2022
|
| "The Party Group of the Municipal Intellectual Property Office studied and discussed the spirit of the 20th National Congress of the Communist Party of China to accelerate the construction of a demonstration city for a strong intellectual property country" |
Qianlong.com.cn |
Nov 5, 2022 |
| "CISA Alert: APT Groups Had “Long-Term Access” to a Defense Organization, Exfiltrated Sensitive Data" |
CPO Magazine |
Oct 15, 2022 |
| "Bipartisan senators urge Biden to take executive action to create additional outbound investment screen" |
Homeland Preparedness News |
Sep 29, 2022 |
| "Cyberattacks by nation-states affect a majority of organizations, security pros say" |
SC Media |
Aug 24, 2022 |
| "Protecting against cyber threats from nation states" |
Open Access Government |
Aug 19, 2022 |
| "MARQVISION RAISES $20 MILLION SERIES A FOR FIRST-OF-ITS-KIND OPERATING SYSTEM FOR INTELLECTUAL PROPERTY" |
NFT Culture |
Aug 3, 2022 |
| "‘Blended threat’: DOJ warns of China, Russia, and North Korea allying with hackers" |
Washington Examiner |
Jul 19, 2022 |
| "Texas A&M’s Unreported Foreign Funding" |
Wall Street Journal |
Jun 17, 2022 |
| "Alibaba, Other Chinese Stocks Brace For Uncertainty As US Looks To Monitor, Restrict Investment In China" |
Benzinga |
Jun 14, 2022 |
| "Patent Poetry: Jury Awards $2 Billion in Trade Secret Theft Case" |
JD Supra |
May 31, 2022 |
| "Richard C. Owens: On IP appropriation, just say no to the WHO" |
Financial Post |
May 23, 2022 |
| "More than $3.65 million in illegal goods, medicine seized in 24-hour period" |
Kentucky Today |
May 19, 2022 |
| "Series: Types of Industrial Espionage" |
National Law Review |
May 10, 2022 |
| "Apple sues chip startup Rivos for alleged trade secret theft " |
Inferse |
May 6, 2022 |
| "As Russian Cyber Threats Grow, Securing Intellectual Property Must Be an Urgent National Security, Economic Priority" |
CPO Magazine |
Apr 27, 2022 |
| "State Department Launches New Cybersecurity Bureau" |
CNet |
Apr 4, 2022 |
| "Samsung Electronics employee allegedly caught stealing trade secrets" |
SAM Mobile |
Mar 25, 2022 |
| "The ex parte seizure order in trade secrets: then and now" |
Reuters |
Feb 1, 2022 |
2021
|
| "Why It's Time to Talk About Nation-State Attacks...Again" |
Info Security |
Nov 30, 2021 |
| "Intellectual Property: The New Silent Target of Cybertheft" |
Masuda |
Nov 8, 2021 |
| "US Offers Reward for Info on Darkside Ransomware Gang" |
HackRead |
Nov 4, 2021 |
| "Reward Offers for Information to Bring DarkSide Ransomware Variant Co-Conspirators to Justice" |
Data Breaches |
Nov 4, 2021 |
| "In Other Words: Time to punish big tech's IP theft" |
Argus Observer |
Oct 24, 2021 |
| "POLITICS
America must protect these 5 technologies if it wants to remain a superpower, intelligence officials warn" |
CNBC |
Oct 22, 2021 |
| "Google warns of surge in activity by state-backed hackers" |
The Gaurdian |
Oct 15, 2021 |
| "U.S. hosts global talks on China, Russia cyber threats" |
Nikkei Asia |
Oct 13, 2021 |
| "Intellectual Property Theft/Piracy News" |
FBI |
Oct 9, 2021 |
| "Tesla Amps Up Rivian Poaching Fight, Cites Battery Secrets Theft" |
Bloomberg |
Oct 3, 2021 |
| "UK to build £5bn digital warfare centre to mount ‘offensive’ cyber attacks" |
The Free Press |
Oct 2, 2021 |
| "Microsoft : How nation-state attackers like NOBELIUM are changing cybersecurity" |
Market Screener |
Sep 29, 2021 |
| "Multiple Defendants Indicted in Alleged Intellectual Property Theft Scheme" |
Imperial Valley News |
Sep 26, 2021 |
| "Lawmakers Share Huawei Concerns with US State Department" |
Data Breach Today |
Sep 23, 2021 |
| "Automotive Industry Faces Severe Data Breaches and Ransomware Threats, CybelAngel Investigation Reveals" |
Businesswire |
Sep 14, 2021 |
| "Acknowledging the Importance of Intellectual Property Rights on Constitution Day" |
