property priority watch list"    Live Mint Apr 27, 2016
"U.S. Congress passes legislation to protect firms' trade secrets"    Reuters Apr 27, 2016
"MIT builds Artificial Intelligence system that can detect 85% of Cyber Attacks"    The Hacker News Apr 19, 2016
"Phineas Fisher's Account of How He Broke Into Hacking Team Servers"    Softpedia Apr 17, 2016
"German spy chiefs on Snowden: Leaks were Russian op to drive ‘wedge’ between US & Europe"    Russia Today Apr 16, 2016
"PowerShell Increasingly Being Used To Hide Malicious Activity"    InformationWeek Apr 15, 2016
"Shape-shifting and supremely tough malware is targeting the public sector"    PC Authority Apr 14, 2016
"Qbot Malware Morphs Quickly to Evade Detection"    Threatpost Apr 13, 2016
"Symantec Speaks on Latest Threat Trends"    Security Week Apr 12, 2016
"Be afraid, very afraid : New cybersecurity report"    are you hacker proof? Apr 12, 2016
"Nuclear employee sentenced for cyber attack"    IOL Apr 12, 2016
"Federal Defend Trade Secrets Act Clears the Senate: Is the Uniform Act on Life Support?"    Lexology Apr 11, 2016
"Prosecutors raid Panama Papers law firm Mossack Fonseca"    Financial Times Apr 11, 2016
"Researchers help shut down spam botnet that enslaved 4,000 Linux machines"    ARS Technica Apr 9, 2016
"Huawei, LeEco to commence local manufacturing in India"    International Business Times Apr 9, 2016
"Caught in the Matrix: Hillary, meet Marcel “Guccifer” Lazar"    Communities Digital News Apr 8, 2016
"US Serves up Cyber Justice Against Foreign Hackers"    Daily Signal Apr 8, 2016
"The next Cold War has already begun – in cyberspace"    Phys.Org Apr 7, 2016
"#Panamapapers: Mossack Fonseca was a Hack Waiting to Happen"    htxt.africa Apr 7, 2016
"Why the Panama Papers are a good thing for hackers – and the rest of us"    TNW Apr 6, 2016
"How a Federal Trade Secrets Law Would Impact Silicon Valley"    eWeek Apr 6, 2016
"Trustwave Case Highlights Cyber-Risk to Professional Service Providers"    JD Supra Apr 5, 2016
"U.S. Cyber Command should be combatant command, DoD's top cyber warrior says"    Military Times Apr 5, 2016
"Senate Passes Trade-Secrets Bill"    Wall Street Journal Apr 4, 2016
"How to Hack an Election"    Bloomberg Mar 31, 2016
"UK cops tell suspect to hand over crypto keys in US hacking case"    ARS Technica Mar 31, 2016
"Alexander Mining : Shares Soar After Being Awarded Patent In China"    4-Traders Mar 31, 2016
"The anatomy of a nation-state hack attack"    BBC News Mar 30, 2016
"Contra Costa Times editorial: U.S. right to use courts to pursue security threats"    Contra Costa Times Mar 25, 2016
"Justice Department indicts seven Iranians for campaign of cyberattacks "    Christian Science Monitor Mar 24, 2016
"New U.S. Customs Law Combats Counterfeiting"    TTI Mar 24, 2016
"White House Says Agencies Reported 77,200 Cyber Incidents In 2015"    Nextgov Mar 21, 2016
"Apple’s FBI Battle is Complicated. Here’s What’s Really Going On"    WIRED Mar 18, 2016
"Cyber war - bigger than ever - is here to stay"    Wahington Post Mar 18, 2016
"Business suffering 'industrial scale' cyber theft, warns GCHQ head"    The Telegraph Mar 18, 2016
"Stealing America's trade secrets"    Press Reader Mar 18, 2016
"Senate to Vote on Trade Secrets Bill"    Bloomberg Mar 17, 2016
"UK universities 'losing cyber security battle'"    Times Higher Education Mar 16, 2016
"The tech industry, according to Trump"    Venture Beat Mar 13, 2016
"Security Researchers Challenge Claims Data Breaches Increasing"    Cyber Parse Mar 13, 2016
"Going’s good in US-Asean relations... but Trump?"    The Star Online Mar 12, 2016
"Ofcom investigates former employee after data breach"    SC Magazine Mar 11, 2016
"Who Took The Cookies From The Cookie Jar?"    Information Week Mar 11, 2016
"RSA 2016: Future of cyber-espionage"    SC Magazine Mar 4, 2016
"Hackers targeting internet-connected systems to steal oil, expert warns"    The Guardian Mar 4, 2016
"Sea pirates ditch guns for computer hacking to plunder booty from cargo ships"    International Business Times Mar 3, 2016
"Intellectual Property Office : UK attachés export intellectual property expertise across the globe"    4 Traders Mar 2, 2016
"Windows 10 is Adding APT Protection. Here's Why That's A Big Deal"    Nextgov Mar 2, 2016
"Gentle Reminder at RSA: Hacking Back is a Bad Idea"    ThreatPost Mar 2, 2016
"Pentagon unleashes Fort Meade cyberwarriors on Islamic State"    Baltimore Sun Mar 1, 2016
"SSL 'DROWNs' In Yet Another Serious Security Flaw"    InformationWeek Mar 1, 2016
"What’s the Deal With Cyberwar?"    Slate Mar 1, 2016
"The 2016 Presidential Candidates' Views on Cyber Warfare"    Gizmodo Mar 1, 2016
"UC Berkeley breach: Universities increasingly targeted in cyberattacks"    Christian Science Monitor Feb 29, 2016
"Cyber War Against ISIL Hones Weapons Vs. Russia, China"    Breaking Defense Feb 29, 2016
"Commanders urge Pentagon to counter growing threat of cyber attacks on industrial controllers"    Flash Critic Feb 28, 2016
"Destructive Hacking Attacks Spread in Wake of Breaches at Sony: FireEye"    Gadgets 360 Feb 26, 2016
"Waging war in zeros and ones"    American Enterprise Institute Feb 26, 2016
"Treasury Fails To Name Any Cyber Worst Actors For Economic Sanctions"    The Daily Caller Feb 26, 2016
"Companies quicker to detect breaches, hackers more aggressive"    SC Magazine Feb 26, 2016
"Exclusive Inside Story on China’s Database of Americans"    China Watch Canada Feb 26, 2016
"Feds advise utilities to pull plug on Internet after Ukraine attack"    Washington Examiner Feb 25, 2016
"Cyber-crime set to hit most British companies in the next two years"    The Telegraph Feb 25, 2016
"The making of America's cyberweapons"    Christian Science Monitor Feb 24, 2016
"Interview: Eugene Kaspersky on saving the world from cyber attacks"    Gulf Business Feb 24, 2016
"Patent bills: too broad, too soon, too heavy-handed"    Washington Times Feb 23, 2016
"Embattled OPM CIO Steps Down"    Nextgov Feb 22, 2016
"Navy Wants to Unplug From Some Networks to Stay Ahead of Cyberattacks"    Military.com Feb 19, 2016
"CNN, ABC: Arrest in hacking case of high-ranking Obama admin officials"    HotAir Feb 12, 2016
"Sony attackers thought to be behind multiple large attacks"    InfoWorld Feb 12, 2016
"Ukraine Railway, Mining Company Attacked With BlackEnergy"    InformationWeek Feb 12, 2016
"US Industry IP Index Rates Nations"    IP Watch Feb 11, 2016
"Poseidon APT Group Identified as First Portuguese-Speaking Campaign"    ThreatPost Feb 9, 2016
"DNI: China Continues Cyber Espionage"    Washington Free Beacon Feb 9, 2016
"Extend NATO Cybersecurity To Asian-Pacific Allies"    Forbes Feb 9, 2016
"Small Websites Compromised by the Thousands, Scatter Angler and CryptoWall"    Heimdal Security Feb 9, 2016
"Hacking by China, Iran and North Korea set to increase dramatically over next 12 months"    International Business Times Feb 8, 2016
"The Former Federal Employee Who Tried To Launch A Cyberattack On Nuclear Scientists"    Nextgov Feb 6, 2016
"Global Threat Report 2016"    Crowdstrike Feb 5, 2016
"Agilent Files Intellectual Property Theft Lawsuit Against Twist Bioscience"    GenomeWeb Feb 5, 2016
"Operation Team Player' nets $39 million in fake sports merchandise"    ICE Feb 4, 2016
"Government software may have let in foreign spies"    The Hill Feb 2, 2016
"Former Nuclear Regulatory Commission Worker Pleads Guilty Over Attempted Hack"    Security Week Feb 2, 2016
"Federal Government Confirms That It Still Sucks at Cyber Security"    Re/Code Feb 2, 2016
"The Geography of a Hack: Where Are Your Cyber Villains Located?"    The Street Feb 1, 2016
"Hacking attacks on businesses up 38% in 2015, study shows"    Irish Times Feb 1, 2016
"DHS Chief Defends $6 Billion Federal Firewall After Stinging Audit"    Nextgov Feb 1, 2016
"The myth of ‘backdoor’ data access"    The Depaulia Jan 31, 2016
"UCOP Ordered Spyware Installed On UC Data Networks"    Remaking the University Jan 30, 2016
"NSA Hacker-In-Chief: No Need For Zero-Days To Hack You, Just Persistence And Focus"    Tech Times Jan 30, 2016
"Israel's Cyber Sector Blooms in the Desert"    Security Week Jan 30, 2016
"The first man charged of cyber terrorism has been extradited to the US"    Security Affairs Jan 30, 2016
"1st computer virus is written, January 30, 1982"    EDN Network Jan 30, 2016
"DHS $6 Billion Firewall May Not Be Effective In Keeping Hackers Out Of Government, Audit Says"    Nextgov Jan 28, 2016
"China has cyber capability to take down U.S. power grid, warns NSA"    Natural News Jan 27, 2016
"The Pentagon's plan to defend the power grid against hackers"    Christian Science Monitor Jan 25, 2016
"Here's How the Pentagon Plans to Protect Security Clearance Data"    Nextgov Jan 25, 2016
"Cybercriminals Making Computer Malware at a Record Rate: Researchers"    NBC Jan 25, 2016
"US faces technological 'peer competitors' in cyberspace, says USCYBERCOM"    Fierce Government IT Jan 25, 2016
"Canada Discovers It's Under Attack by Dozens of State-Sponsored Hackers"    Vice News Jan 25, 2016
"Countries starting to use non-state middlemen for cyber ops"    Jane's Jan 20, 2016
"The Industrial Internet of Things under attack"    IT Portal Jan 15, 2016
"Global Risk Report, how we are thinking about cyber dependence, cyber attack, data theft, cyber terrorism, cyber war, dark web, state sponsored attacks…"    Computer Business Review Jan 15, 2016
"The man on a mission to 'save the world' from cyber attacks"    ZAWYA Jan 15, 2016
"Cyber Security for the Power Grid-- Why We Should Fear Hackers"    CyberWire Jan 14, 2016
"NSA is world's best hacker thief, says former director"    CNN Money Jan 12, 2016
"FAC Publishes Cyber-Related Sanctions Regulations"    JD Supra Jan 11, 2016
"Fearful of Hacks, Pentagon Considers More Classified Programs"    Defense News Jan 9, 2016
"5 Reasons Why The Government Can’t Get a Grip on Cybersecurity"    Hurricane Labs Jan 7, 2016
"Project 'Gridstrike' Finds Substations To Hit For A US Power Grid Blackout"    InformationWeek Jan 7, 2016
"Lawmakers notch win in fight for global cyber laws"    The Hill Jan 3, 2016
"Cyber Crime"    The Cipher Brief Jan 3, 2016

2015

"White House finally acquiesces to Congress on cyber deterrence policy"    Federal News Radio Dec 29, 2015
"Former Boston Scientific engineer to be sentenced for stealing trade secrets"    Star Tribune Dec 29, 2015
"Largest U.S. electrical company battles to keep cyber attacks at bay"    Glitch News Dec 28, 2015
"The Highs and Lows of U.S. National Security in 2015: A Year-End Review"    Observer News Dec 28, 2015
"Tolkachev, Cold War Spycraft, and Modern Risks for China"    The Diplomat Dec 28, 2015
"Honeypot Trap Suggests NSA Monitoring Associated With Juniper Breach"    EMQ Tech Dec 23, 2015
"Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out."    Security Affairs Dec 22, 2015
"Juniper mysteries"    Politico Dec 22, 2015
"Cisco Starts Company-Wide Code Audit to Search for Hidden Backdoors"    Softpedia Dec 22, 2015
"Attackers are hunting for tampered Juniper firewalls"    IT World Dec 21, 2015
"AEP guarding the grid against online attacks"    Columbus Dispatch Dec 21, 2015
"Juniper faces questions about spying code planted in software"    ComputerWorld Dec 21, 2015
"Latest Hack May Open Doors For Hackers To Spy on US Government"    HackRead Dec 19, 2015
"Sneaky US Government Passes CISA Bill, Hidden Inside Generic Budget Bill"    Softpedia Dec 19, 2015
""Unauthorized code" in Juniper firewalls decrypts encrypted VPN traffic"    ARS Technica Dec 17, 2015
"China Tries to Sell its Views on Internet Controls"    VOA Dec 16, 2015
"Cyberespionage IP Theft May Soon Lead to Court"    Bloomberg Dec 16, 2015
"Enhancing Legal Defense of Trade Secrets"    Townhall.com Dec 16, 2015
"Pentagon Memo: U.S. Weapons Open to Cyberattacks"    Daily Beast Dec 16, 2015
"Cybersecurity Researchers Are Hunted from All Sides"    Motherboard Dec 14, 2015
"Cyber Espionage Is Reaching Crisis Levels"    Fortune Dec 12, 2015
"Microsoft, US senators want to grease wheels of trade secret theft cases"    The Register Dec 3, 2015
"Gates sparks multinational plan to spend billions on clean energy tech"    Stockhouse Nov 30, 2015
"Cyberspace squadrons and ops group bringing almost 300 jobs to ScottAFB"    Belleville News Nov 30, 2015
"DARPA wants early warning system for power-grid cyberattacks"    NetworkWorld Nov 24, 2015
"Canberra physicists working on 'unbreakable' cyber security systems"    ABC News (AU) Nov 24, 2015
"Presidential Hopeful John McAfee Talks Cybersecurity"    NBC News Nov 23, 2015
"Researchers Say the Juniper Hack Could be the Work of Government: But Which One?"    Fast Company Nov 23, 2015
"Pendulum swings to security"    The Hill Nov 22, 2015
"New Two Billion Dollar Strategic Intellectual Property Entertainment Fund Formed"    Music Industry News Network Nov 22, 2015
"Does Anyone Really Care about a Data Breach?"    PR Week Nov 20, 2015
"Chinese Firms’ U.S. Advantage"    PoliZette Nov 20, 2015
"Hackers a threat to defence: Xenophon"    MSN Nov 19, 2015
"A Decade of Data Breaches: Facts and Myths"    Baseline Nov 19, 2015
"The Second Mouse Gets the Cheese – The Innovator’s IP Dilemma"    IP Watchdog Nov 19, 2015
"And Now, A Cyber Arms Race Towards Critical Infrastructure Attacks "    InformationWeek Nov 19, 2015
"Cyber Attacks On US Companies Since November 2014 – Analysis"    Eurasia Review Nov 19, 2015
"Hacking group Strontium dogs NATO and government targets"    The Register Nov 18, 2015
"Microsoft Security Intelligence Report: Strontium"    Microsoft Nov 18, 2015
"Fighting talk from Great Britain as it says it will hit back against internet attacks"    We Live Security Nov 18, 2015
"The ‘other’ hacking groups working to bring down Islamic State"    News.Com (AU) Nov 18, 2015
"China Is Actually a Majority Shareholder of 33 Radio Stations Across the World"    The Liberty Web Nov 17, 2015
"Cyber Sections of the Latest G20 Leaders' Communiqué"    Lawfare Nov 17, 2015
"Security in 2016: The death of advanced persistent threats"    ZDNet Nov 17, 2015
"Opinion: Poisoning the Internet won't stop more Paris attacks"    Christian Science Monitor Nov 17, 2015
"Britain to build cyber attack forces to tackle IS, hackers"    Reuters Nov 17, 2015
"Restricting Encryption Would Not Have Prevented the Paris Attacks"    Defense One Nov 17, 2015
"What Donald Trump Wrote About Chinese-Sponsored Hackers Who Launched Cyber Attacks On U.S. Companies"    Forbes Nov 17, 2015
"$21mn contract to protect Chinese hacking victims broke gov’t rules, IG memo finds"    Russia Today Nov 17, 2015
"Cyber Warfare: How The UK Could Come To A Halt In Three Days"    Forces TV Nov 17, 2015
"The world’s richest countries agree that hacking industrial targets for profit isn’t right "    The Verge Nov 17, 2015
"U.S. federal agencies refuse to testify about OPM hack"    Reuters Nov 17, 2015
"World’s richest nations agree hacking for commercial benefit is off-limits"    Washington Post Nov 16, 2015
"75% of Companies Are Insider Threat Victims"    InfoSecurity Nov 16, 2015
"Anonymous Declares Cyber War on ISIS. Why It Matters"    Fortune Nov 16, 2015
"How Islamic State Teaches Tech Savvy to Evade Detection"    Wall Street Journal Nov 16, 2015
"Cyber Attacks on U.S. Companies Since November 2014"    Heritage Foundation Nov 16, 2015
"Lawmakers Demand US Military Carry Out Pretend Cyber War Against China, Russia"    Defense One Nov 14, 2015
"Cyber and real war come together in the Ukraine"    SC Magazine Nov 11, 2015
"No surprise here: Adobe's Flash is a hacker's favorite target"    CSO Online Nov 9, 2015
"A third of employees would sell their firms’ intellectual property ‘for the right price’"    Business Reporter Nov 9, 2015
"10 reasons why phishing attacks are nastier than ever"    CSO Online Nov 9, 2015
"Opinion: Will TPP undermine the global Internet? Read this before you decide"    Christian Science Monitor Nov 5, 2015
"Pacific trade deal takes aim at Chinese hacking"    Financial Times Nov 4, 2015
"December date set for first China-US cyber meetings"    The Hill Nov 4, 2015
"Constructing a Cyber Superpower"    BizMonthly Nov 3, 2015
"U.S. grapples with controlling 'cyber-munitions' while recruiting 6,000 new cyber-warriors"    TechRepublic Nov 3, 2015
"U.S. firms to pay $13 million to settle claim they paid Russians for security work"    Washington Post Nov 2, 2015
"White House unveils plan to fight hackers"    The Hill Nov 2, 2015
"Where Is America’s Cyber Defense Plan?"    Matthew Aid Oct 31, 2015
"Modernizing Federal Cybersecurity"    U.S. Chief Information Officer Oct 30, 2015
"Cybersecurity Strategy and Implementation Plan (CSIP) for the Federal Civilian Government"    Executive Office of the President, Office of Management and Budget Oct 30, 2015
"A 'Cyber Party' with John McAfee and the White House Cybersecurity Czar"    Cybersecurity Podcast Oct 30, 2015
"Invincea CEO on CISA"    Invincea Oct 30, 2015
"Cybersecurity Deal Between China And Germany In The Works: Report"    International Business Times Oct 30, 2015
"John McAfee: CISA will not stop a single important hack, let alone cyberterrorism"    International Business Times Oct 29, 2015
"Will AI Be Smart Enough To Protect Us From Online Threats?"    TechCrunch Oct 29, 2015
"Cybercrime has replaced nuclear war as the global threat"    Irish Examiner Oct 29, 2015
"On Cyberdefense, China and North Korea Are Said to Be Poorly Prepared"    Wall Street Journal Oct 28, 2015
"How Hackers Can Hack The Oil & Gas Industry Via ERP Systems"    InformationWeek Oct 28, 2015
"South Korean manufacturing industry targeted with new backdoor program"    ComputerWorld Oct 27, 2015
"Senate passes first major cyber bill in years"    The Hill Oct 27, 2015
"Duuzer back door Trojan targets South Korea to take over computers"    Symantec Oct 26, 2015
"Washington Post: Time to move on cybersecurity"    Salt Lake Tribune Oct 26, 2015
"Chattering Wi-Fi devices are a short hop away from the crown jewels of your network"    Graham Cluley Oct 23, 2015
"Space age perils: hackers find a new battleground on the final frontier"    Reuters Oct 22, 2015
"America Isn't Cyber Superior -- We Need A Strategy To Stop Playing Catch-Up"    Forbes Oct 19, 2015
"America Isn't Cyber Superior -- We Need A Strategy To Stop Playing Catch-Up"    Forbes Oct 19, 2015
"Why news organizations are such a juicy target for hackers"    The Washington Post Oct 16, 2015
"Cybersecurity Expert: Be Afraid, America. Be Very Afraid."    Daily Beast Oct 14, 2015
"Big issues facing the Internet: Economic espionage"    Brookings Institute Oct 14, 2015
"Online Attacks on Infrastructure Are Increasing at a Worrying Pace"    New York Times Oct 14, 2015
"Lawmakers push to protect trade secrets from Chinese hackers"    The Hill Oct 9, 2015
"Pentagon: Human-thinking machines are the answer to cyberthreats"    Washington Examiner Oct 9, 2015
"Economic Espionage: The Myth That 'We Have Nothing of Interest'"    Security Intelligence Oct 9, 2015
"U.S. Justice Department Creates Office to Combat Cyberattacks"    Government Technology Oct 7, 2015
"Drone phone poses as printer to hack from the air"    SC Magazine Oct 6, 2015
"Trade deal could curb cyber theft, advocates say"    The Hill Oct 5, 2015
"Pull Up Your Socks – The TPP Is Done"    IP Watch Oct 5, 2015
"Department of Justice plans to crack down on counterfeits sold online"    Engadget Oct 5, 2015
"Justice Dept. Announces New Strategy to Combat Intellectual Property Crimes"    Sky Valley Chronicle Oct 3, 2015
"The Evolution Of Malware"    InformationWeek Oct 2, 2015
"Corebot cleverly written botnet malware with growth potential"    CSO Sep 16, 2015
"Hackers seize control of Cisco routers in four countries"    Consumer Affairs Sep 15, 2015
"Report: Secret Service, ICE vulnerable to 'clickjacking'"    Washington Examiner Sep 15, 2015
"The new art of war: How trolls, hackers and spies are rewriting the rules of conflict"    Tech Republic Sep 15, 2015
"Cisco router break-ins bypass cyber defences"    The Express Tribune Sep 15, 2015
"Jihadist cyber-attack on Cabinet was entirely avoidable, say experts"    SC Magazine Sep 15, 2015
"Kremlin says hackers attacked Putin website"    Reuters Sep 14, 2015
"USA, China find common cyber-enemy within"    The Register Sep 14, 2015
"New cyber threat center to hit initial stride in October"    Federal News Radio Sep 14, 2015
"Bangladesh launches drive against pirated software of Microsoft"    Dhaka Tribune Sep 13, 2015
"Intel chiefs draw distinction between digital espionage and malicious hacks"    Christian Science Monitor Sep 11, 2015
"Chinese and Russian Cyber Espionage: The Kaiser Would Be Jealous"    War on the Rocks Sep 11, 2015
"Russia, China, North Korea and Iran remain top US cyber concerns"    V3.CO.UK Sep 11, 2015
"U.S. urged to tighten cyber security to counter Chinese hacking"    Reuters Sep 10, 2015
"Spy Chief Warns About Hackers Disrupting Financial Markets"    Bloomberg Sep 10, 2015
"MIT, Cambridge, Other Universities Get D's In Internet Security"    Information Week Sep 10, 2015
"Moscow, Beijing to Increase Cooperation in Counterfeit Fight"    EIN News Sep 9, 2015
"Cyber Espionage to Splinter Internet Governance"    Stratfor Sep 9, 2015
"Energy Dept. hacked 150 times in 4 years"    The Hill Sep 9, 2015
"Cyber War: a guide to state-sponsored digital assaults"    Catch News Sep 7, 2015
"Apple and Other Tech Companies Tangle With U.S. Over Data Access"    New York Times Sep 7, 2015
"Lincoln, labor and intellectual property rights"    Washington Examiner Sep 7, 2015
"How The Rules Of Cyber Engagement Have Changed"    TechCrunch Sep 6, 2015
"Crime and Espionage Becoming Tangled Online"    Voice of America Sep 5, 2015
"Cyber security: A thorn in US-China relations"    GB Times Sep 4, 2015
"Cyber Sanctions and Breach Impacts "    National Cybersecurity Institute Sep 3, 2015
"Singapore: Asia’s new intellectual property hub?"    Blouin beat Business Sep 2, 2015
"Russia and China Use Data Received From Hackers to ID U.S. Spies"    New American Sep 1, 2015
"Russia, China Pounce on U.S. Hacked Data"    WorldNetDaily Sep 1, 2015
"Exclusive: U.S. weighs sanctioning Russia as well as China in cyber attacks"    Reuters Sep 1, 2015
"Why Israel dominates in cyber security"    Fortune Sep 1, 2015
"We're At Cyberwar: A Global Guide To Nation-State Digital Attacks"    Wired Sep 1, 2015
"The 20 Most Infamous Cyberattacks of the 21st Century (Part II)"    MIT Technology Review Aug 27, 2015
"Latest Update on Federal Trade Secrets Legislation"    JD Supra Aug 27, 2015
"Kaspersky catches the phishes"    IT Wire Aug 27, 2015
"Latest Update on Federal Trade Secrets Legislation"    Trading Secrets Aug 26, 2015
"Phishing is a $3.7-million annual cost for average large company"    CSO Magazine Aug 26, 2015
"Opinion: How digital voyeurism is destroying privacy"    Christian Science Monitor Aug 26, 2015
"Anatomy of an attack: deploying military tactics against a retailer"    Third Certainty Aug 26, 2015
"The 20 Most Infamous Cyberattacks of the 21st Century (Part I)"    MIT Technology Review Aug 25, 2015
"Wyndham Must Face Hacker Suit as Court Upholds FTC Power"    Bloomberg Aug 24, 2015
"Money, bureaucracy and weed: Why the feds are failing at cyber"    The Hill Aug 24, 2015
"Court Says The FTC Can Slap Companies For Getting Hacked"    Wired Aug 24, 2015
"Fiorina: Make cyber warfare 'very painful' for China"    The Hill Aug 24, 2015
"Impact of Economically Weaker China on Cyber Spying"    Data Breach Aug 24, 2015
"Developing a Proportionate Response to a Cyber Incident"    Council on Foreign Relations Aug 23, 2015
"No Blood Shed but the War is Dangerous: US and China in Cyber Conflict"    IndraStra Aug 23, 2015
"How to Combat the Global Cybercrime Wave"    Brink Aug 18, 2015
"Adobe settles hacking case that affected 38 million people and pays $1.2m legal bill"    V3.CO.UK Aug 17, 2015
"Michigan's battalion of digital defenders raises bar for states' cybersecurity"    Christian Science Monitor Aug 17, 2015
"64% of Organizations are Potential Targets for Nation-State Cyberattacks, says Survey"    Tripwire Aug 17, 2015
"IRS says cyberattacks more extensive than previously thought"    Reuters Aug 17, 2015
"A Veil of Secrecy Aids Surge in Cyber-Attacks in Asia"    Slinking Toward Retirement Aug 16, 2015
"How China has cyber-stumped the US and why Israel could be next"    The Jerusalem Post Aug 14, 2015
"Department of Homeland Security reveals top sector at risk for cyber attacks"    Insurance Business America Aug 14, 2015
"Russian, Chinese hackers use nearly identical tactics on US"    The Hill Aug 13, 2015
"CAUGHT: Lenovo crams unremovable crapware into Windows laptops – by hiding it in the BIOS"    The Register Aug 12, 2015
"Here’s Why People Are Furious About Lenovo Laptops Right Now"    Time Magazine Aug 12, 2015
"Kerry Says China and Russia 'Very Likely' Reading His Emails"    Security Week Aug 12, 2015
"The Most Hacker-Active Countries – Part 2"    InfoSec Institute Aug 12, 2015
"Hackers stole secrets for up to $100 million insider-trading profit: U.S"    Reuters Aug 11, 2015
"Yes, YOU will be Hacked"    AirInsight Aug 11, 2015
"Hacker Cracks Satellite Communications Network"    Defense One Aug 6, 2015
"Symantec exposes Butterfly hacking group for corporate espionage"    Tech Republic Aug 6, 2015
"Filer Beware! E-Filing Error Can Destroy Trade Secret Status"    Mondaq Aug 5, 2015
"Pentagon Hack ‘Most Sophisticated’ Ever"    The Daily Beast Aug 5, 2015
"Is CISA gift-wrapped for hackers and nation-state actors?"    The Hill Aug 3, 2015
"Beware of UAE markets: Hackers target companies to fib stock prices"    Albawaba Aug 2, 2015
"Super spy 'Edward Snowden wannabe' sentenced to federal prison"    Examiner Aug 1, 2015
"Watch out: A dangerous Windows 10 scam is being circulated online"    Giz Burn Aug 1, 2015
"Pentagon seeks cyberweapons strong enough to deter attacks"    Chicago Tribune Jul 31, 2015
"Chris Hadnagy on the Def Con hackers posing as your coworkers"    Christian Science Monitor Jul 31, 2015
"Former national security officials: The fear over ubiquitous data encryption is overblown"    Business Insider Jul 30, 2015
"Cyber criminals targeting unwary businesses - report"    Startup Smart Jul 30, 2015
"Australia is facing a barrage of daily cyber espionage activity"    Rapid News Network Jul 30, 2015
"Cyber insecurity: Hacking back"    Financial Times Jul 30, 2015
"Washington: Pentagon takes computer system offline"    IBN Live Jul 29, 2015
"How hackers can take over nuclear power plants"    The Daily Dot Jul 29, 2015
"Phishing Attacks Drive Spike In DNS Threat"    InformationWeek Jul 27, 2015
"A data security guy's musings on the OPM data breach train wreck"    Help Net Security Jul 27, 2015
"Flash back, Flash forward"    Christian Science Monitor Jul 24, 2015
"Opinion: Why the US government must lose cryptowars 2.0"    Christian Science Monitor Jul 23, 2015
"Catch Me If You Can: How APT Actors Are Moving Through Your Environment Unnoticed"    Trend Micro Jul 23, 2015
"How the US Is Trying to Shape Norms in Cyberspace"    The Diplomat Jul 23, 2015
"After hack, U.S. lawmakers look to protect 'dot-gov' domain"    Reuters Jul 22, 2015
"Is the Ashley Madison data breach worse than other data breaches?"    AVAST Jul 21, 2015
"As Nations Hack Each Other, Protecting Personal Information Must Become National Security Priority"    Forbes Jul 21, 2015
"U.S. vs. Hackers: Still Lopsided Despite Years of Warnings and a Recent Push"    New York Times Jul 18, 2015
"Just get rid of Java finally"    CSO Online Jul 17, 2015
"Ex-employees probed in attack on Italian cybersecurity firm"    Reuters Jul 17, 2015
"Google expanding security feature that prevents malware installs"    ZDNet Jul 16, 2015
"The Weakest Link in the Supply Chain: Beware of Third Party Hacks"    Comilion Jul 16, 2015
"4 Lasting Impacts Of The Hacking Team Leaks"    Information Week Jul 15, 2015
"Welcome to the Electronic Age of the Spy: Internet is Making it Easier to Steal and Trade information."    Matthew Waid Jul 15, 2015
"“International Cyber Stability” and the UN Group of Governmental Experts"    Critical Infrastructure Daily Jul 15, 2015
"US probe of Darkode reached into Canada"    Cambridge Times Jul 15, 2015
"Hacking Forum Darkode Dismantled in Multi-Nation Operation"    Security Week Jul 15, 2015
"U.S. says computer hacking forum Darkode dismantled, 12 charged"    Reuters Jul 15, 2015
"NYSE Outage May Have Been A Cyber Attack: John McAfee"    Value Walk Jul 14, 2015
"Pay attention to cyber security"    Daily Record Jul 14, 2015
"Three UK politicians hacked while using open WiFi networks"    Digital Munition Jul 12, 2015
"Creepy cyber coincidence? Probably not"    PBS News Jul 9, 2015
"The Great Wall St. hack mystery"    Silicon Angle Jul 9, 2015
"These Are The Hacker Groups Everyone’s Watching Right Now"    The Daily Caller Jul 9, 2015
"Hackers of Apple, Facebook seen as independent group seeking money: Report"    FirstPost Jul 9, 2015
"U.S. and China Collaborate on Global Supply Chain Security"    Amber Road Jul 9, 2015
"Morpho, the financially motivated espionage target giant firms"    Security Affairs Jul 9, 2015
"To Prevent Cyberattacks, Share the Threat Data"    Wall Street Journal Jul 9, 2015
"Day of ‘technical’ glitches puts lawmakers on edge"    The Hill Jul 8, 2015
"Hackers Could Be Probing Stock Exchange Network, Says Cybersecurity Firm"    Epoch Times Jul 8, 2015
"Symantec Report Suggests Hackers’ Motives Are Blurring"    New York Times Jul 8, 2015
"Hackers of Apple, Facebook seen as independent group seeking money"    GMA News Jul 8, 2015
"Meet the hackers who break into Microsoft and Apple to steal insider info"    ARS Technica Jul 8, 2015
"Duqu 2.0: New, menacing programming concept"    Homeland Security News Wire Jul 2, 2015
"Harvard Reveals It Had An IT Breach In June Impacting 8 Colleges And Administrations"    TechCrunch Jul 2, 2015
"Team GhostShell hacktivists dump data from US universities and hundreds of sites"    Computerworld Jul 1, 2015
"A Critical Threat"    SC Magazine Jul 1, 2015
"Defense cyber strategy: We can and will hit back"    C4ISR & Networks Jul 1, 2015
"Spies Warned Feds About OPM Mega-Hack Danger"    The Daily Beast Jun 30, 2015
"America's cyber sentinel asleep on guard duty"    CNN Jun 30, 2015
"Constructing a Cyber Superpower"    Defense News Jun 29, 2015
"6 reasons why there will be another OPM-style hack"    Computerworld Jun 29, 2015
"The OPM Breach: Timeline of a Hack"    Tripwire Jun 29, 2015
"Top Secret Anti-Hacking Unit Foiled Attack On Nato Summit"    Sun Nation Jun 27, 2015
"Anesthetized by Data Breaches"    Invincea Jun 26, 2015
"The high cost of cyber-espionage"    Washington Times Jun 25, 2015
"How Fortune got inside the Sony hack"    Fortune Jun 25, 2015
"The new Cold War: how Russia and China are hacking British companies and spying on their employees"    The Telegraph (UK) Jun 25, 2015
"GEOINT 2015: Intel chief wants decisive cyber response"    C4ISR & Network Jun 25, 2015
"Why Cyber War Is Dangerous for Democracies"    The Atlantic Jun 25, 2015
"China, US agree to establish cyber code of conduct"    ZD Net Jun 25, 2015
"FIN4 hacking group English speakers with banking sector ties"    V3.CO.UK Jun 25, 2015
"Exclusive: SEC hunts hackers who stole corporate emails to trade stocks"    Reuters Jun 24, 2015
"Hackers target Polish airline LOT, ground 1,400 passengers"    Business Insider Jun 21, 2015
"Hunt for Deep Panda intensifies in trenches of U.S.-China cyberwar"    Reuters Jun 21, 2015
"EMC Is Caught in the Crosshairs of a Cyberwar That Never Ends"    Bloomberg Jun 19, 2015
"The US defense industry is reeling after the latest massive cyber attack"    Business Iinsider Jun 18, 2015
"MI6 Agents Have Been Identified From Snowden Files, Report"    Mathew Aid Jun 14, 2015
"Britain moves spies as Russia cracks Snowden files"    Raidió Teilifís Éireann Jun 14, 2015
"Cyber expert: People are missing the real question we should ask about Israel spying on Iran talks"    Business Insider Jun 11, 2015
"RAND study: Cyber-defense must change course, or else"    ZD Net Jun 10, 2015
"The Defender's Dilemma Charting a Course Toward Cybersecurity [PDF]"    RAND Corp. Jun 10, 2015
"Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border"    New York Times Jun 4, 2015
"NSA's secret hunt for hackers: How widespread? (+video)"    Christian Science Monitor Jun 4, 2015
"America’s Passive-Aggressive Cyber Stance"    The CyberSecurity Place Jun 4, 2015
"US-Japan cyber cooperation comes to life"    Asian Review Jun 4, 2015
"A quarter of small businesses had their IP infringed in last five years"    Elite Business Jun 3, 2015
"Protecting ideas and inventions 'too costly' and 'complex' for small firms"    The Telegraph Jun 3, 2015
"The ‘Innovation Act’ exposes American companies to foreign spies"    The Hill Jun 2, 2015
"Businesses See 106 Unknown Malware Attacks Per Hour"    Info Security Magazine Jun 2, 2015
"Getting the Word Out About Fake Tech Support Scams"    Blue Coat Labs Jun 1, 2015
"Cyber Attacks rising from the ashes of Communism"    CSO Magazine Jun 1, 2015
"Recent Intellectual Property Lawsuit Reveals the Serious Nature of Insider Threats"    IT Business Edge Jun 1, 2015
"Net of Insecurity: The Long Like of a Quick 'Fix'"    Washington Post May 31, 2015
"Net of Insecurity: A flaw in the design"    Washington Post May 30, 2015
"State-Sponsored Cybercrime: A Growing Business Threat"    InformationWeek May 26, 2015
"More bad news: The bad guys are getting better"    GCN May 22, 2015
"Cyber Threat Analysis: A Call for Clarity"    InformationWeek May 22, 2015