CAGW |
Sep 14, 2021 |
| "DEFEND3D INTRODUCES NEW PATENTED TECHNOLOGY TO COMBAT CYBERCRIME AND IP THEFT" |
3D Printing Industry |
Sep 3, 2021 |
| "HashCash Builds a Blockchain-based Intellectual Property Protection Prototype" |
WFMZ News |
Aug 28, 2021 |
| "Former Applied Materials Employee Convicted of Trade Secret Theft" |
Bertram |
Aug 26, 2021 |
| "Intellectual property protection: 10 tips to keep IP safe" |
CSO Online |
Aug 26, 2021 |
| "US State Department Hit By Cyber-Attack" |
InfoSecurity |
Aug 23, 2021 |
| "Masimo Sues Apple, Seeks to Stop Smartwatch Imports" |
ORANGE COUNTY BUSINESS JOURNAL |
Aug 23, 2021 |
| "State Department is hit by a cyber attack amid US efforts to evacuate thousands of Americans and Afghan allies from Kabul" |
Daily Mail (UK) |
Aug 21, 2021 |
| "Weighing up the state of cyber security in 2021" |
Channel Asia |
Aug 2, 2021 |
| "Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention" |
Datacenter Knowledge |
Jul 30, 2021 |
| "The Cyber Apocalypse Never Came. Here's What We Got Instead." |
Politico |
Jul 28, 2021 |
| "Pilot Sues Delta For $1 Billion Over Trade-Secrets Theft" |
One Mile at a Time |
Jul 15, 2021 |
| "Couple Convicted of Theft of Biotech Trade Secrets from Genentech; JHL Biotech Founders Face Similar Charges" |
California News Times |
Jul 9, 2021 |
| "JHL EXECS INDICTED FOR THEFT OF GENENTECH TRADE SECRETS" |
PharmaLive |
Jul 8, 2021 |
| "Feds Convict Couple in Theft of Genentech Trade Secrets" |
NBC |
Jul 8, 2021 |
| "Cyber retaliation, cyber deterrence, and cyber diplomacy." |
The Cyberwire |
Jul 7, 2021 |
| "Former CEO And COO Of JHL Biotech Charged With Conspiracy To Steal Trade Secrets And Commit Wire Fraud Exceeding $101 Million" |
US DOJ |
Jul 7, 2021 |
| "The future of China-US relations" |
TRT World |
Jul 6, 2021 |
| "US the Only Top Tier Cyber-power" |
Info Security |
Jun 28, 2021 |
| "DOD Offering Defense Industrial Base a ‘Krystal Ball’ Into Adversary Insights" |
Nextgov |
Jun 25, 2021 |
| "Ocado co-founder settles with firm over information theft claim" |
The Guardian |
Jun 25, 2021 |
| "Fast Track to Justice for Trade Secret Theft at the ITC: New Senate Bill Would Expand ITC Authority to Curtail Trade Secret Theft by Foreign Governments" |
JD Supra |
Jun 24, 2021 |
| "Biden’s Executive Order on Protecting Americans’ Sensitive Data from Foreign Adversaries" |
JD Supra |
Jun 24, 2021 |
| "EU to form united front to battle Chinese and Russian cyberthreats" |
Nikkei Asia |
Jun 24, 2021 |
| "5 Trade Secret Protection Steps Employers Should Take in Response to New Corporate Espionage in Florida Act" |
JD Supra |
Jun 22, 2021 |
| "Cybercriminals Increasingly Target Manufacturing, IP" |
Security Boulevard |
Jun 21, 2021 |
| "CBP at JFK Seizes Counterfeit Rolex Watches" |
US CBP |
Jun 21, 2021 |
| "National policy on intellectual property rights ready soon" |
The Nation |
Jun 20, 2021 |
| "The Cybersecurity 202: The U.S. government is getting closer to having a national cyber czar" |
Washington Post |
Jun 10, 2021 |
| "National Security Implications of the Colonial Pipeline Hack" |
Law.Com |
Jun 10, 2021 |
| "Sanctions for Trade Secret Thieves Part of Senate-Passed Bill" |
Bloomberg |
Jun 9, 2021 |
| "Steve Wozniak to Go to Trial: Apple Co-Founder Faces Lawsuit for Intellectual Property and Copyright Theft" |
Entrepreneur |
May 25, 2021 |
| "Russia and China accuse the UK of using cyborgs to “destroy” the West." |
Decommissioning News |
May 15, 2021 |
| "Moderna: A Suspension Of Intellectual Property Is A Real Threat" |
Seeking Alpha |
May 13, 2021 |
| "Ransomware Attack Shuts Down Massive East Coast Gasoline Pipeline" |
Forbes |
May 8, 2021 |
| "The US Needs to Impose Costs on China for Its Economic Warfare" |
Defense One |
May 8, 2021 |