"Unknown Hackers Hit Systems at Bundestag"    Cyber Defense Magazine May 21, 2015
"'Black Cloud' darkens the enterprise to all but authorized devices"    GCN May 20, 2015
"FireEye has become go-to company for breaches"    USA Today May 20, 2015
"Hackers cause major data breach for Telstra's Pacnet"    Mashable May 20, 2015
"Hackers Exposed Government Data in Breach of Telstra's Pacnet"    Bloomberg May 20, 2015
"Cyber attacks against govt expose fatal cracks in Pakistan's digital fence"    Dawn May 19, 2015
"Hackers just did something VERY scary"    Komando May 19, 2015
"Login system supplies fake passwords to hackers"    PC World May 19, 2015
"Why The Cybersecurity Domino Effect Matters"    Forbes May 18, 2015
"Venom, Chinese attacks and DeputyDog: What we learned in security this week"    V3.co.uk May 15, 2015
"Report warns ports, maritime industry at high risk for cyber attacks"    MyNorthwest May 13, 2015
"The State Department's Weary Soldier in America's Cyber War"    Foreign Policy May 13, 2015
"Russia - China Put Up United Front Against US With Cyber Treaty"    Russia Insider May 12, 2015
"Russia and China Pledge to Fight Together for Cyber Security"    Cloudtweaks May 12, 2015
"Fortune 500 businesses could collapse under cybercrime threat, security firm warns"    Australian Financial Review May 11, 2015
"Russia, China May Sign Information Security Cooperation Deal on May 8"    Sputnik International May 7, 2015
"Shamed Germany severs US spy links after they were accused of jointly spying on European governments and companies"    Daily Mail (UK) May 7, 2015
"Rombertik is a Bizarre, Scary Brilliant Piece of Self-Destructing Malware"    Daily Tech May 6, 2015
"The impossible task of counting up the world's cyber armies"    ZD Net May 6, 2015
"How Airbus Built a Security System to Protect Itself from IP Theft - that German and US Intelligence Undermined"    DCL Search May 6, 2015
"Breaches prompt lobbying surge behind cyber bill"    The Hill May 5, 2015
"Rombertik Malware Can Overwrite MBR If Audited"    ThreatPost May 4, 2015
"Super secretive malware wipes hard drive to prevent analysis"    ArsTechnica May 4, 2015
"Executive Order Authorizes Sanctions against Cybercriminals"    WeComply May 4, 2015
"The cyber gold rush"    Christian Science Monitor May 3, 2015
"India, Japan vow to crack down on cyber crimes"    Times of India May 3, 2015
"Air traffic system replaced amid hacking worries"    The Hill May 2, 2015
"Why hackers target background investigation databases"    Security Affairs May 1, 2015
"VA reaching breaking point as malware attacks rise"    Federal Times Apr 30, 2015
"Colleges in a cyber war with hackers; open networks vulnerable to attacks"    NorthJersey Apr 29, 2015
"No monkeys for CozyDuke"    Kaspersky Lab Apr 28, 2015
"Thin Clients & Persistent Threats: Coping With The New Cyber Dangers"    Breaking Defense Apr 28, 2015
"6 Ways to Protect U.S. Grid from Cyber Attacks"    Wall Street Journal Apr 28, 2015
"We are not prepared for a cyber attack on Western energy infrastructure"    Security Affairs Apr 27, 2015
"Will Xbox Hacker Sentence Deter Others?"    Data Breach Apr 27, 2015
"CozyDuke's rampaging 'funny monkeys' prove no one is immune to phishing"    V3.CO.UK Apr 27, 2015
"Hacker Implants NFC Chip In His Hand To Bypass Security Scans And Exploit Android Phones"    Forbes Apr 27, 2015
"NSA veteran chief fears crippling cyber-attack on Western energy infrastructure"    The Telegraph (UK) Apr 26, 2015
"Official: US Readying Hacking-Related Sanctions"    ABC News Apr 25, 2015
"Men in black – NATO's cybermen"    NATO Apr 24, 2015
"What's new in the U.S. cyber strategy"    Washington Post Apr 24, 2015
"Apple wins patent appeal in China"    NMFMP Blog Apr 24, 2015
"At cybersecurity gathering, the White House steps up charm offensive"    Christian Science Monitor Apr 24, 2015
"Here's why the Pentagon is publishing its cyber-warfare rulebook"    The Register Apr 24, 2015
"Official: State Department Hit By Hackers 'Thousands of Times a Day'"    Washington Free Beacon Apr 23, 2015
"Pentagon Announces New Strategy for Cyberwarfare"    New York Times Apr 23, 2015
"Pentagon cybersecurity strategy comes with olive branch to Silicon Valley"    Christian Science Monitor Apr 23, 2015
"Pentagon Responds to Russian Hacker Breach by 'Showing a Little Leg'"    VICE Apr 23, 2015
"Pentagon: Cyberwarfare a viable option in conflicts with enemies"    CBS News Apr 23, 2015
"RSA 2015: Panelists debate a way forward for matters of cyber conflict"    SC Magazine Apr 23, 2015
"The new German spying scandal is a big deal"    Washington Post Apr 23, 2015
"Foreign hacker sentenced for first time ever in US"    Delaware Online Apr 23, 2015
"Why U.S. Grid Still Vulnerable to Cyber Attack"    Deloitte CIO Journal Apr 22, 2015
"RSA President Amit Yoran offers up a five-point plan to deal with the new security environment"    NetworkWorld Apr 21, 2015
"Smart City Technology May Be Vulnerable to Hackers"    New York Times Apr 21, 2015
"Snowden revelations just gave China more ammunition against US hacking"    Democratic Underground Apr 21, 2015
"Feds Warn Airlines To Look Out For Passengers Hacking Jets"    Wired Apr 21, 2015
"Hacker's Tweet Reignites Ugly Battle Over Security Holes"    Wired Apr 21, 2015
"Snowden revelations just gave China more ammunition against US hacking"    Business Insider Apr 20, 2015
"Internet Security Threat Report"    Symantec Apr 20, 2015
"Future of U.S. Cybersecurity In the Hands of U.S. Congress, Many of Whose Members Don't Know How to Use Email"    Matthew Aid Apr 19, 2015
"The Pentagon's new cyber attack plan: 'Blunt force trauma'"    POLITICO Apr 18, 2015
"Hackers have 'begun targeting nuclear power plants,' cyber warfare expert warns"    Jerusalem Post Apr 16, 2015
"ICE, CBP hosts intellectual property rights training in Kuwait"    U.S. ICE Apr 16, 2015
"Verizon Releases 2015 Data Breach Investigation Report"    SurfWatch Apr 15, 2015
"Why Standardized Threat Data Will Help Stop the Next Big Breach"    Information Week Apr 15, 2015
"2015 Data Breach Investigation Report"    Verizon Apr 15, 2015
"Disneyland IP to be protected"    Shanghai.Gov Apr 15, 2015
"The Wolves of Vuln Street - The First System Dynamics Model of the 0day Market"    HackerOne Apr 14, 2015
"'APT-On-APT' Action"    Information Week Apr 14, 2015
"Caught in the Crossfire: The Business Impact of Cyberwar and High Tech Espionage"    Tripwire Apr 14, 2015
"Japan - Record-Breaking Trade Secret Cases"    Conventus Law Apr 13, 2015
"Thousands could launch Sony-style cyberattack, says ex-hacker"    CNet Apr 12, 2015
"Will China and America Clash in Cyberspace?"    The National Interest Apr 12, 2015
"LETTER: It's time to 'get serious' about theft of intellectual property"    Sioux City Journal Apr 12, 2015
"Hacking Critical Infrastructure is Accelerating and More Destructive"    Gov Tech Apr 11, 2015
"Qubits Haven: Quantum Broadband Breakthrough to Give Hackers Many a Sleepless Night"    World Industrial Reporter Apr 10, 2015
"The 'Great Cannon' is Chinas Powerful New Hacking Weapon"    Motherboard Apr 10, 2015
"Another Reason For Ubiquitous Web Encryption: To Neuter China's 'Great Cannon'"    Forbes Apr 10, 2015
"Cyber Security of Critical Infrastructures in the Americas"    Trend Micro Apr 10, 2015
"Global Tensions Increase Cyber Threat"    Financial Times Apr 9, 2015
"'Digital Oilfield' Vulnerable to Cyber Threats"    Brink News Apr 7, 2015
"Many big companies are still vulnerable to the biggest computer bug ever discovered, report says"    InstaMun Apr 7, 2015
"National Security Council Advisor Urges US-China Cybersecurity Cooperation"    Dark Matters Apr 6, 2015
"Promoting Norms for Cyberspace"    Council on Foreign Relations Apr 6, 2015
"Trade secrets and national security"    CSTV Univ. Waterloo Apr 6, 2015
"U.S. Seizure of Jewelry, Watches by Value Drops 25% to $375M"    Rapaport Apr 6, 2015
"Why it's so hard to create norms in cyberspace"    Washington Post Apr 6, 2015
"Former Cyber-Security Czar Says Network Perimeter Defenses Don't Work"    eWeek Apr 6, 2015
"Obama Draws Cyber Line in Sand"    TechNewsWorld Apr 2, 2015
"Watch Out Would-Be Hackers! The United States Is Playing Cyber Hard Ball"    The Diplomat Apr 2, 2015
"Arrested hacker pleads guilty to $100 million theft of Microsoft, Valve, U.S. Army data"    Digital Munition Apr 2, 2015
"Google, Firefox will pop up warnings to indicate exposure to hackers if users visit the Chinese sites"    Techworm Apr 2, 2015
"New Obama Order Allows Sanctions Against Foreign Hackers"    Wired Apr 1, 2015
"New Obama Order Allows Sanctions Against Foreign Hackers"    Wired Apr 1, 2015
"Obama Declares Hacking a 'National Emergency'"    Motherboard Apr 1, 2015
"Obama Emergency Cyber Sanctions 'Another Salvo In War On Legitimate Hackers'"    Forbes Apr 1, 2015
"Obama targets foreign hackers and state-owned companies over cyber-attacks"    The Guardian Apr 1, 2015
"Opinion: Sanctions may be Obama's best idea yet to battle cyberattacks"    Christian Science Monitor Apr 1, 2015
"The Obama administration just opened a new 'weaponization of finance' front"    Business Insider Apr 1, 2015
"U.S. establishes sanctions program to combat cyberattacks, cyberspying"    Washington Post Apr 1, 2015
"U.S. targets overseas cyber attackers with sanctions program"    Reuters Apr 1, 2015
"War on Hackers: a Clear and Present Danger"    Errata Security Apr 1, 2015
"Are Hackers Threatening to Punch America's Lights Out?"    Investment U Apr 1, 2015
"Influencers: Companies should not be allowed to hack back"    Christian Science Monitor Apr 1, 2015
"Taiwan: A Useful Ally Against China's Cyber Warriors?"    The Diplomat Mar 31, 2015
"Hackers attack the energy industry with malware designed for snooping"    Fortune Mar 31, 2015
"The Pentagon is building an app store for cyberoperations"    Christian Science Monitor Mar 29, 2015
"DARPA Launches 'Plan X' to Defeat Chinese and Russian Hackers"    China Topix Mar 29, 2015
"Many computers vulnerable to BIOS leak (HP and DELL are included)"    CyberWarZone Mar 23, 2015
"The US has started to put bounties on the heads of hackers"    Business insider Mar 23, 2015
"Cyber War and Cyber Profits"    Money & Markets Mar 23, 2015
"Defence Ministry Warns of Espionage Attempts by China, Pakistan; Sounds Red Alert"    International business Times Mar 23, 2015
"Hackers Have Found a Way to Get into Nearly Every Computer"    BullFax Mar 23, 2015
"Everything is insecure and will be forever says Cisco CTO"    The Register Mar 22, 2015
"Gone in 60 seconds: Chinese hackers shut down Adobe Flash, Internet Explorer ... but only for top hackathon"    South China Morning Post Mar 21, 2015
"No Browser is safe : Chrome, Firefox, Internet Explorer, Safari all hacked at Pwn2Own contest"    TechWorm Mar 20, 2015
"Future Crimes -- A Guide To Tech Threats From Hackers, China, Google And Facebook"    Forbes Mar 20, 2015
"Major US health insurer hacked, affecting 11 million"    Business Standard Mar 18, 2015
"Authorities Closing In on Hackers Who Stole Data From JPMorgan Chase"    New York Times Mar 15, 2015
"Cybersecurity firms hunt foreign spies"    ABS-CBN News Mar 15, 2015
"Website Hackers Slip Under The Radar With Impersonator Bots"    TechCrunch Mar 14, 2015
"Politics intrude as cybersecurity firms hunt foreign spies"    Reuters Mar 12, 2015
"Equation Group is NSA in Disguise New evidence by Kaspersky researchers suggests"    TechWorm Mar 12, 2015
"Banks warned to stay out of politics as state-sponsored cyber-attacks get personal"    OTC Space Mar 11, 2015
"Pentagon to hire 3000 hackers"    IT News Mar 9, 2015
"Justice Dept. vows to strike harder against hackers, nations behind cyberattacks"    Christian Science Monitor Mar 9, 2015
"Millions at risk from 'Freak' encryption bug"    ITP Mar 8, 2015
"Animals in the APT Farm"    SecureList Mar 6, 2015
"One Way to Counter Chinese Hacking: Poison the Well"    Real Clear Defense Mar 5, 2015
"Efforts To Team Up And Fight Off Hackers Intensify"    Information Week Mar 5, 2015
"Georgia: Giving Up the Pirate Life?"    Eurasianet Mar 5, 2015
"Who's Really Spreading through the Bright Star?"    Secure List Mar 4, 2015
"4 Top Hacker Groups And What They Want"    Make Use Of Mar 4, 2015
"A New Economic Threat: State-Sponsored Hacking"    Investopedia Mar 4, 2015
"'FREAK' - New SSL/TLS Vulnerability Explained"    The Hacker News Mar 3, 2015
"North Korean Cyber Attack on Sony Poses Tough Security Questions"    National Defense Magazine Mar 2, 2015
"The Democratization of Cyberattack"    Schneier on Security Mar 2, 2015
"What You Need To Know About Nation-State Hacked Hard Drives"    Information Week Mar 2, 2015
"What's Next in Government Surveillance"    The Atlantic Mar 2, 2015
"Lockheed sees shift in focus on infrastructure cyber security"    Reuters Mar 2, 2015
"Wall Street Journal CIO Network Event: Old Thinking Won't Fix New Problems"    Bromium Feb 27, 2015
"Part III: Solving the mystery of shadow hacking organization The Equation Group"    RedOrbit Feb 26, 2015
"'Cyber Armageddon' not likely to wipe out US, intelligence director says"    Ars Technica Feb 26, 2015
"Hackers Steal Trading Algorithms"    Data Breach Today Feb 26, 2015
"Lenovo Website Hijacked"    Data Breach Today Feb 26, 2015
"Part II: Solving the mystery of shadow hacker organization The Equation Group"    RedOrbit Feb 25, 2015
"Part I: Solving the mystery of shadow hacker organization The Equation Group"    RedOrbit Feb 24, 2015
"What NSA Director Mike Rogers Doesn't Get About Encryption"    Cato Institute Feb 24, 2015
"Cybercrime, Cyber Espionage Tactics Converge"    Information Week Feb 24, 2015
"Despite Increased Awareness, Hackers Can Still Breach Your Network in Under 30 Minutes"    Whir Feb 24, 2015
"From Hacking Systems To Hacking People"    Information Week Feb 24, 2015
"Mandiant Report: Beyond the Breach"    FireEye Feb 24, 2015
"Three hacking groups you need to know"    The Hill Feb 23, 2015
"Why are we still constantly surprised that Intelligence (espionage) Agencies do exactly what they're supposed to do?"    Cytegic Feb 22, 2015
"A Russian cyber-security company is impressing the skeptics"    Business Insider Feb 22, 2015
"Ars: SSL-Busting Code That Threatened Lenovo Users Found In a Dozen More Apps"    Slashdot Feb 22, 2015
"Cyberspying Targets Energy Secrets Intruders seek data on oil deposits, cutting-edge technology"    CyberArmyBD Feb 22, 2015
"NSA helped British steal cell phone codes"    South China Morning Post Feb 20, 2015
"Visual Hacking Is Highly Successful at Getting Sensitive Information"    SoftPedia Feb 20, 2015
"The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle"    The Intercept Feb 19, 2015
"The Secret's Out: NSA Personnel are Out-Hacking the Chinese and Russians"    To Inform is to Influence Feb 19, 2015
"Equation Group: from Houston with love"    SecureList Feb 19, 2015
"Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections"    ArsTechnica Feb 19, 2015
"Lenovo to stop pre-installing controversial software"    Reuters Feb 19, 2015
"New Report Highlights China's Cybersecurity Nightmare"    The Diplomat Feb 18, 2015
"Hacked Hardware Could Cause The Next Big Security Breach"    Popular Science Feb 17, 2015
"Newly Discovered 'Master' Cyber Espionage Group Trumps Stuxnet"    Information Week Feb 16, 2015
"Russian researchers expose breakthrough U.S. spying program"    Reuters Feb 16, 2015
"Examining the Risks and Advantages of Biohacking"    ThreatPost Feb 16, 2015
"Google's Project Zero gets tough on companies with lax security patch policies"    TechWorm Feb 15, 2015
"Possible Cyber-Attack at Defense Agency"    Data Breach Today Feb 11, 2015
"US Creates Cyber-CIA to Fight Hackers"    Space War Feb 11, 2015
"Best hacker defense? Let them in, experts say."    Christian Science Monitor Feb 11, 2015
"Daniels: CTIIC will take pressure off White House"    FCW Feb 11, 2015
"Let hackers in - experts say traps might be better than walls"    National Cyber Security Feb 11, 2015
"Business, the Feds and Cybersecurity"    Wall Street Journal Feb 9, 2015
"Canadian agencies use data stolen by foreign hackers, memo reveals"    Globe and Mail Feb 6, 2015
"China frees Canadian held on spying charge"    Global News (Canada) Feb 5, 2015
"iOS Devices Targeted by Cyber-Espionage Campaign"    SoftPedia Feb 5, 2015
"Army readies for digital battlefield"    Times of India Feb 4, 2015
"New Technology Detects Hacks in Milliseconds"    Bloomberg Feb 3, 2015
"Guest Post: Two Years Later, The EU's Cybersecurity Strategy Stumbles Forward"    Council on Foreign Relations Feb 3, 2015
"Target Malware Kingpins"    Brookings Institute Feb 2, 2015
"Another Unpatched Adobe Flash Zero-Day vulnerability Exploited in the Wild"    The Hacker News Feb 2, 2015
"Malware: Software with malice"    Northbay Business Journal Feb 2, 2015
"US ups stakes in cyberwarfare"    Aljazeera Jan 29, 2015
"What every utility should know about the new physical security standard"    Intelligent Utility Jan 29, 2015
"We Are On Notice: Terrorists Target Grids"    Breibart Jan 27, 2015
""Game of Threats" PwC's new game to create awareness against hacking"    TechWorm Jan 27, 2015
"Digital Jihad: Isis, Al Qaeda Seek a Cyber Caliphate to Launch Attacks on US"    Unity Coalition for Israel Jan 27, 2015
"The Threat of International Cyber Hacking"    Economy Watch Jan 24, 2015
"Unregulated cyberspace a cause for concern"    East Asia Forum Jan 24, 2015
"Why the Sony Hack Matters"    Elsevier Jan 23, 2015
"Companies Will Increasingly Be in the Cross-Hairs of Nation-State Cyber-Attacks"    EMC Jan 23, 2015
"Cisco 2015 Annual Security Report"    CiscoZine Jan 21, 2015
"Senate: Homeland Security Totally Screwed Up Cyber Defense"    Sputnik News Jan 17, 2015
"Need Some Espionage Done? Hackers Are for Hire Online"    To Inform Is To Influence Jan 16, 2015
"Needed: an international cyber treaty"    Asia Times Jan 16, 2015
"US and UK declare red-team CYBER WAR – on EACH OTHER"    The Register Jan 16, 2015
"CISP Report: Sony Pictures Entertainment hacked"    CERT-UK Jan 16, 2015
"Governments Struggle to Respond to Hackers"    Defense News Jan 16, 2015
"Hackers Managing Infiltration Almost 'At Will,' Says FireEye"    spam News Jan 16, 2015
"Spear-Fishing Website Hosts Outlook Web App Phishing Page"    Softpedia Jan 15, 2015
"The modern hacker takes on a new role"    A Breaking News Jan 15, 2015
"UK and US spies to carry out fake hacking attacks on banks, airlines and nuclear plants"    Daily Mail Jan 15, 2015
"New report: DHS is a mess of cybersecurity incompetence"    ZDNet Jan 14, 2015
"Why CENTCOM Was Cyber Stupid"    The National Interest Jan 14, 2015
"Malicious hackers use simple email scam to WRECK German steel mill"    Mirror Jan 14, 2015
"Security Experts React to President's Cybersecurity Proposals"    IT News Jan 13, 2015
"US probes military account hack"    Technology Spectator Jan 13, 2015
"British Hacker Linked To Attack On Pentagon Twitter Feed"    Huffington Post Jan 13, 2015
"Exploits: The Next Generation"    Public Technology Jan 13, 2015
"How Should The US Respond To Cyber Attacks?"    Task & Purpose Jan 13, 2015
"Maginot Revisited: More Real-World Results from Real-World Tests"    FireEye Jan 13, 2015
"Mutually Assured Destruction? Nation States on the Cyber Offensive"    Veracode Jan 12, 2015
"Skeleton Key Malware Analysis"    Dell Jan 12, 2015
"Study: Majority of enterprises breached in first half of 2014, regardless of vertical"    SC Magazine Jan 12, 2015
"Wrong message sent in the Sony hack debate"    The Hill Jan 12, 2015
"'Skeleton Key' Malware Bypasses Active Directory"    Information Week Jan 12, 2015
"Malware Statistics"    AV-Test Jan 12, 2015
"Ireland on frontline in cyber war as hackers box clever"    Independent Jan 11, 2015
"Stuxnet-like cyberattack on German steel plant deepens security concerns"    Homeland Security News Wire Jan 9, 2015
"Today's computers face more attacks than ever"    CNet Jan 9, 2015
"10 Ominous State-Sponsored Hacker Groups"    ListVerse Jan 8, 2015
"Hacking Attack Causes Physical Damage at German Steel Mill"    Schneier on Security Jan 8, 2015
"How NOT To Be The Next Sony: Defending Against Destructive Attacks"    Information Week Jan 8, 2015
"As cyber attacks swell, a move toward improved industry collaboration"    Fortune Jan 7, 2015
"Sony Cyber Hacking Fallout: Lawful Cowboys Versus Elizabethan Pirates"    Cold War Daily Jan 5, 2015
"The Sony Hackers and the Blame Game"    Bloomberg Jan 5, 2015
"We Still Don't Know Who Hacked Sony"    The Atlantic Jan 5, 2015
"Hunting the hackers: Tough and getting tougher, but more important than ever"    ZDNet Jan 4, 2015
"Is Kim Jong Un innocent?"    The Economist Jan 3, 2015

2014

"China Begins Investigating Hacking on S. Korea's Nuclear Manager"    KBS World Dec 31, 2014
"IT Security Year in Review: Start-Stop-Stay 2015"    Anitian Dec 31, 2014
"Who infiltrated GOV.AF? - Chinese Hackers or US Hackers?"    Bashir Dec 31, 2014
"Sony hackers threaten attack on US news organization"    New York Post Dec 31, 2014
"The Year of the Breach: 10 Federal Agency Data Breaches in 2014"    Nextgov Dec 30, 2014
"FBI Investigating Whether Companies Are Engaged in Revenge Hacking"    Bloomberg Dec 30, 2014
"Hacker fakes German minister's fingerprints using photos of her hands"    The Guardian Dec 30, 2014
"A number of private security researchers are increasingly voicing doubts that the hack of Sony's computer systems was the work of North Korea"    Boston Globe Dec 24, 2014
"These Cybersecurity Experts Still Don't Think North Korea Hacked Sony"    WRC Dec 24, 2014
"Deadline Looms as Hackers Threaten to Destroy Control Systems of Nuclear Facilities"    Alternative News Dec 24, 2014
"Attributing Cyber Attacks"    Journal of Strategic Studies Dec 23, 2014
"South Korean nuclear operator hacked amid cyber-attack fears"    The Guardian Dec 23, 2014
"North Korea Loses Its Link to the Internet"    New York Times Dec 22, 2014
"ICANN Spear Phishing Attack Strikes at the Heart of the Internet"    Info Security Magazine Dec 18, 2014
"What Did Federal CIOs Learn About Cybersecurity in 2014?"    Nextgov Dec 18, 2014
"Cyberattack on German Iron Plant Causes 'Widespread Damage': Report"    Wall Street Journal Dec 18, 2014
"5 lessons from the Sony hack"    CNN Dec 17, 2014
"Top 10 information security bloggers in 2014"    27001 Academy Dec 17, 2014
"Report: North Korea May Be Behind Sony Pictures Hack After All (Update)"    Gizmodo Dec 17, 2014
"Sony Pictures Breach: Saga Yields Insight On Basic Security Lapses"    CRN Dec 17, 2014
"India remains a laggard in innovation, China overtakes US"    Live Mint Dec 16, 2014
"Cyber attack: Waiting to strike"    Khaleej Times Dec 15, 2014
"Sony hacked in February, knew about security flaws before data leak"    Network World Dec 14, 2014
"Sony ignored security evaluation before GOP hack, more data coming"    Electronista Dec 14, 2014
"The Sony Pictures hack: Everything we know so far"    TheNextWeb Dec 13, 2014
"Here's How Cyber-Warfare Started And Where It's Going"    Business Insider Dec 12, 2014
"No Respite for Sony"    TechNewsWorld Dec 12, 2014
"SONY INSIDER: 'The Security Team Has No F---ing Clue'"    Business Insider Dec 12, 2014
"The Year of Hacking Dangerously"    Bloomberg Dec 10, 2014
"Digital Spies Target Diplomats' iPhones, Androids And PCs With 'Inception' Malware"    Forbes Dec 10, 2014
"Stealthy 'Inception' attack framework detailed; possible return of 'Red October' group"    SC Magazine Dec 10, 2014
"Blue Coat Exposes 'The Inception Framework'; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Business Execs"    Blue Coat Dec 9, 2014
"Cyber attack could cost Sony studio as much as $100 million"    Reuters Dec 9, 2014
"A huge intelligence screw-up turned the government and private companies into cyberwarfare partners"    PRI Dec 8, 2014
"Kaspersky: That 2 years we took to warn you about Regin? We had GOOD REASON"    The Register Dec 5, 2014
"Why 'Regin' Malware Changes Threatscape Economics"    Information Week Dec 4, 2014
"Russia and China have the best hackers"    BetaNews Dec 4, 2014
"Sony Hack: 'Destover' Malware Identified"    Data Breach Today Dec 4, 2014
"Sony Hackers Knew Details Of Sony's Entire IT Infrastructure"    Information Week Dec 4, 2014
"Inside the "wiper" malware that brought Sony Pictures to its knees [Update]"    Ars Technica Dec 3, 2014
"UPDATED: Top 18 Most Important Internet Security Events & Threats of 2014"    Heimdal Security Dec 3, 2014
"Did North Korea really hack Sony Pictures? Some experts aren't so sure"    Mashable Dec 3, 2014
"Sony Blames North Korea for Hacking, but Washington Left Them Completely Vulnerable"    Daily Beast Dec 3, 2014
"Sony Pictures denounces 'brazen' cyberattack but downplays North Korea role"    The Guardian Dec 3, 2014
"Cyber Ring Corporate Secrets Heist Uncovered: Cyber-Espionage Ring Threatens US Stock Market"    Jobs & Hire Dec 2, 2014
"Cyber Round Up: Hacking Wall Street; FBI Warning Post Sony Malware; Hacking E-Cigs, Parking Lots, and Issues with Cryptography"    Cyber Security Law and Policy Dec 2, 2014
"Exclusive: FBI warns of 'destructive' malware in wake of Sony attack"    MSN Dec 2, 2014
"FBI warns of major malware-based attacks following the Sony Pictures hack"    Security Affairs Dec 2, 2014
"Hackers gave Sony Pictures Entertainment a major headache Thanksgiving week"    Washington Post Dec 1, 2014
"Hackers target biotech firms in bid to rig insider trades: FireEye"    The Globe and Mail Dec 1, 2014
"400 Hackers Are Defending NATO in a Massive Cyberwar Game"    Indian Defense Dec 1, 2014
"Law Firms Are a Weak Link For Hackers: Finch"    Bloomberg Dec 1, 2014
"Did Hackers Gain an Edge on Wall Street?"    Wall Street Journal Dec 1, 2014
"Q&A: Shaun Rein, China expert, on why the nation has traded copying for innovation"    EIN News Nov 28, 2014
"The Five Ws of REGIN"    Cyber Security Law and Policy Nov 27, 2014
"Cyber Hackers Could Cause An Economic Collapse, President Obama Warns"    Survival Based Nov 26, 2014
"Obama Sends a C-17 to a Chinese Air Show Despite Concerns Inside the Pentagon"    YourNewsWire Nov 25, 2014
"Government is the #1 Cyber-Criminal!"    Venitism Nov 25, 2014
"Super Sophisticated Malware "Regin" has been Spying on Users for Years"    LiquidThink Nov 24, 2014
"'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described"    The Register Nov 24, 2014
"World's most advanced hacking spyware uncovered"    Mail Online (UK) Nov 24, 2014
"Cyber Round Up: REGIN Malware; Egyptian Cyber Army; Potential Iran Cyber Attacks; State-Sponsored Hackers VS Human Rights Groups"    Cyber Security Law and Policy Nov 24, 2014
"Cybersecurity was missing in action on Election Day"    EIN News Nov 24, 2014
"Regin: Top-tier espionage tool enables stealthy surveillance"    Symantec Nov 24, 2014
"Here's What Chinese Hackers Can Actually Do To The US Power Grid"    Business Insider Nov 23, 2014
"Here's What Chinese Hackers Can Actually Do To The US Power Grid"    Business Insider Nov 23, 2014
"Intel boss' warning on cyber attacks no joke, say experts"    Fox News Nov 23, 2014
"JPMorgan Hacking Raises Alarm About Banks' Cyber Defences"    Bloomberg Nov 23, 2014
"JPMorgan Hacking Raises Alarm About Banks' Cyber Defences"    Bloomberg Nov 23, 2014
"Computer spying malware uncovered with 'stealth' features: Symantec"    The Boston Journal Nov 23, 2014
"Computer spying malware uncovered with 'stealth' features: Symantec"    The Boston Journal Nov 23, 2014
"Fury as China unveils £14,000 copy of Range Rover"    Mail Online (UK) Nov 23, 2014
"Hacked: When Cyber Spies Attack"    Top Documentary Films Nov 22, 2014
"NATO Conducts Seventh Annual Cyber Coalition Exercise"    Cyber Security Law and Policy Nov 21, 2014
"NSA: China thefts could lead to attack"    Trib Live Nov 21, 2014
"Extensive Network of Secret Chinese Military Units Attack US on Daily Basis"    EIN News Nov 21, 2014
"U.S. Congress urged to consider sanctions on Chinese cyber-spies"    Reuters Nov 20, 2014
"U.S. Electrical, Financial Networks Mapped for Future Cyber Attacks"    Washington Free Beacon Nov 20, 2014
"US Control Systems Have Been Hacked By Nation States - NSA Director Warns 'This Is Not Theoretical'"    Cyber Security Law and Policy Nov 20, 2014
"NSA Director Says Chinese Cyber Hackers Can Shut Down U.S. Power Grid"    Inquisitor Nov 20, 2014
"NSA Director: Yes, China Can Shut Down Our Power Grids"    Business Insider Nov 20, 2014
"NSA Worries Hackers May Shut Down American Utilities"    ABC News Nov 20, 2014
"Foreign Governments Have Hacked U.S. Grid, NSA Head Says"    Bloomberg Nov 20, 2014
"10 top security threats of 2014 (so far)"    ZD Net Nov 19, 2014
"Hewlett Foundation lays out MEELLIONS on security"    The Register Nov 19, 2014
"Three suspects arrested in china for spreading WireLurker malware"    E Hacking News Nov 19, 2014
"Cyber War - US State Department Hacked"    Check & Secure Nov 19, 2014
"Stronger Locks and Taller Fences Won't Stop Cybercrime"    1776 Nov 19, 2014
"Hackers attacked the U.S. energy grid 79 times this year"    CNN Nov 18, 2014
"Chinese authorities arrest three over iOS malware"    BBC Nov 18, 2014
"Chinese Hackers? Russian Hackers? Hacktivists? Uncertainty Behind the Source of the Recent Breaches of Government Agencies"    Cyber Security Law & Policy Nov 18, 2014
"FBI Probes Agency Computer Breaches Said to Bear Signs of Spying"    Bloomberg Nov 18, 2014
"Half of U.K. Firms Would Hire Hackers, Ex-Convicts to Secure Their Networks"    Wall Street Journal Nov 17, 2014
"Intellectual Property: Making It Personal"    CAGW Nov 17, 2014
"Internet Hack Shutters Some State Department Computers"    VOA News Nov 17, 2014
"New CAGW Report on Intellectual Property"    CAGW Nov 17, 2014
"Spate of cyber attacks target U.S. government systems"    CBS News Nov 17, 2014
"State Department email system hacked, shut down"    CBS News Nov 16, 2014
"Google's secret NSA alliance: The terrifying deals between Silicon Valley and the security state"    Salon Nov 16, 2014
"State Department Targeted by Hackers in 4th Agency Computer Breach"    New York Times Nov 16, 2014
"Ex-NSA Chief Urges Congress to Step Up Fight Against Cyberattacks"    GovTech Nov 12, 2014
"Chinese hackers target human rights groups, Citizen Lab says"    CBC News Nov 11, 2014
"Darkhotel malware targets travelling executives: report"    Syndey Morning Herald Nov 11, 2014
"Half of US cybersecurity breaches caused by staffers' misconduct"    Russian Times Nov 10, 2014
"Information Warfare: Russia Strikes Back"    Strategy Page Nov 10, 2014
"Can a cyber arms race with China be stopped?"    CBS News Nov 10, 2014
"Executive Cyber Intelligence Report: November 1"    Tripwire Nov 10, 2014
"Feds hacked: Is cybersecurity a bigger threat than terrorism?"    Christian Science Monitor Nov 10, 2014
"Line dividing hacker cyber crime, state-sponsored terror attacks is murky"    Stars and Stripes Nov 7, 2014
"State-sponsored Hackers Gear Up for G20"    Info Security Magazine Nov 7, 2014
"The G20 and the New Reality of Cyber Espionage"    FireEye Nov 4, 2014
"US banks unite to identify hacking threats to global money pipelines"    The Guardian Nov 4, 2014
"16-31 October 2014 Cyber Attacks Timeline"    Hackmageddon Nov 3, 2014
"JPMorgan found breach through Corporate Challenge site"    IT News (AUS) Nov 3, 2014
"Justice Department seeks massive expansion of FBI hacking powers"    WSWS Nov 3, 2014
"Consensus sought with US on governance of Internet"    TMC News Nov 2, 2014
"How Did Russians Hack The White House?"    KnowBe4 Nov 1, 2014
"Trade Law As A Tool Against Chinese Hackers"    Whitcomb Law Nov 1, 2014
"Hackers Infiltrate White House Network"    security Week Oct 31, 2014
"White House cyber breach - Is Anything Safe?"    National Cybersecurity Institute Oct 31, 2014
"Cybersecurity Not Just about Hackers"    DFI News Oct 31, 2014
"White House hack just the beginning: experts say major cyberattack coming soon"    Sydney Morning Herald Oct 30, 2014
"Nato frontline in life-or-death war on cyber-terrorists"    The Guardian Oct 30, 2014
"GE and Siemens targeted by hackers"    PEI Oct 30, 2014
"The link you just clicked may not be real"    iPolitics Oct 29, 2014
"Unwitting Workers Give Hackers Keys to Fortune 500 Firms' Networks: Study"    NBC News Oct 29, 2014
"Cyber Attacks Likely to Increase"    Pew Research Oct 29, 2014
"These Are The Hacker Groups That Should Be Keeping You Up At Night"    Business Insider Oct 28, 2014
"US eyes cyber 'deterrence' to stop hackers"    Phys.org Oct 28, 2014
"Chinese-Russian Relations Enter Cyberspace"    Indian Strategic Studies Oct 27, 2014
"Continuing Federal Cyber Breaches Warn Against Cybersecurity Regulation"    Heritage Foundation Oct 27, 2014
"Researchers uncover sophisticated cyber espionage campaign"    Computer Weekly Oct 27, 2014
"The Sorry State of Cybersecurity"    CIO Insight Oct 26, 2014
"Russia and China to sign cyber-security treaty in November"    Computing (UK) Oct 26, 2014
"Micro-Targeting Malvertising Via Real-Time Ad Bidding"    Invincea Oct 25, 2014
"NIST finalizes cloud computing roadmap"    SC Magazine Oct 23, 2014
"The 'Cloud' is DEFINITELY a Huge and Tempting Target for Hackers"    MPG Oct 22, 2014
"Apple update on iCloud.com security"    Apple Oct 22, 2014
"US focus on naming foreign hackers gets criticized"    The Hill Oct 22, 2014
"US security prosecutors focus on cyber"    IT Web Oct 22, 2014
"Chinese NOAA employee caught stealing dam info"    SurvivalMonkey Oct 22, 2014
"UK companies at 'higher cyber risk' than rest of world"    The Press & Journal Oct 20, 2014