| "Van Hollen, Sasse Revive Bill To Protect U.S. Intellectual Property From Foreign Theft" |
Patch |
May 7, 2021 |
| "Global trends will increase nation-state threats for the US in next 20 years" |
CSO Magazine |
Apr 21, 2021 |
| "US Bill to pressure China on trade and rights, back Taiwan" |
CNA |
Apr 9, 2021 |
| "Wisk Aero Sues Archer Aviation for Theft of Trade Secrets and Patent Infringement" |
PR Newswire |
Apr 6, 2021 |
| "US Tech Dominance Rides on Securing Intellectual Property" |
Dark Reading |
Apr 2, 2021 |
| "2021 Executive Leadership Predictions For A Data-Rich World" |
Forbes |
Feb 1, 2021 |
| "Senate Passed New Legislation to Punish Foreign Individuals and Corporations for IP Theft" |
Trade Secrets Trends |
Jan 26, 2021 |
| "Upcoming book reveals counterfeiters are lurking next door--wreaking havoc and endangering consumers" |
PR Newswire |
Jan 26, 2021 |
| "ATTACKERS EYEING CLOUD PLATFORMS" |
Dou Security |
Jan 16, 2021 |
2020
|
| "Who Owns Intellectual Property?" |
The Corner (EU) |
Dec 13, 2020 |
| "EMA Server Breached, Hackers Steal Pfizer/BioNTech Vaccine Data" |
BioSpace |
Dec 10, 2020 |
| "The Geopolitics of Cybersecurity" |
The Diplomat |
Dec 9, 2020 |
| "Global losses from cybercrime skyrocketed to nearly $1 trillion in 2020, new report finds" |
Washington Post |
Dec 7, 2020 |
| "McAfee report says cybercrime to cost world economy over $1 trillion" |
Business Standard |
Dec 7, 2020 |
| "Cybersecurity 2021: nation-state hacking, network vulnerability and social media manipulation" |
Silicon Angle |
Dec 7, 2020 |
| "Police arrest two in data theft cyberattack on Leonardo defense corp" |
Bleeping Computer |
Dec 5, 2020 |
| "EU eyes tougher measures against foreign industrial espionage" |
Reuters |
Nov 25, 2020 |
| "Commission charts increased data sharing in leaked IP strategy" |
EURACTIV |
Nov 23, 2020 |
| "Cybercrime will total $ 10.5 trillion in 2025" |
Business Aviattion News |
Nov 23, 2020 |
| "Hackers 'try to steal Covid vaccine secrets in intellectual property war'" |
The Guardian |
Nov 22, 2020 |
| "Four Key Disciplines for Intellectual Property Protection" |
MedTech Intelligence |
Nov 20, 2020 |
| "Cyber espionage; the unwanted growth industry" |
Innovation Australia |
Nov 18, 2020 |
| "ThreatList: Pharma Mobile Phishing Attacks Turn to Malware" |
ThreatPost |
Nov 17, 2020 |
| "Russia, North Korea Accused Of Hacking Vaccine Research" |
Law 360 |
Nov 13, 2020 |
| "Beware Of Online Scammers" |
JD Supra |
Oct 29, 2020 |
| "Price Controls Are Intellectual Property Theft by a Different Name" |
Townhall Media |
Oct 27, 2020 |
| "An assessment of Donald Trump’s record on trade" |
The Economist |
Oct 24, 2020 |
| "Decade-long Oracle-Google copyright case heads to top US court" |
Economic Times |
Oct 6, 2020 |
| "Qualcomm Wins Antitrust Appeal, But Why?" |
ElectroPages |
Aug 18, 2020 |
| "European Union hits Chinese, Russian hackers with first-ever cyberattack sanctions" |
Global News |
Jul 31, 2020 |
| "America's top tech CEOs can't agree on whether China steals from them" |
CNN |
Jul 30, 2020 |
| "EU sanctions Russian, Chinese hackers over alleged cyberattacks" |
Deutsche Welle |
Jul 30, 2020 |
| "EU imposes sanctions on Russian, North Korean, Chinese groups and individuals for major cyberattacks" |
The Hill |
Jul 30, 2020 |
| "Weaponizing Intellectual Property: the Scientist and the Spy" |
CounterPunch |
Jul 22, 2020 |
| "Feds execute search warrants at two manufacturing plants in Rochester" |
WHAM |
Jul 22, 2020 |
| "Trump ends preferential economic treatment for Hong Kong" |
Outlook India |
Jul 15, 2020 |
| "The chance of data being stolen in a ransomware attack is greater than one in ten." |
Security Boulevard |
Jul 13, 2020 |
| "Online training program focuses on intellectual property protection" |
Dayton Daily News |
Jul 10, 2020 |