"Malvertising Campaigns Hit Us Military Industry to Steal Secrets and Intellectual Property"    Cyber Defense Magazine Oct 20, 2014
"There's a Silver Lining in the Fight Against Cyber Espionage"    SoftPedia Oct 19, 2014
"Hackers rip into heart of open-source software"    Trib Live Oct 17, 2014
"Sophisticated Malvertising Campaign Targets US Defense Industry"    Information Week Oct 17, 2014
"'Malvertising' targets U.S. military firms in new twist on old web threat"    Yahoo News Oct 16, 2014
"Cyber attacks an increasing threat for Mideast oil and gas"    Gulf News Oct 16, 2014
"Techno-nationalism in China's rise: the next gunpowder moment"    The Strategist (AUS) Oct 14, 2014
"Hacking Back and the Cyber Balance of Power"    Huffington Post Oct 14, 2014
"I Know It's A Shock, But Law Firms Are Jeopardizing Client Information"    Above the Law Oct 14, 2014
"Fighting in the cyber trenches"    EIN News Oct 13, 2014
"The Coming of Global Cyber War?"    Intervid Oct 11, 2014
"China Makes Efforts for Better Cyber Security"    SoftPedia Oct 10, 2014
"China angered after FBI head says Chinese hacking costs billions"    Reuters Oct 9, 2014
"White House Cyber Chief: JP Morgan Underscores Critical Infrastructure Risk"    Security Ledger Oct 9, 2014
"White House Shifts Its Cyber Legislative Strategy"    Gov Info Security Oct 9, 2014
"SingTel and FireEye partner to launch first Managed Defense Solution Powered By FireEye in APAC to help enterprises contain rising cyber-attacks"    InfoTech Oct 9, 2014
"Obama Had Security Fears on JPMorgan Data Breach"    New York Times Oct 8, 2014
"Groups Named For First Federally Funded Cybersecurity Research Center"    Defense News Oct 8, 2014
"Hackers phishing for source code from Microsoft, Apple and Oracle"    V3.co.uk Oct 7, 2014
"Cyber attacks on critical infrastructure: Too much to C.H.E.W?"    IT Pro Portal Oct 7, 2014
"Bored hackers flick Shellshock button to OFF as payloads shrink"    The Register Oct 3, 2014
"Hackers using Shellshock to sneak into NAS systems"    V3.co.uk Oct 2, 2014
"Shellshock: Attackers Laying Groundwork for "Massive Attacks"?"    HackSurfer Oct 2, 2014
"State-sponsored attacks expected to get worse"    SC Magazine Oct 2, 2014
"State-Sponsored Attacks Increasing"    HackSurfer Oct 2, 2014
"Hackers charged in software theft from US army, others"    Yahoo News Oct 1, 2014
"Insider incidents and high-profile crimes increasing"    Help Net Security Oct 1, 2014
"Hackers charged with stealing military training software, data"    New York Post` Sep 30, 2014
"Hackers charged with stealing over $100m in US army and Xbox technology"    The Guardian Sep 30, 2014
"Three Steps to Protect US Intellectual Property"    Forbes Sep 30, 2014
"U.S. Charges 4 Hackers Over Theft Of Games From Microsoft, Army"    NPR Sep 30, 2014
"Four Members of International Computer Hacking Ring Indicted for Stealing Gaming Technology, Apache Helicopter Training Software"    FBI Sep 30, 2014
"Fewer Cyber Pros, More Cyber Problems"    NextGov Sep 29, 2014
"General counsel need to be aware of risk from hackers involving even military-related computers"    Inside Counsel Sep 29, 2014
"UCSD fights cyber attacks targeting research"    U-T San Diego Sep 28, 2014
"Apple 'Bash bug' could cripple millions"    Bangkok Post Sep 26, 2014
"What We Know About Shellshock So Far, and Why the Bash Bug Matters"    Security Week Sep 26, 2014
"Hackers exploit 'Shellshock' bug with worms in early attacks"    CNBC Sep 25, 2014
"Hackers exploit Shellshock bug as fixes prove ineffective"    The Globe and Mail Sep 25, 2014
"'Bash' may pose bigger threat than 'Heartbleed'"    CNBC Sep 25, 2014
"Hackers launch attacks exploiting 'Shellshock' bug in Bash software"    Reuters Sep 25, 2014
"Hackers steal crucial info from India’s biggest airport operator- AAI"    Trans Asia News Srvice Sep 25, 2014
"Security Experts Expect ‘Shellshock’ Software Bug in Bash to Be Significant"    New York Times Sep 25, 2014
"Google and Amazon Respond to Shellshock Security Flaw"    Wall Street Journal Sep 25, 2014
"Airports Authority of India (AAI) hacked, critical data compromised"    Tech Worm Sep 24, 2014
"A Decoy Computer Was Set Up Online. See Which Countries Attacked It the Most"    Bloomberg Sep 23, 2014
"Unhappy Workers Hacking Employers on the Rise, FBI Says"    Bloomberg Sep 23, 2014
"Israel to Create Cyber Security Authority after Alleged Iranian Hacker Attack"    National Cyber Security Sep 22, 2014
"US House Approves New Law to Discourage Trade Secrets Theft"    Info Security Magazine Sep 19, 2014
"Here Are The Traits Of Americans That The CIA Feared Could Make The Country Vulnerable To Economic Espionage"    Business Insider Sep 18, 2014
"US Bolstering Cyber-Defence With New Corps: NSA Chief"    NDTV Sep 16, 2014
"Belden Research Reveals Dragonfly Malware Likely Targets Pharmaceutical Companies"    Business Wire Sep 15, 2014
"Middle Eastern Petrochemical Plants Are Targets of Hackers"    New York Times Sep 15, 2014
"Defending Against the Dragonfly Cyber Security Attacks"    Belden Sep 15, 2014
"Dragonfly malware targeting pharmaceutical companies"    Help Net Security Sep 15, 2014
"If Russian and Chinese hackers operate with impunity, why don't we cut these nations off from the internet?"    Quora Sep 12, 2014
"Civilian Casualties in a Cyber War?"    ThreatGeek Sep 11, 2014
"A New Threat Grows Amid Shades of 9/11"    Wall Street Journal Sep 10, 2014
"Every Part of the US Government Has Probably Already Been Hacked"    Defense One Sep 10, 2014
"Studies in Intelligence: Analyzing Economic Espionage"    CIA Sep 10, 2014
"AFP Letter to the House Republican Study Committee on Intellectual Property"    Americans for Prosperity Sep 9, 2014
"Let's pass cybersecurity legislation"    The Hill Sep 9, 2014
"'Undetectable' Peter Pan computer virus threatens UK businesses"    The Telegraph Sep 8, 2014
"The Enemy of My Enemy is My Cyber-Lessee"    American Consumer Institute Sep 8, 2014
"McAfee and Symantec join Cyber Threat Alliance"    Help Net Security Sep 8, 2014
"The Sad Truth About Breaches: We’re All Target"    NoVa Infosec Sep 6, 2014
"Cyber attacks: Perpetual state of siege for US companies"    Canberra Times (AU) Sep 1, 2014
"Nato set to clarify stance on cyber attack"    Computer Weekly Sep 1, 2014
"Reconnaissance code on industrial software site points to watering hole attack"    PC Advisor (UK) Sep 1, 2014
"What Are Hackers Thinking?"    PC Mag Aug 30, 2014
"Cyberwars: The Month of Cyberattacks"    Stories by Williams Aug 30, 2014
"Oil and energy industry in Norway is under attack"    Security Affairs Aug 30, 2014
"Banks lose $US23 million on average from cybercrime: survey"    Canberra Times (AU) Aug 29, 2014
"Caught in the crossfire of a cyber Cold War"    EIN News Aug 29, 2014
"JP Morgan’s security breach points to broader issues in cyber security"    Venture Beat Aug 29, 2014
"JPMorgan Hackers Came In the Front Door -- in June. Two Months of Mayhem"    EIN News Aug 29, 2014
"Defending Against Hackers of the Future"    Bloomberg Aug 28, 2014
"Hackers break into Huntington’s wellness program"    Columbus Dispatch Aug 27, 2014
"List of data breaches and cyber attacks in August"    IT Governance Aug 27, 2014
"Alabamians file lawsuit against hospital chain after cyber-attack by Chinese hackers"    Alabama Today Aug 26, 2014
"Top 5 Reasons Your Small Business Website is Under Attack"    Dark Reading Aug 26, 2014
"Cybersecurity Is A Severe And Growing Challenge For Government Contractors"    Forbes Aug 26, 2014
"Shipping and supply chain 'next playground for hackers'"    Supply Management Aug 26, 2014
"Software vulnerability patching is far too slow and leaves users at risk"    BetaNews Aug 26, 2014
"It Does Matter That The White House Cybersecurity Czar Lacks Technical Chops"    Forbes Aug 25, 2014
"Predicting the future' to stay one step ahead of hackers"    The Telegraph Aug 25, 2014
"Hacking Gmail App with 92 Percent Success Rate"    Hacker News Aug 23, 2014
"White House cybersecurity leader proudly claims he knows nothing about cybersecurity"    TechTimes Aug 23, 2014
"Official says hackers hit up to 25,000 Homeland Security employees"    Washington Post Aug 23, 2014
"Gov't Warns U.S. Retailers About Hacking Software"    Epoch Times Aug 23, 2014
"Healthcare Industry, Feds Talk Information Sharing"    Dark Reading Aug 22, 2014
"As security breach reports mount, experts fear alert fatigue"    CNet Aug 22, 2014
"U.S. undercover investigators among those exposed in data breach"    Reuters Aug 22, 2014
"UPS, Target, Supervalu and 1,000 American Businesses Affected By Cash Register Cyberattacks"    International Business Times Aug 22, 2014
"Constant Hacking Leads to Making Fakes in China in Just One Day"    Business Korea Aug 22, 2014
"Worldwide Spending On Information Security To Surpass $70B By End Of 2014: Report"    International Business Times Aug 22, 2014
"DHS Cybersecurity Program Finds Few Takers"    GovTech Aug 22, 2014
"China's Hack of 4.5 Million U.S. Medical Records? This Chart Will Make You Sick"    Bloomberg Aug 21, 2014
"Data Breaches in the U.S."    Bloomberg Aug 21, 2014
"Hacker Or Military? Best Of Both In Cyber Security"    Dark Reading Aug 21, 2014
"Hackers' Paradise: The rise of soft options and the demise of hard choices"    The Register Aug 15, 2014
"Brit infosec firm lets hackers think they've stolen something"    The Register Aug 14, 2014
"Majority of Hackers Do it for the Thrill, Believe They Won't Be Caught: Survey"    SiteProNews Aug 14, 2014
"Survey: manufacturing businesses' intellectual property gets lost to security breaches"    Kaspersky Lab Aug 13, 2014
"Why the U.S. Can't Automatically Retaliate in Cyberspace, Yet"    Wall Street Journal Aug 13, 2014
"Doomsday scenarios to keep you up at night: Mikko Hypponen talks cyberthreats"    Venture Beat Aug 13, 2014
"The Arms Industry Is Ripe Pickings for Hackers"    Medium Aug 12, 2014
"The network of USIS compromised by a cyber attack"    Security Affairs Aug 12, 2014
"The scary state of cybersecurity"    C4ISR Aug 12, 2014
"APAC seeing more APT attacks than other regions"    ZDNet Aug 12, 2014
"House passes three bills to protect critical infrastructure from cyber attack"    National Cyber Security Aug 12, 2014
"Fifteen countries KO'd in malware one-two punch"    The Register Aug 12, 2014
"State-Sponsored Hackers from the East Attack Former Soviet Countries"    Info Security Aug 12, 2014
"The New Mafia: Battling Hackers Like Organized Crime"    US News Aug 11, 2014
"Battling Hackers"    National Cyber Security Aug 11, 2014
"China: No government ban on Apple devices"    Times of India Aug 9, 2014
"Cyberspies Help Themselves to DHS Contractor's Data"    Tech News World Aug 8, 2014
"Spy Agencies Hit in Cyber Espionage Campaign: Kaspersky Lab"    PicturesDotNews Aug 8, 2014
"Homeland Security Contractor Hit by Hackers"    Tech Times Aug 7, 2014
"Ex-Citadel Worker Pleads Guilty to HFT Data Theft"    Bloomberg Aug 7, 2014
"Anonymous Says It Hacked the US Government Personnel Database Before China"    Motherboard Aug 5, 2014
"Hackers can exploit USB to steal data"    Deutsche Welle Aug 3, 2014
"Israeli Iron Dome Firms ‘Infiltrated by Chinese Hackers’"    PicturesDotNews Aug 1, 2014
"Wild Wild Web: For Now, Cybercrime Has the Upper Hand in Its Duel with the Law"    RAND Aug 1, 2014
"How do hackers breach institutions like Canada's NRC?"    CTV News Jul 29, 2014
"An IT emperor with no clothes, India lays bare to cyber attacks"    Times of India Jul 27, 2014
"NSA director: Cyber attacks need international norms"    Aspen Daily News Jul 27, 2014
"Internet Explorer the 'Most Vulnerable' Web Browser of 2014, States Study: Time to Switch to Chrome and Firefox?"    IBT Jul 26, 2014
"Why Do We Need to Share Cyber Threat Intelligence?"    Medium.com Jul 26, 2014
"Security automation: Are humans still relevant?"    GCN Jul 26, 2014
"Hackers exploiting Internet Explorer to expose security flaws on a huge scale"    The Guardian Jul 25, 2014
"Commentary: Congress must act now to address cybersecurity issues"    Palm Beach Post Jul 25, 2014
"Piracy Crumbling Businesses"    Daily Guide Ghana Jul 25, 2014
"Are Certain Countries a Threat to Web Security?"    Web Hosting Geeks Jul 23, 2014
"Businesses, Cyber Security Firms Are Coming Up With Creative Ways To Fight Hackers"    Digital Trends Jul 23, 2014
"International tensions heighten cyber security risks for business"    City A.M. Jul 23, 2014
"Hackers Could Take Control of Your Car. This Device Can Stop Them"    Wired Jul 22, 2014
"The UK Cyber Security Strategy"    U.K. Cabinet Office Jul 22, 2014
"Apple "inadvertently admitted" to iOS backdoor: forensics expert"    Network World Jul 22, 2014
"It's Time to Get Ready for Cyberwar"    Real Clear Defense Jul 22, 2014
"Preparing for cyber warfare"    Journal Sentinel Jul 22, 2014
"Tesla Model S Well and Truly Hacked By Chinese Security Experts"    Transport Evolved Jul 17, 2014
"Here's How Easy It Could Be for Hackers to Control Your Hotel Room"    Wired Jul 17, 2014
"Chinese hackers take command of Tesla Model S"    CNet Jul 17, 2014
"Cybersecurity as Arms Control?"    Weekly Standard Jul 17, 2014
"Google recruit world's most notorious hacker"    HITC Tech Jul 17, 2014
"Why Hackers May Be Impersonating Your Colleagues"    CBR Online Jul 16, 2014
"Hack a Tesla Model S, win $10,000"    Motoring Jul 16, 2014
"The Complex U.S. Electrical Grid Vulnerable to Cyberthreats and Physical Attack, Study Finds"    Foreign Policy Jul 15, 2014
"Automakers see growing threat from hackers"    USA Today Jul 15, 2014
"British Secret Agents No More Skilled Than An 'Average Hacker'"    Forbes Jul 15, 2014
"New York reports 900 data breaches in public, private institutions in 2013"    Tech Times Jul 15, 2014
"Phony messages highlight dangers of 'real' hackers"    Times of Israel Jul 15, 2014
"Google Creates Elite Team To Fight Hackers -- And Maybe The NSA"    Huffington Post Jul 15, 2014
"Google To Tackle Security Threats With New Project Zero Team"    RedOrbit Jul 15, 2014
"Congress is overdue in dealing with the cybersecurity threat"    Washington Post Jul 13, 2014
"Hackers Inc"    The Economist Jul 12, 2014
"Chinese Hackers Gain Access to Data of Thousands of US Federal Employees"    RIA Novosti Jul 10, 2014
"Report: Chinese hackers hit US personnel networks"    Bloomberg Jul 10, 2014
"Banks Dreading Computer Hacks Call for Cyber War Council"    Bloomberg Jul 8, 2014
"Meet Google's Security Princess"    Elle Jul 8, 2014
"Report on A Framework for International Cyber Stability"    U.S. Dept. of State Jul 2, 2014
"Check Point 2014 Security Report"    Checkpoint Jun 30, 2014
"Check Point Security Report 2014 - Malware in the enterprise"    Bountolos Jun 30, 2014
"Dragonfly: Western Energy Companies Under Sabotage Threat"    Symantec Jun 30, 2014
"Netflix Could Be Classified As a 'Cybersecurity Threat' Under New CISPA Rules"    Motherboard Jun 28, 2014
"Surge in Cybersecurity Revs Up Startups"    GCXMag Jun 27, 2014
"How Developers Battle Security Bugs"    Forbes Jun 27, 2014
"Beware the Dangers of Congress' Latest Cybersecurity Bill"    ACLU Jun 27, 2014
"Strengthening Property Rights and the U.S. Economy Through Federal Trade Secret Protection"    Heritage Foundation Jun 27, 2014
"The Senate's New Cybersecurity Bill Threatens Net Neutrality"    Motherboard Jun 26, 2014
"As Stuxnet Anniversary Approaches, New SCADA Attack Is Discovered"    Information Week Jun 26, 2014
"Australians take title of 'best' internet pirates to new level"    The World Today Jun 26, 2014
"House Judiciary Committee Looks to Strengthen Trade Secret Protection and Enforcement"    ShopFloor Jun 25, 2014
"Theft By Led Zeppelin And Apple? No, Just Innovation"    Forbes Jun 25, 2014
"IBM, Lenovo Tackle Security Worries on Server Deal"    Wall Street Journal Jun 25, 2014
"Trade Secret Theft: The Need for a Federal Civil Remedy"    Global Policy Watch Jun 25, 2014
"Trade Secret Theft: The Need for a Federal Civil Remedy"    National Law Review Jun 25, 2014
"Researchers, brush up your Mandarin and get ready to spend time in China"    The Guardian Jun 25, 2014
"Strengthening Property Rights and the U.S. Economy Through Federal Trade Secret Protection"    Heritage Foundation Jun 25, 2014
"International Creativity and Theft-prevention Caucus 2014 Watch List"    Sribd Jun 24, 2014
"Canadian law trumps the power of Google - and that's a good thing"    National Post (Canada) Jun 24, 2014
"International Creativity and Theft-prevention Caucus Unveils '2014 International Piracy Watch List'"    U.S. House Judicia Committee Jun 24, 2014
"Watering Hole Hackers Sniff Out Industrial Control Systems for Future Attack"    Info Security Magazine Jun 24, 2014
"Congressional Caucus: Protecting IP Boosts Creativity and Innovation"    MPAA Jun 24, 2014
"Court Hands Google a Worldwide Site Blocking Injunction"    Copyright Enforcement Canada Jun 23, 2014
"Hacker Tactic: Holding Data Hostage"    New York Times Jun 22, 2014
"DHS warns on threat of cyber attacks"    Flash Critic: Cyber Threat News Jun 21, 2014
"Espionage in the EU Capital: An Interview with Kristof Clerix"    Ruth Jacobs Jun 21, 2014
"GCHQ's favourite firms to get secret hacking alerts: National security fears raised over BT's links with Chinese company"    Mail Online (UK) Jun 21, 2014
"The Admiral Sets a Good Course"    Huffington Post Jun 20, 2014
"Roundup: London Tech Week"    IDG Connect Jun 20, 2014
"The Rise of Cyber-Security Blackwaters"    EconoMonitor Jun 18, 2014
"London Tech Week: Doing Business in China"    IDG Connect Jun 17, 2014
"Inside Shenzhen: China's Silicon Valley"    The Guardian Jun 13, 2014
"Chinese Cyber Espionage: We Know Everything Except What to Do About it"    EconoMonitor Jun 13, 2014
"Kevin Mandia '92 Leads Global Effort to Solve Cyber Crime"    LaFayette Jun 13, 2014
"U.S. telecom chief tells industry to lead on cybersecurity"    Reuters Jun 12, 2014
"UK calls for global effort to tackle IP theft"    Computer Weekly Jun 12, 2014
"Vince Cable calls for global approach to tackling IP crime"    The Telegraph Jun 12, 2014
"Mergers and Acquisitions: When Two Companies and APT Groups Come Together"    FireEye Jun 12, 2014
"FCC Urges Industry-Led Approach on Cybersecurity"    Wall Street Journal Jun 12, 2014
"The Internet: A Lawless Wild West?"    The National Interest Jun 11, 2014
"Hackers Steal Up To 20% Of Money Generated By The Internet"    Business Insider Jun 10, 2014
"Is the global cost of cybercrime really £266bn a year? No, it isn't"    The Guardian Jun 9, 2014
"Cybercrime costs $445B US a year to global economy, report finds"    CBC News Jun 9, 2014
"Net Losses: Estimating the Global Cost of Cybercrime"    Mcafee Jun 9, 2014
"Report: Cybercrime and espionage costs $445 billion annually"    Washington Post Jun 9, 2014
"Guilt or competition? Winning the Cyber Espionage War"    Daily News Egypt Jun 7, 2014
"The flawed US indictment of Chinese hackers"    Tech Policy Daily Jun 6, 2014
"Internet Giants Erect Barriers to Spy Agencies"    New York Times Jun 6, 2014
"Automating Cybersecurity"    New York Times Jun 2, 2014
"Indicting Chinese Military Officers for Cyber Theft: Huge Mistake"    Fortuna's Corner Jun 1, 2014
"CHINA: Inside the FBI's Fight Against Chinese Cyber-Espionage"    Newsvine May 29, 2014
"Chinese Cyber Hacking: Australia-China FTA talks under threat"    Storify May 29, 2014
"The Chinese hacking indictments: Where's the strategy?"    Tech Policy Daily May 28, 2014
"Pell Center Cybersecurity Conference Discusses Industrial Espionage and Cyber Counter Strikes"    Pell Center May 28, 2014
"A China-US tech war will cost the world dearly"    EIN Newsdesk May 27, 2014
"China Pulls Cisco Into Dispute on Cyberspying"    New York Times May 27, 2014
"Estonia exercise shows NATO's growing worry about cyber attacks"    Reuters May 27, 2014
"Security Insiders: Cyberspying Indictments Will Not Stop China From Hacking U.S. Businesses"    EIN Newsdesk May 27, 2014
"America, China and the Hacking Threat"    New York Times May 25, 2014
"China Cyber Threat: Case against 5 PLA hackers reveals U.S. counter cyberspying capabilities"    FlashCritic May 25, 2014
"China's Cyber Espionage Case a Guide to Hacking"    VOice of America May 24, 2014
"Organisms stop infections spreading by being diverse. So can computer apps"    The Economist May 24, 2014
"KGB General: Of Course Snowden is Working for Russian Intelligence"    The XX Committee May 23, 2014
"Is Snowden working for the Russians?"    Washington Post May 22, 2014
"John Carlin's Speech at Brookings on 'Defending Our Nation by Prosecuting State-Sponsored Cyber Theft'"    Brookings Institute May 22, 2014
"Why the United States should go after the Chinese hackers"    Miami Herald May 22, 2014
"Mysterious Hacker The real reason the U.S. is indicting Chinese hackers"    Daily Dot May 22, 2014
"Editorial | China's hackers may finally face justice for theft"    Myrtle Beach Online May 22, 2014
"Former KGB general: Snowden is cooperating with Russian intelligence"    Venture Beat May 22, 2014
"US lawmakers praise hacking charges against Chinese military"    PC World May 21, 2014
"Chinese hackers"    News-Gazette May 21, 2014
"Chinese Hacking Raises Cyber Attack Disclosure Issue for Companies"    Insurance Journal May 21, 2014
"Moving Past Snowden"    Brookings Institute May 21, 2014
"Espionage indictments against China deliver a useful message"    Washington Post May 21, 2014
"UK's Private Concerns About Chinese Cyber Spies"    Sky News May 20, 2014
"China Cyber Charges: Take Beijing to the WTO Instead"    National Interest May 20, 2014
"Chinese Hacker Indictments a Wakeup Call for Enterprises"    NewsFactor May 20, 2014
"Companies Bet Exposing Hacks Will Help"    Wall Street Journal May 20, 2014
"Global raids on 'BlackShades' hackers"    IoL SciTech May 20, 2014
"Canada joins global crackdown on BlackShades malware"    CTV News May 19, 2014
"FBI's Huge Hacker Bust Could Be Bogus"    Daily Beast May 19, 2014
"FBI raids BlackShades RAT Malware Customers in Europe and Australia"    Hackernews May 16, 2014
"Is Elderwood the digital arms dealer that fuelled attacks on Google?"    The Guardian May 15, 2014
"Cyber attacks on Lockheed Martin quadruple"    SC Magazine May 15, 2014
"New Strategies to Combat Counterfeit Parts"    National Defense Magazine May 15, 2014
"Technology Confounds the Courts"    ACM May 14, 2014
"Combating Economic Espionage and Trade-secret Theft"    U.S. FBI May 13, 2014
"Critical Data Discovery: Embarking on a Digital Treasure Hunt"    Security Intelligence May 13, 2014
"Cybersecurity in the private sector - playing catch-up"    The Hill May 13, 2014
"Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats? - Pamela Passman Testimony"    U.S. Senate Judiciary May 13, 2014
"Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats? - Peter Hoffman Testimony"    U.S. Senate Judiciary May 13, 2014
"Hackers steal Ukraine crisis data from Belgian foreign ministry"    The Star Online May 12, 2014
"Trade Secrets Lessons From HBO's Silicon Valley"    Orrick May 12, 2014
"Rogue Employees: The Biggest Threat to Information Security"    International Business Times May 12, 2014
"IBM launches new cybersecurity services"    USA Today May 10, 2014
"The Pentagon's New Army Is a Convention of Hackers"    Fiscal Times May 9, 2014
"How to thwart hackers with a cyber playbook"    Information Age May 9, 2014
"Interview transcript: former head of the NSA and commander of the US cyber command, General Keith Alexander"    Australian Financial Review May 9, 2014
"KC software company sues JE Dunn for IP theft"    KC Business Journal May 9, 2014
"Former NSA Chief Keith Alexander to Launch Private Cybersecurity Firm"    Mashable May 9, 2014
"Quincy software developer accused of stealing employer's intellectual property"    Patriot Ledger May 8, 2014
"International Counterfeiting Hits Small Businesses Hard"    SBE Council May 7, 2014
"Symantec: Antivirus is 'DEAD' - no longer 'a moneymaker'"    The Register May 6, 2014
"Journalists, Media Under Attack From Hackers: Google Researchers"    Shiloh International Missions May 6, 2014
"Don't let hackers know Mandiant founder checks his email on an iPad. Oh."    The Register May 6, 2014
"Onshoring Because IP Matters"    EBN May 6, 2014
"Symantec Says 'Antivirus Software Is Dead'"    Mish's May 5, 2014
"IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal"    Wall Street Journal May 5, 2014
"Virtual Legality 2: Oculus VR Responds Comprehensively To Zenimax Legal Letters"    Forbes May 5, 2014
"Europe's cybersecurity policy settings under attack"    Phys.org May 4, 2014
"Innovative U.S. cybersecurity initiative to address cyberthreats"    Homeland Security News Wire May 2, 2014
"Defense, energy, banks hit by Internet Explorer bug"    FijiOne May 2, 2014
"That was quick! Microsoft patches the "1776" hole in Internet Explorer"    NakedSecurity May 1, 2014
"The Wild Cyber West"    TownHall.com May 1, 2014
"Zimbabwe missing from the knowledge economy"    zimpolitic May 1, 2014
"Missing In Asia: The Pivotal Person In Obama's Pivot"    Forbes May 1, 2014
"The Danger Deepens: Neustar's Annual DDoS Attack Report"    Neustar Apr 30, 2014
"PDF"] "Verizon annual cybersecurity report: 'The bad guys are winning'" target="_blank">USTR Releases Annual Special 301 Report on Intellectual Property Rights"    USTR Apr 30, 2014
"Lots of Americans Heard About Heartbleed, but Not Many Were Worried"    Slate Apr 30, 2014
"Cyber security: business is in the front line"    Financial Times Apr 29, 2014
"Cybersecurity skills crisis contributes to security breaches"    BetaNews Apr 29, 2014
"NSA reveals some cyber security flaws are left secret"    Global News Canada Apr 29, 2014
"Pirates beware as China opens first intellectual property centre"    Irish Times Apr 29, 2014
"FBI Keeps Internet Flaws Secret to Defend Against Hackers"    Bloomberg Apr 29, 2014
"The Road to Resilience: How Cybersecurity is Moving from the Back Office to the Boardroom"    FireEye Apr 28, 2014
"White House Details Thinking on Cybersecurity Flaws"    New York Times Apr 28, 2014
"Smokescreening: Data Theft Makes DDoS More Dangerous"    CircleID Apr 28, 2014
"Dept. of Homeland Security struggles to recruit, retain cybersecurity tech workers"    The Raw Story Apr 26, 2014
"Protecting African creatives: The importance of intellectual property law for SMEs"    Biztech Africa Apr 26, 2014
"Tech Giants Pledge $3.6M to Help Fund OpenSSL Following Heartbleed Bug"    International Business Times Apr 24, 2014
"DDOS Attacks an Increasing Cover for Theft, Fraud"    Threat Post Apr 24, 2014
"Ethical hackers say government regulations put information at risk"    Global News Canada Apr 24, 2014
"Life after Heartbleed: 'The Internet will never be 100% safe'"    BGR Apr 23, 2014
"Hackers going after intelligence data, but most will also take your money"    TechTimes Apr 22, 2014
"2014 Data Breach Investigations Report"    Verizon Apr 22, 2014
"5 Tips to Cybersecure the Power Grid"    GreenTechGrid Apr 22, 2014
"Attacker Grabs Heartbleed VPN Sessions"    ISS Source Apr 22, 2014
"New cyber-threats that go bump in the night"    CNN Money Apr 22, 2014
"Heartbleed's Never-Ending Drip, Drip, Drip"    Ecommerce Times Apr 21, 2014
"Are inventions at risk to cyber attacks?"    PhilMcKinney Apr 21, 2014
"The Interview: 'MafiaBoy' speaks up"    Yahoo News Apr 20, 2014
"U.S. Promotes Network to Foil Digital Spying"    New York Times Apr 20, 2014
"China on frontlines of cyber security threat"    Want China Times Apr 20, 2014
"Hackers Use Heartbleed Bug to Attack 'Major Corporation'"    NBC News Apr 18, 2014
"The Lies Edward Snowden Tells"    The Atlantic Apr 18, 2014
"Heartbleed attack used to skip past multifactor authentication"    CNet Apr 18, 2014
"Heartbleed bug 'will cost millions'"    The Guardian Apr 18, 2014
"Insider Threat: Firms Aware, but Take No Action"    ISS Source Apr 18, 2014
"Mandiant: Hackers Broke In Using Heartbleed"    Wall Street Journal Apr 18, 2014
"United States: Implications Of U.S. Sanctions Program On Intellectual Property Owners"    Mondaq Apr 17, 2014
"Crucial military satellite systems are vulnerable to hacking, experts say"    The Guardian Apr 17, 2014
"Hackers Are Scanning the Web for Websites Vulnerable to Heartbleed Attacks"    SoftPedia Apr 16, 2014
"The first suspected Heartbleed hacker has been arrested"    Washington Post Apr 16, 2014
"Man who made light of 'Heartbleed thingamajig' hacked within minutes"    The Telegraph Apr 16, 2014
"Mounties always get their man: Heartbleed 'hacker', 19, CUFFED"    The Register Apr 16, 2014
"Hackers Test Water Treatment Plant Vulnerabilities"    WSO Apr 15, 2014
"After Heartbleed, can Britain's new Cyber Emergency Response Team beat the hackers?"    Metro UK Apr 15, 2014
"Heartbleed: Cybersecurity as Melodrama"    CSIS Apr 15, 2014
"TONKIN: Though needed in democracy, whistleblowing shouldn't threaten Constitution"    Daily Nebraska Apr 15, 2014
"Between Heartbleed And Homeland, NSA Treads Cybersecurity Gray Area"    NPR Apr 15, 2014
"New technique to fight 'Heartbleed' virus"    The Hindu Apr 15, 2014
"On privacy, tech firms needs to step up: Editorial"    LA Daily News Apr 15, 2014
"Smarter military spending needed, not more"    Post-Crescent Apr 14, 2014
"Cybersecurity As A War Against Haunted Objects"    Gizmodo Apr 13, 2014
"Heartbleed vuln under ACTIVE ATTACK as hackers map soft spots"    The Register Apr 11, 2014
"U.S. rallied 120 nations in response to 2012 cyberattack on American banks"    Washington Post Apr 11, 2014
"Why a hacker got paid for finding the Heartbleed bug"    New Scientist Apr 11, 2014
"Dark Reading: Heartbleed Will Go On Even After The Updates"    ThreatConnect Apr 11, 2014
"NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS"    The Register Apr 11, 2014
"NSA Said to Exploit Heartbleed Bug for Intelligence for Years"    Bloomberg Apr 11, 2014
"Mandiant 2014 Threat Report: Beyond the Breach"    FireEye Apr 10, 2014
"From the Origins of Hacking to the recent Heartbleed"    Docsity Apr 10, 2014
"Anatomy of OpenSSL's Heartbleed: Just four bytes trigger horror bug"    The Register Apr 9, 2014
"Insider Spies Are the New Cyberthreat"    Epoch Times Apr 9, 2014
"Canada shuts access to tax website over 'Heartbleed bug' fears"    Financial Times Apr 9, 2014
"The Unfortunate Cookie - A Chinese Restaurant Cyber-Security Caper"    OCEG Apr 8, 2014
"Local firms to continue XP support"    Global Times (China) Apr 7, 2014
"Cyber Emergency Response Team launched by UK"    BBC Apr 5, 2014
"Be'er Sheva wooing cybersecurity firms"    Haaretz Apr 2, 2014
"UK reaches key milestone in cyber security"    Computer Weekly Apr 1, 2014
"Ex-Microsoft employee pleads guilty to trade secret theft"    Computerworld Apr 1, 2014
"Free tool calculates the damage of a cyber attack"    Net Security Apr 1, 2014
"What's Wrong with America's Cyber Security Policy?"    Huffington Post Mar 31, 2014
"Crack CERT warriors arrive to save UK from grid-crippling hack attacks"    The Register Mar 31, 2014
"Cyber security is economic opportunity for the UK, says government"    Computer Weekly Mar 31, 2014
"NOT JUST ONE! RSA adopted Two NSA Backdoored Encryption Tools"    The Hacker News Mar 31, 2014
"Popular Remote access Trojan njRAT fuels Middle East Cyber Crime"    The Hacker News Mar 31, 2014
"White House cyber chief: future cyber attack to wipe out critical infrastructure"    Flash Critic Mar 29, 2014
"Pentagon to Triple Cyber Security Staff"    Techno Buffalo Mar 29, 2014
"Hagel Seeks Peace Pact for Digital Realm"    New York Times Mar 28, 2014
"A digital fortress?"    Economist Mar 28, 2014
"Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar"    RAND Corp. Mar 28, 2014
"Hacker black market more lucrative than drug trade"    Merlin Intl. Mar 28, 2014
"Report: Hackers Would Rather Steal Your Twitter Account Than Your Credit Card"    Consumerist Mar 27, 2014
"Law Firms Are Pressed on Security for Data"    New York Times Mar 26, 2014
"Malaysian flight MH370 tragedy abused by Chinese hackers for Espionage attacks"    The Hacker News Mar 26, 2014
"The U.S. notified 3,000 companies that their computer systems had been hacked in 2013"    Daily News Mar 25, 2014
"Hackonomics: A First-of-Its-Kind Economic Analysis of the Cyber Black Markets"    Juniper Networks Mar 24, 2014
"Microsoft Word Zero-Day Vulnerability is being exploited in the Wild"    The Hacker News Mar 24, 2014
"Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370"    FireEye Mar 24, 2014
"'Most Wanted' Hacker Speaks Out"    Raconteur Mar 21, 2014
"Industry voice: Windows XP: The perils for businesses that fail to upgrade"    Vaxxe Mar 21, 2014
"United Front Can Foil the Hackers"    Raconteur Mar 21, 2014
"Hackers turning to Tor network to hide evolved malware, warns Kaspersky Lab"    V3 Mar 20, 2014
"Commercial RAT Used by Malicious Hackers"    InfoSec Magazine Mar 18, 2014
"From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms in RATs"    FireEye Mar 18, 2014
"Japan holds first broad cybersecurity drill, frets over Olympics risks"    Reuters Mar 17, 2014
"Windows XP deadline to leave 10 per cent of government PCs vulnerable"    TechRadar Mar 17, 2014
"LightOut is Latest Cyber Threat to Target Energy Sector"    InfoSec Magazine Mar 15, 2014
"The Next Move for Cyberwarfare Armies"    ADI News Mar 14, 2014
"Apple Inc.’s (AAPL) Safari browser tough but not invulnerable, according to PWN2OWN hackers"    PF Hub Mar 14, 2014
"Chinese hacker cracks Safari, wins $62.5K, praises Apple's security"    CNN Money Mar 14, 2014
"Gone phishing: Army uses Thrift Savings Plan in fake e-mail to test cybersecurity awareness"    Washington Post Mar 14, 2014
"All hacking eyes on the prize money at CanSecWest"    CNet Mar 13, 2014
"McAfee President Pulls Back Curtain on Cyber Security"    St Mary's College Mar 13, 2014
"New EU cybersecurity law avoids making big Internet companies report breaches"    Network World Mar 13, 2014
"State-Sponsored Cybercrime: From Exploitation to Disruption to Destruction"    Alston & Bird Mar 13, 2014
"The Cyberspies Who Don't Love Us"    The Cutting Edge Mar 12, 2014
"Web founder Berners-Lee calls for online 'Magna Carta' to protect users"    Reuters Mar 12, 2014
"Amid Cyber-Theft Onslaught, Calit2 Workshop Kicks Off New IP-Focused Program"    Xconomy Mar 11, 2014
"Cybersecurity: The Must-Read Books"    Bank Info Security Mar 11, 2014
"Protecting trade secrets is a challenge in a global economy"    Global Post Mar 11, 2014
"Workshop to Highlight Growing Role of Innovation and IP as Drivers of the Global Economy"    UCSD News Mar 10, 2014
"Cybersecurity"    Hawaii Reporter Mar 10, 2014
"How Many Cyberattacks Hit the United States Last Year?"    NextGov Mar 8, 2014
"Analysis: There's No Real Difference Between Online Espionage and Online Attack"    Nextgov Mar 7, 2014
"Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace"    Heritage Foundation Mar 6, 2014
"Four Federal Cyber Escapades to Watch for This Spring"    Nextgov Mar 5, 2014
"Avoiding data breaches is almost impossible - so now what?"    IT Business (Canada) Mar 3, 2014
"United States: If You Have A Trade Secret, You Better Protect It"    Mondaq Mar 3, 2014
"U.S. military not prepared for cyber warfare, commander warns"    Washington Times Feb 28, 2014
"Here's what $100,000 buys you at the cybersecurity industry's biggest conference"    Washington Post Feb 27, 2014
"How the cloud can improve security: Courtot"    IT Business (Canada) Feb 27, 2014
"U.S. Supreme Court sets record for IP cases in coming year"    Innovation Asset Group Feb 27, 2014
"Israeli venture capital fund is hooked on cyber security"    Haaretz Feb 27, 2014
"The Crisis of the Internet"    Christie Boyden Feb 26, 2014
"US Intelligence Warns On Counterintelligence and Cyber Espionage"    Chainsoff's Blog Feb 26, 2014
"Latest cybersecurity threat: WiFi virus"    Homeland Security News Wire Feb 26, 2014
"Cybersecurity industry at war with itself"    CNBC Feb 26, 2014
"H-P Lands $32M Cyber Security Contract From Dept. of Homeland Security"    Fox Business Feb 26, 2014
"U.S. military is playing catch-up in digital media war"    Heritage Foundation Feb 24, 2014
"Apple Admits Products Are Vulnerable to Hackers"    ABC News Feb 22, 2014
"White hats to the rescue"    The Economist Feb 22, 2014
"Top 10 worst state-sponsored hack campaigns: From PRISM to Stuxnet and Mask"    V3.CO.UK Feb 21, 2014
"Watch Out, Hackers: This VC-Backed, Israeli Special Ops Cybersecurity Company Will Hunt You Down"    Forbes Feb 21, 2014
"How international relations theory shapes U.S. cybersecurity doctrine"    Washington Post Feb 20, 2014
"ThreatStream Raises $4M From Google Ventures To Add Realtime Cybersecurity Intelligence"    TechCrunch Feb 20, 2014
"What cyberthreats are costing US companies"    CNBC Feb 20, 2014
"Microsoft combats SnowMan hackers with rush fix for Internet Explorer"    V3.CO.UK Feb 20, 2014
"NSA, universities push to establish cybersecurity as a science"    GCN Feb 20, 2014
"Former McAfee CTO's Cyber Security Data Company Cylance Raises $20M From Khosla, Blackstone"    TechCrunch Feb 20, 2014
"Google backs two more cyber security start-ups"    Financial Times Feb 20, 2014
"Hackers dropping Zeus in favour of Xtreme RAT Trojan, reports FireEye"    V3.CO.UK Feb 19, 2014
"Magal Chief Executive Seeks Cyber Security Acquisitions"    Bloomberg Feb 19, 2014
"Microsoft crash reports reveal Houdini hack campaign hitting firms"    V3.CO.UK Feb 19, 2014
"Tech Industry Praises Cybersecurity Framework From White House"    CIO Feb 18, 2014
"Navy Describes Iran Hack Attack As Obama Prepares 'Cybersecurity Framework'"    InfoWars Feb 18, 2014
"Exclusive: France's Snecma targeted by hackers - researcher"    Reuters Feb 18, 2014
"Cyber Security Canon"    Terebrate Feb 16, 2014
"2013 Out-of-Cycle Review of Notorious Markets"    U.S. Trade Representative Feb 12, 2014
"The U.S. Tells You Where to Buy the Best Fake Designer Handbags, Pirated Movies, and More"    U.S. News Feb 12, 2014
"Intellectual Property Theft: A Threat to U.S. Workers, Industries, and Our Economy"    AFL-CIO Feb 12, 2014
"New US cybersecurity standards: Will they do enough?"    Yahoo News Feb 12, 2014
"Government Passwords Are Incredibly Easy to Hack"    Defense One Feb 12, 2014
"Target Corp. Breached at Weakest Link"    Epoch Times Feb 11, 2014
"Cybersecurity expert explains importance of NCCIP Act"    Government Security News Feb 11, 2014
"Cyber criminals target smaller companies"    Financial Times Feb 10, 2014
"What was lost in the rush to the Internet of Things"    Symantec Feb 5, 2014
"DHS Agents Seized More Than $21.6 Million In Fake NFL Merchandise"    HS Today Feb 3, 2014
"Several cyber security initiatives lost after Snowden leaks"    Stars and Stripes Feb 2, 2014
"Two Israeli startups with innovative cybersecurity solutions raise combined $25 million"    Homeland Security News Wire Jan 31, 2014
"National cyber complex to open next to Ben-Gurion University of the Negev campus"    Homeland Security News Wire Jan 31, 2014
"Software piracy hitting pharmaceutical bottom lines"    BioPrepWatch Jan 31, 2014
"International Index Charts Course to Stronger IP Protection"    U.S. Chamber of Commerce Jan 30, 2014
"New Study by Harvard Business School Professor and Nam Chief Economist Shows International Software Piracy Hampering Manufacturers in the U.S."    NAM Jan 30, 2014
"New Study by Harvard Business School Professor and NAM Chief Economist Shows International Software Piracy Hampering Manufacturers in the U.S."    PR Newswire Jan 30, 2014
"New study demonstrates that global software piracy costs U.S. manufacturers jobs, revenue and innovation"    NAM Jan 30, 2014
"New Worldwide Index Reveals Value of Intellectual Property to U.S. Prosperity"    CFIF Jan 30, 2014
"DNI: China, Russia grow as cyber, space threats to U.S. security"    Washington Free Beacon Jan 30, 2014
"3D printing to cost $100bn a year in IP theft"    CRN Jan 29, 2014
"Help the Economy: Protect the Intellecutal Property in Your Business"    Traklight Jan 29, 2014
"Time for a Cybersecurity Overhaul"    Security Affairs Jan 29, 2014
"Charting the Course: Ranking the Players of Global Intellectual Property Rights"    TAPP Jan 29, 2014
"Law enforcement in US, China, India, Romania collaborate to arrest hackers-for-hire"    Naked Security Jan 29, 2014
"Worldwide Threat Assessment of the US Intelligence Community"    U.S. DNI Jan 29, 2014
"GIPC International IP Index"    GIPC Jan 29, 2014
"Care Enough to Protect Your Intellectual Property"    HoGo Jan 23, 2014
"Spies spy: CrowdStrike report says cyberspooks are EVERYWHERE"    The Register Jan 23, 2014
"Hacker Groups Embracing More Effective Tactics in Targeted Attacks"    CIO Jan 23, 2014
"2014's Hacking Pain is Cyber Security's Gain"    Forbes Jan 22, 2014
"CrowdStrike Takes On Chinese, Russian Attack Groups in Threat Report"    Security Week Jan 22, 2014
"Podcast: CrowdStrike’s Adam Meyers Discusses Attacks Emanating from China, Russia and the Middle East"    IT Security News Jan 22, 2014
"Get Ready for Big Data Heists"    Bloomberg Jan 22, 2014
"Politically Motivated Cyberattackers Adopting New Tactics, Report Says"    Dark Reading Jan 21, 2014
"Top 'good guy' hackers to tackle biggest cyber challenges yet"    Times of Israel Jan 20, 2014
"Encrypted Blackphone goes to war with snoopers"    Space Daily Jan 19, 2014
"Warning computer hackers shortens their intrusion"    Phys.org Jan 17, 2014
"Your Biggest Cybersecurity Threat Isn't Coming From the Outside"    Business News Daily Jan 17, 2014
"Hacker threats rise, with defenders lacking: report"    Space Daily Jan 16, 2014
"Hacking threat is posed by malware : study"    All Hacker News Jan 16, 2014
"Cisco 2014 Annual Security Report"    Cisco Jan 16, 2014
"For The First Time, Hackers Have Used A Refrigerator To Attack Businesses"    Business Insider Jan 16, 2014
"State Dept. computers open to hackers: report"    Washington Times Jan 16, 2014
"On-line or off, cyber-spies can get you, Israeli expert says"    Times of Israel Jan 15, 2014
"The dangerous hacking groups you don't know"    CNBC Jan 14, 2014
"'Zero-day' hacking reform raises hackels with US tech groups"    Financial Times Jan 14, 2014
"N.S.A. Devises Radio Pathway Into Computers"    New York Times Jan 14, 2014
"Terror Tactics: Report Urges Government to Use Financial, Trade and Immigration Systems to Squeeze Theft of IP"    Electronics-Trade Blog Jan 13, 2014
"The Scariest Thing About Cybersecurity Is How Unprepared We Are"    Vice: Motherboard Jan 13, 2014
"The State, the Internet and Cybersecurity"    Brookings Institute Jan 13, 2014
"McAfee Labs 2014 Threats Predictions"    McAfee Jan 13, 2014
"McAfee security report suggests 2014 will be a rough year"    Computerworld Jan 13, 2014
"New cyber-attack model helps hackers time the next Stuxnet"    The Conversation Jan 13, 2014
"ASSESSMENT: OSINT On NUCLEAR POWER SYSTEMS"    krypt3ia Jan 11, 2014
"Cyber-security: Small satellite dish systems called ripe for hacking"    Christian Science Monitor Jan 11, 2014
"The case for forecasting cyberattacks"    USA Today Jan 8, 2014
"Top 10 countries where most of the world’s hackers come from"    Hindustan Times Jan 8, 2014
"United States: Trending Issues In The Prosecution Of Trade Secret Theft"    Mondaq Jan 8, 2014
"From Heists to Hacktivists: 2013 Cybersecurity in Review"    Cyber Security Law and Policy Jan 8, 2014
"IPR Remains Among Top USTR Priorities For China In 2014"    IP Watch Jan 7, 2014
"Just the Right Amount of Cyber Fear"    The Atlantic Jan 6, 2014
"Cybersecurity is for the C-suite, 'not just the IT crowd'"    CNN Jan 6, 2014
"Hackers easily hijack Windows crash reports, report says"    Tech Hive Jan 5, 2014
"Windows crash reports may help hackers claims research"    Neowin Jan 5, 2014
"Thousands of visitors to yahoo.com hit with malware attack, researchers say"    Washington Post Jan 4, 2014
"United States: Trade Secrets Watch 2013 Year-In-Review"    Mondaq Jan 2, 2014
"Clean Energy Patent Growth Index"    Cleantech Group Jan 2, 2014
"Cyber security deal highlights threats from spying"    CNBC Jan 2, 2014
"Cybercriminals are eyeing these 5 targets in 2014"    CBC News Jan 2, 2014
"Cybersecurity Deal: FireEye Buying Mandiant for About $1 Billion"    Wall Street Journal Jan 2, 2014
"Cybersecurity forces align as FireEye acquires Mandiant"    CNet Jan 2, 2014
"FireEye Computer Security Firm Acquires Mandiant"    New Yortk Times Jan 2, 2014

2013

"2013 Security Brief: NSA Spying, Adobe Hack, Chinese Cyber Espionage, SEA"    Softpedia Dec 29, 2013
"Beware of counterfeit versions of top Android, iOS apps"    PC World Dec 29, 2013
"BGU researchers identify critical vulnerability Samsung's Galaxy S4"    Homeland Security News Wire Dec 27, 2013
"BGU Security Researchers discover Vulnerability in Samsung's Secure Software on the Company's Flagship Device Galaxy S4"    Ben-Gurion University Dec 24, 2013
"Hackers find cloud servers easy prey"    SF Gate Dec 22, 2013
"Hacking Back: For Now, Be Vigilant Rather Than a Vigilante"    JD Supra Dec 20, 2013
"Appointment & Timing of "Deputy" USPTO Director Disturbs Many"    IP Closeup Dec 18, 2013
"How hackers made minced meat of Department of Energy networks"    ARS Technica Dec 16, 2013
"Top 100 Android apps hacked in 2013"    Net Security Dec 13, 2013
"Secret TPP intellectual property agreement misses deadline"    PC World Dec 10, 2013
"Someone's Been Siphoning Data Through a Huge Internet Security Hole"    GIZMODO Dec 6, 2013
"Internet Firms Step Up Efforts to Stop Spying"    New York Times Dec 5, 2013
"Microsoft's General Counsel: N.S.A. Hacks Were an 'Earthquake' for Tech"    New York Times Dec 5, 2013
"Someone's Been Siphoning Data Through a Huge Security Hole in the Internet"    Wired Dec 5, 2013
"The Department of Energy's July 2013 Cyber Security Breach"    U.S. Dept. of Energy Dec 5, 2013
"Kaspersky Lab Names This Year's Top Cyber Security Threats"    Forbes Dec 4, 2013
"Snowden, Cyber-espionage, hacktivism and Bitcoins cause security headaches"    ARN Net Dec 4, 2013
"Cyber-security puzzle: Who is sending Internet traffic on long, strange trips?"    Alaska Dispatch Dec 3, 2013
"US Moving From Technology Leader To Laggard"    Information Week Dec 2, 2013
"Global Fraud Report 2013-2014 Annual edition"    Compliance Alert Dec 2, 2013
"Global Fraud Report 2013-2014 Annual edition"    Economist Dec 2, 2013
"Israeli company starts 'Cyber Gym' school for ethical hacking"    NDTV Dec 2, 2013
"Counterfeit Grinches Lure You With Bargains"    NCPC Nov 27, 2013
"Cyber Monday Means Bargains, Convenience...and Counterfeits"    StreetInsider Nov 27, 2013
"Symantec CEO Declares IP Theft Greater Threat Than Cyber War"    InfoSecurity Magazine Nov 26, 2013
"Symantec chief warns over cyber threat to intellectual property"    Financial Times Nov 26, 2013
"Cyberthreats on the rise, says McAfee Labs report"    CNBC Nov 25, 2013
"Investigators warn dangerous counterfeit items are on sale this holiday shopping season"    ABC News Nov 21, 2013
"The New Threat: Targeted Internet Traffic Misdirection"    Renesys Nov 19, 2013
"New Strategies in the Battle Against IP Theft"    Corporate Counsel Nov 18, 2013
"Trans-Pacific Partnership – similar to, but stronger than, SOPA and ACTA"    InfoSecurity Magazine Nov 16, 2013
"IP theft costs Australia $15bn"    The Australian Nov 15, 2013
"IT security costs countries more than gained: Report"    ZD Net Nov 15, 2013
"Microsoft opens a futuristic Cybercrime Center in Redmond to tackle botnets, malware and more"    TheNextWeb Nov 14, 2013
"Microsoft unveils state-of-the-art Cybercrime Center"    Microsoft Nov 14, 2013
"Hackers may have stolen data during International Atomic Energy Agency raid"    V3.CO.UK Nov 13, 2013
"International Atomic Energy Agency hit by unknown malware attack"    V3.CO.UK Nov 12, 2013
"How Corporate America fights hackers"    CNN Money Nov 11, 2013
"Cyber Readiness Index 1.0"    Harvard Nov 1, 2013
"It's Now Clear That Edward Snowden's Life Is Dictated By Russian Intelligence"    Business Insider Nov 1, 2013
"McAfee Labs Threats Report: Third Quarter 2013"    McAfee Nov 1, 2013
"How Edward Snowden Escalated Cyber War With China"    Newsweek Nov 1, 2013
"Intellectual Property Theft - Stealing Ideas: Manufacturers Feel the Brunt"    Verizon Oct 30, 2013
"Protecting Your Critical Infrastructure from Advanced Threats Using Big Data Answers"    HackSurfer Oct 30, 2013
"Snowden's Legacy Weighs On Obama Cybersecurity Meeting"    Wall Street Journal Oct 29, 2013
"The Staggering Cost of Economic Espionage Against the US"    Epoch Times Oct 22, 2013
"Keeping your endpoint data safe: some simple precautions"    The Register Oct 21, 2013
"Snowden says he kept NSA documents from Russian, Chinese Intellegence"    RT America Oct 18, 2013
"Hackers Compromise PR Newswire Customer Database"    Security Week Oct 17, 2013
"Report outlines characteristics of nation-state driven cyber attacks"    The Guardian Oct 16, 2013
"Report: Addressing cyber theft requires clarity, not hype"    CREATE.org Oct 16, 2013
"World War C: Understanding Nation-State Motives Behind Today's Advanced Cyber Attacks"    FireEye Oct 15, 2013
"Government Procurement Challenges: Fakes, IP theft and Corruption [PDF]"    Create.org Oct 15, 2013
"Government Procurement Challenges: Fakes, IP theft and Corruption"    Create.org Oct 15, 2013
"Hackers Target Web Apps as a Bridgehead to the Datacenter"    Security Week Oct 15, 2013
"Cyber warrior shortage hits anti-hacker fightback"    Reuters Oct 13, 2013
"HP Reveals Cost of Cybercrime Escalates 78 Percent, Time to Resolve Attacks More Than Doubles"    HP Oct 8, 2013
"Security compromised at security companies -- during Cyber Security Month"    Fox News Oct 8, 2013
"Hackers Purloin 2.9M Adobe Customers' Data"    TechNewsWorld Oct 4, 2013
"The Adobe Breach This Week Should Get Your Attention"    Nextgov Oct 4, 2013
"Adobe Announces Security Breach"    New York Times Oct 3, 2013
"EU report findings: ICC says now is time for leaders to step up IP protection"    International Chamber of Commerce Oct 3, 2013
"Illegal Access to Adobe Source Code"    Adobe Oct 2, 2013
"National Cyber Security Awareness Month 2013"    FBI Oct 1, 2013
"The State of the Internet: Q1, 2013"    TechCrunch Oct 1, 2013
"Cybersecurity Legislation Asked for by NSA Director"    WebProNews Sep 27, 2013
"National Cyber Security Awareness Month starts 1 October"    Homeland Security News Wire Sep 26, 2013
"Security Staff Feel Largely Unprepared for Cyber-Espionage and APTs"    InfoSecurity Magazine Sep 26, 2013
"U.S. officials woo tech companies in new push for cybersecurity law"    Reuters Sep 25, 2013
"Cyber Theft of Competitive Data: Asking the Right Questions"    Brookings Institute Sep 25, 2013
"America's hypocritical approach to economic espionage"    CNN Money Sep 24, 2013
"Senate working on counterpart to CISPA cybersecurity bill"    The Hill Sep 24, 2013
"Why Antivirus Software Isn't Enough To Fend Off Attacks"    Forbes Sep 23, 2013
"Close the N.S.A.'s Back Doors"    New York Times Sep 21, 2013
"FireEye's debut signals red hot interest in cybersecurity"    Yahoo News Sep 21, 2013
"Hacking U.S. Secrets, China Pushes for Drones"    New York Times Sep 20, 2013
"Cyber security: The new arms race for a new front line"    Christian Science Monitor Sep 15, 2013
"White House cybersecurity official says 'no new regulations'"    Inside Cybersecurity Sep 13, 2013
"Congress appears in no rush on cyber legislation"    Inside Cybersecurity Sep 13, 2013
"G-20 Urged to Treat Cyber-Attacks as Threat to Global Economy"    Bloomberg Sep 13, 2013
"NIST seeks early adopters of draft cybersecurity framework"    Inside Cybersecurity Sep 13, 2013
"4 ways to stop a cyber 9/11"    The Business Journals Sep 11, 2013
"Group-IB Threat Intelligence Report 2012–2013 H1"    Security Affairs Sep 11, 2013
"Proposed NIST cyber framework nearly complete, faces major implementation questions"    Inside Cybersecurity Sep 11, 2013
"Protecting Intellectual Property is Critical to our Economy"    Trade Reform Sep 11, 2013
"Threat Intelligence Report"    Group IB Sep 11, 2013
"Uncle Sam's Economic Espionage – Not Looking for Your Trade Secrets"    National Law Review Sep 10, 2013
"Government Announces Steps to Restore Confidence on Encryption Standards"    New York Times Sep 10, 2013
"Internet experts want security revamp after NSA revelations"    Reuters Sep 7, 2013
"N.S.A. Able to Foil Basic Safeguards of Privacy on Web"    New York Times Sep 6, 2013
"Trade Secret Law in a Nutshell"    UNH Law Sep 6, 2013
"Why We Published the Decryption Story"    ProPublica Sep 5, 2013
"Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security"    ProPublica Sep 5, 2013
"U.S. Chamber of Commerce has unveiled a proposal aimed at creating tough rules for the theft of trade secrets within the context of the Trans-Pacific Partnership, including the installation of criminal sanctions, which many TPP countries currently lack"    UNH Law Sep 4, 2013
"G20: All Access - Local companies highlight need to combat IP theft"    ABC News Sep 3, 2013
"Global conditions pose challenges, incentives for cybersecurity standards"    Inside Cybersecurity Sep 3, 2013
"IP Contribution Report"    OHIM Sep 1, 2013
"When Theft Trumps Innovation"    KPLU/NPR Aug 27, 2013
"Cyber Security Ranked Third on Lloyd's Of London Risk Index"    Tripwire Aug 22, 2013
"The Pentagon as Silicon Valley's Incubator"    New York Times Aug 22, 2013
"Pro-Patent Momentum on the Rise?"    IP CloseUp Aug 20, 2013
"Is cyber the new gunpowder and corruption the spark?"    Reuters Aug 14, 2013
"Japan Battery Maker Makes Case For Intellectual Property Paranoia"    Wall Street Journal Aug 13, 2013
"Printing Hard Copies of Stolen Source Code: The Difference Between Freedom and Incarceration in the Second Circuit"    Trade Secrets Watch Aug 13, 2013
"Administration Issues Latest Road Map to Combat Trade Secret Theft"    JD Supra Aug 12, 2013
"Stop the Grandstanding on Patent Trolls"    IP CloseUp Aug 11, 2013
"The Big Shift: The End Of The Era Of Great Invention"    Forbes Aug 11, 2013
"Jon Kyl: Don't weaken intellectual property rights"    USA Today Aug 9, 2013
"Cybersecurity and the board of directors: avoiding personal liability - Part II of III"    Reuters Aug 6, 2013
"FBI's new iGuardian portal aims to ease cyber crime reporting"    CSO Online Aug 5, 2013
"The Emerging Risks of Unauthorized IP in Your Supply Chain and How You Should Respond"    JD Supra Aug 3, 2013
"Is IP Theft the Leading Cause of Tech Decline in the US?"    Chip Design Aug 1, 2013
"Poison Ivy: Assessing Damage and Extracting Intelligence"    FireEye Aug 1, 2013
"U.S. IP Commission Explores Foreign Theft; Ignores Domestic"    IPCloseUp Jul 31, 2013
"Address the patent trolls, but don't ignore the patent evaders"    The Hill Jul 31, 2013
"Computer scientists achieve 'iron wall' software obfuscation to protect IP"    Wired Jul 31, 2013
"Long story short: Fair use is theft by any other name"    Brisbane Times Jul 31, 2013
"Former Wash. AG named president of alliance aimed at stopping IP theft"    Legal Newsline Jul 30, 2013
"Protect your small business from cybercrime"    USA Today Jul 30, 2013
"Senators take aim at foreign cybercriminals"    Politico Jul 30, 2013
"A Fractured Fairy Tale: Separating Fact & Fiction on Patent Trolls"    IPWatchDog Jul 29, 2013
"Cyber espionage costs 508,000 jobs in the US"    V3.CO.UK Jul 23, 2013
"Cybersecurity and the board of directors: avoiding personal liability - Part I of III"    Reuters Complinet Jul 23, 2013
"N.S.A. Imposes Rules to Protect Secret Data Stored on Its Networks"    New York Times Jul 18, 2013
"One big threat to cybersecurity: IT geeks can't talk to management"    Quartz Jul 13, 2013
"Senate signals piecemeal approach on cybersecurity"    FCW Jul 12, 2013
"A list of significant cyber events since 2006"    Center for Strategic & International Studies Jul 11, 2013
"Defence partnership tackles cyber security risks"    GOV.UK Jul 5, 2013
"Fear of IP theft a "growing concern" for emerging economies"    WIPR Jun 27, 2013
"State AGs Developing Groundbreaking Solutions to Battle IT Theft and Unfair Competition"    Yahoo Jun 26, 2013
"Troubled waters: the risks of international commercial disputes"    Reed Smith Jun 24, 2013
"UK Home Office invests £4m to raise SMBs' cyber threat awareness"    V3.CO.UK Jun 21, 2013
"G-20 Urged to Treat Cyber-Attacks as Threat to Global Economy"    Washington Post Jun 13, 2013
"Stop thief! Time to limit US IP theft"    TheHill Jun 10, 2013
"Bipartisan Effort to Punish Nation-State Cyber Hackers"    Homeland Security & Government Affairs Jun 6, 2013
"Spooks nicking your tech? What you need is THE CLOUD - NSA boss"    The Register Jun 5, 2013
"Policy Feature Issue: Global Intellectual Property Theft"    GOP.gov Jun 4, 2013
"Attacking the attackers: Can active cyber defense stay within the rules?"    GCN May 28, 2013
"IP theft commission wants to use rootkits and malware to attack piracy"    Tech2 May 28, 2013
"Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies"    Washington Post May 27, 2013
"Slowed by Debate and Uncertainty, New Rules Green Light Response to Cyber Attacks"    Defense News May 27, 2013
"Protecting Know-How In China: Process Is Simple And Complex"    Forbes India May 20, 2013
"Top U.S. admiral puts cyber security on the Navy's radar"    News Daily May 13, 2013
"Inside a Cyber War Room: The Fight Against Hacking"    CNBC May 7, 2013
"Combating IP Theft Using Unfair Competition Law"    New York Law Journal May 6, 2013
"Ukraine named as piracy Priority Foreign Country"    Advanced Television May 2, 2013
"Global Piracy, SAP, Takeda, Goldman: Intellectual Property (1)"    Bloomberg May 2, 2013
"2013 Special 301 Report"    USTR May 1, 2013
"US embassies worldwide take to Facebook in bizarre promotion of 'World IP Day'"    ARS Technica Apr 26, 2013
"Intellectual Property (IP) Theft Enforcement Program"    U.S. Dept. of Justice Apr 26, 2013
"Organised crime linked to IP theft"    News 24 Apr 26, 2013
"State of Intellectual Property"    U.S. Chamber of Commerce Apr 26, 2013
"Latest U.S. Efforts to Prosecute Trade Secret Theft Hit a Few Snags"    Crime in the Suites Apr 23, 2013
"New IPC Certification Program Helps Electronics Manufacturers Protect Intellectual Property"    IPC Apr 19, 2013
"U.S. House OKs bill to protect businesses against cyberattacks"    Detroit News Apr 19, 2013
"Cyber Security and Cyber Espionage: A CCCA Panel"    Slaw Apr 16, 2013
"Cyberattacks, corporate espionage now targeting smaller companies"    CBC News Apr 16, 2013
"Q&A: Why cyberspies are targeting small businesses"    USA Today Apr 16, 2013
"Government pledge to make UK one of the safest places to do business in cyberspace"    The Daily Telegraph (UK) Apr 14, 2013
"Cybersecurity Responding to the Threat of Cyber Crime and Terrorism"    FBI Apr 12, 2013
"New cybersecurity bill: Privacy threat or crucial band-aid?"    Christian Science Monitor Apr 10, 2013
"A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace"    Heritage Foundation Apr 1, 2013
"Concerns about cybersecurity"    Ernst & Young Apr 1, 2013
"UK Government Establishes 'Fusion Cell' to Combat Cyber Attacks"    International Business Times Mar 27, 2013
"Spies and Big Business Fight Cyberattacks"    International Herald Tribune Mar 27, 2013
"Government to protect UK's £82bn digital economy with cyber crime task force"    V3.CO.UK Mar 21, 2013
"The Looming Threats of Cyber War and Cyber Espionage"    The Crime Report Mar 21, 2013
"White House Shares Plan to Mitigate Trade Secret Theft"    IP Watchdog Mar 10, 2013
"Investing Opportunity: Prepping For Cyber Pearl Harbor"    Forbes Mar 7, 2013
"Stopping Rampant Intellectual Property Theft With NAJI"    Manufactoring.net Mar 7, 2013
"DHS Notifies Companies, Offers Intel about Ongoing Hacks"    NextGov Feb 25, 2013
"Analysis: The near impossible battle against hackers everywhere"    Reuters Feb 24, 2013
"Disclosure Plays Into Hackers' Hands"    New York Times Feb 22, 2013
"A National Priority and a Business Priority"    New York Times Feb 21, 2013
"Average computer users need to be on their guard for hackers, too"    Washington Times Feb 20, 2013
"Nuclear Lab Remains Vulnerable to Cyberstrikes, Energy IG Say"    NextGov Feb 15, 2013
"Cybersecurity research gets boost in 2013 budget request"    GCN Feb 14, 2013
"Executive Order -- Improving Critical Infrastructure Cybersecurity"    White House Executive Order Feb 12, 2013
"Employee IP Theft is Common"    Symantec Feb 11, 2013
"Symantec raises the alarm over employee IP theft"    IT Pro Feb 7, 2013
"Administraion Strategy on Mitigating the Theft of U.S. Trade Secrets"    Scribd Feb 1, 2013
"Administration Strategy on Mitigating the Theft of U.S. Trade Secrets"    OMB Feb 1, 2013
"Pentagon Expanding Cybersecurity Force to Protect Networks Against Attacks"    New York Times Jan 27, 2013
"Brocade Awarded Permanent Injunction in Intellectual Property Theft Case Against A10 Networks"    MarketWire Jan 11, 2013
"European agencies at center of cyberspying campaign"    Pitssburgh Post Gazette Jan 5, 2013

2012

"Report: US government plans legal assault on foreign hackers"    The Register Dec 20, 2012
"The Conference Board Launches New Report Highlighting Risks of Intellectual Property Theft and Corruption in Supply Chains"    CNBC Dec 19, 2012
"Hype and fear"    The Economist Dec 8, 2012
"Time Line: Fighting Intellectual Property Theft"    Risk Management Dec 6, 2012
"2012: The year in cybersecurity"    FCW Dec 5, 2012
"Experts develop protections for product piracy, intellectual property theft"    Search Security Dec 5, 2012
"The Conference Board Launches New Report Highlighting Risks of Intellectual Property Theft and Corruption in Supply Chains"    PR Newswire Dec 3, 2012
"Global Intellectual Property Center (GIPC) International IP Index"    U.S. Chamber of Commerce Dec 1, 2012
"Safeguarding Intellectual Property and Addressing Corruption in the Global Supply Chain"    The Conference Board Dec 1, 2012
"Step Into the Arena and Be Prepared to Get Dirty: Apple vs. Samsung"    IP Made Simple Nov 29, 2012
"The Curious Case of Samsung's Missing TVs"    Bloomberg Nov 29, 2012
"Attacks targeting government info, intellectual property grow more complex"    GCN Nov 15, 2012
"A Need for Clearer Disclosure Rules after Cyberattacks"    New York Times Nov 9, 2012
"Welcome to the era of drive-by hacking"    BBC Nov 6, 2012
"Intellectual Property Theft Hurts Small Businesses"    Hispanic Business Nov 4, 2012
"Intangible Theft"    Intellectual Property Office (UK) Nov 1, 2012
"The bloody patent battle over a healing machine"    CNN Oct 30, 2012
"IP Theft, Supply Chain Security Major Worries for Government, Former Cybersecurity Czar Says"    Threat Post Oct 26, 2012
"IP Theft: Dyson Accuses Bosch Of Industrial Spying"    Manufacturing Executive Oct 25, 2012
"Verizon Releases Industry-by-Industry Snapshots of Cybercrime, Based on the Data Breach Investigations Report Series"    Wall Street Journal Oct 24, 2012
"Cyberwarfare"    New York Times Oct 24, 2012
"Report sheds light on intellectual property theft"    Security Info Watch Oct 24, 2012
"IP Theft Emerges as an Inside Job"    Point 2 Security Oct 23, 2012
"Kroll Global Fraud Report Annual Edition 2012/13"    Kroll Advisory Solutions Oct 16, 2012
"Ready Player One: Did the Pentagon just take over America's cybersecurity?"    FP National Security Oct 12, 2012
"School settles laptop spying case to 'protect taxpayers'"    ARS Technica Oct 12, 2012
"Panetta divulges secrets to make cyber-security come alive"    FP National Security Oct 11, 2012
"Panetta Warns of Dire Threat of Cyberattack on U.S."    New York Times Oct 11, 2012
"Pentagon Chief Reveals 'Classified' Cyber Threats"    Wired" Oct 11, 2012
"Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City"    U.S. Department of Defense Oct 11, 2012
"Automated Toolkits Named in Massive DDoS Attacks Against U.S. Banks"    Threat Post Oct 2, 2012
"The Battle to Protect Confidential Data"    Bloomberg Oct 2, 2012
"'Historic' DDoS Attacks Against Major U.S. Banks Continue"    Threat Post Sep 27, 2012
"Smart Grid Cybersecurity Alert: Telvent Reports Hack"    Green Tech Media Sep 27, 2012
"Maker of Smart-Grid Control Software Hacked"    Wired Sep 26, 2012
"Microsoft Carries out Nitol Botnet Takedown"    Threat Post Sep 12, 2012
"Shamoon The Wiper: further details"    SecureList Sep 11, 2012
"Cyber attacks grow increasingly 'reckless', official says"    Reuters Sep 7, 2012
"The Elderwood Project"    Symantec Sep 7, 2012
"Guarding the Grid Against the New Breed of Cybercrime"    Green Tech Media Sep 5, 2012
"Espionage Hackers Target 'Watering Hole' Sites"    Krebs on Security Sep 1, 2012
"Tagging and Tracking Espionage Botnets"    Krebs on Security Sep 1, 2012
"Bungling Cyber Spy Stalks Iran"    Technology Review Aug 31, 2012
"Connecting the Dots After Cyberattack on Saudi Aramco"    New York Times Aug 27, 2012
"Saudi Aramco Confirms Scope of Malware Attack"    Threat Post Aug 27, 2012
"Smart Grid Cybersecurity: DHS Reports Vulnerability in RuggedCom's Software"    Green Tech Media Aug 23, 2012
"Siemens 'flaw' claim sparks US power plant security probe"    BBC Aug 22, 2012
"'Degrade, Disrupt, Deceive': U.S. Talks Openly About Hacking Foes"    Wired Aug 11, 2012
"Darpa Looks to Make Cyberwar Routine With Secret 'Plan X'"    Wired Aug 11, 2012
"Qatari Gas Company Hit With Virus in Wave of Attacks on Energy Companies"    Wired Aug 3, 2012
"The Impact of Intellectual Property Theft on the Economy"    Report by the US Congress Joint Economic Committee Chairman's Staff - Senator Bob Casey - Chairman Aug 1, 2012
"Rise Is Seen in Cyberattacks Targeting U.S. Infrastructure"    New York Times Jul 26, 2012
"Foreign intelligence agencies are biggest online threat, ex-Fed warns"    The Register Jul 25, 2012
"White Paper: Chasing APT"    DELL SecureWorks Jul 23, 2012
"Research on Hardware Security"    Sergei Skorobogatov May 31, 2012
"Anonymous Launches Cyberattack Salvo on China"    TechNewsWorld May 28, 2012
"Massive targeted cyber-attack in Middle East uncovered"    CNET Network May 28, 2012
"Chinese official's downfall tied to wiretapping spree"    The New York Times Apr 26, 2012
"Cyber Theft of Corporate Intellectual Property"    The Economist Apr 24, 2012
"2012 Data Breach Investigations Report"    Verizon Apr 5, 2012
"10 Steps for Early Incident Detection"    Tripwire Apr 1, 2012
"Japan joins worry list after losing the electronics plot"    The Australian Mar 29, 2012
"Labor Takes Brave, True Path on Huawei and Tibet"    The Australian Mar 29, 2012
"Taiwan giant buys into Sharp"    The Australian Financial Review Mar 29, 2012
"McAfee: Corporate Espionage Is the Currency of Cybercrime"    PCWorld Mar 28, 2012
"Hacktivism Is The Rising Cause of Data Breaches, Verizon Finds"    Security Week Mar 22, 2012
"Cyber Theft of Corporate Intellectual Property"    Economist Intelligence Unit and Booz Allen Hamilton Mar 12, 2012
"NSF: US losing ground as more R&D jobs head overseas"    EE Times Jan 20, 2012
"'Red October' Cyberattack Ring Is Uncovered"    Wall Street Journal Jan 14, 2012
"Oil above $110 on Iran, China data"    Reuters Jan 3, 2012

2011

"Intellectual property theft fuels underground cyber economy"    Venture Beat Mar 27, 2011