| "Bill Aims to Protect Intellectual Property on Campuses" |
Malaysia Sun |
Jun 20, 2020 |
| "Fear of the enemy or Trump's cure all?" |
China Global Television Network |
Jun 19, 2020 |
| "The US wants to kill part of an 8,000 mile-long undersea cable linking Hong Kong with LA over China spying fears" |
Yahoo News |
Jun 18, 2020 |
| "University of Dayton School of Law, Air Force Research Laboratory create online intellectual property training program" |
Univ. of Dayton |
Jun 15, 2020 |
| "US Intelligence Reports Warn Of Increasingly Dangerous Cyber ‘Cold War’ - OpEd" |
Eurasia Review |
Jun 14, 2020 |
| "Senators introduce the Protecting American Intellectual Property Act" |
ITPro |
Jun 12, 2020 |
| "Disunited Democracies Cannot Face the Challenge of China" |
Chatham House |
Jun 4, 2020 |
| "The way to defeat China is to be true to ourselves" |
Washington Post |
Jun 3, 2020 |
| "US trade export, import with China slumps by 45% in just 7 months" |
BusinessGhana |
Jun 3, 2020 |
| "Time for smart leaders to come forward on relations with China" |
The Hill |
Jun 3, 2020 |
| "To punish China, Trump begins to revoke Hong Kong trade privileges" |
Politico |
May 29, 2020 |
| "Kaspersky reveals new details into series of targeted attacks on industrial companies" |
Kaspersky |
May 28, 2020 |
| "Defendant sentenced to prison for stealing aircraft trade secrets now faces charges for lying" |
US DOJ |
May 21, 2020 |
| "Cybersecurity: UK manufacturers most attacked industry - NTT" |
Manufacturing Global |
May 20, 2020 |
| "U.S. Trade Representative Releases 2020 Special 301 Report" |
JD Supra |
May 13, 2020 |
| "Comcast Loses IP Theft Case to TiVo" |
Breitbart |
Apr 30, 2020 |
| "Autonomous Driving Startup Zoox Agrees to Settle Lawsuit Filed By Tesla Over Stolen IP" |
FutureCar |
Apr 15, 2020 |
| "These are the countries trying to hack US critical infrastructure" |
TechRepublic |
Apr 6, 2020 |
| "Defend Trade Secrets Act Goes International" |
Law.Com |
Apr 3, 2020 |
| "Evolutions in the U.S. Chinese-Hacking Indictment Strategy" |
LawFare |
Apr 3, 2020 |
| "Levandowski Admits to Stealing Waymo’s IP" |
Security Boulevard |
Mar 26, 2020 |
| "AMD Releases Statement on Theft of Graphics IP" |
ExtremeTech |
Mar 25, 2020 |
| "The Great Chinese Wall – Part 1" |
Times of India |
Mar 24, 2020 |
| "Ex-Inspector General indicted for stealing data on 250k govt colleagues" |
Naked Security |
Mar 10, 2020 |
| "Global Threat Report Has Key Takeaways for IP-Intensive Companies" |
IP Watchdog |
Mar 10, 2020 |
| "Rebelling over Huawei would send China the wrong signal" |
The Standard (UK) |
Mar 10, 2020 |
| "The Trump Administration Takes on Google’s IP Theft" |
American Greatness |
Mar 6, 2020 |
| "Cracking down on theft of U.S. research" |
Richland Source |
Mar 6, 2020 |
| "Trump Versus Comcast" |
NewsMax |
Mar 6, 2020 |
| "Singaporean named to head intellectual property agency" |
Seattle Times |
Mar 4, 2020 |
| "‘Google v. Oracle’ Could Undermine Gains With China" |
Inside Sources |
Feb 27, 2020 |
| "Another global pandemic we’re not talking about: Theft of IP" |
ELETimes |
Feb 27, 2020 |
| "RSA Conference: More countries willing to steal economic secrets" |
IT World Canada |
Feb 27, 2020 |
| "Europe Becomes a Battleground Over Huawei and 5G" |
Courthouse News |
Feb 12, 2020 |
| "Huawei, 5G and the UK: What is the real risk for enterprises?" |
CSO Online |
Feb 12, 2020 |
| "Huawei takes Verizon to court for alleged patent infringement" |
ZDNet |
Feb 6, 2020 |
| "Trump Wins on China Trade Deal" |
American Free Press |
Feb 5, 2020 |
| "FBI: Stealing of Ideas for New Technology Increases" |
VOA |
Jan 19, 2020 |
| "US-China Trade Deal Draws Praise, But Leaves Considerable Unfinished Business" |
VOA |
Jan 16, 2020 |
| "SEC Sets Disclosure Expectations on IP Risks Associated with International Operations" |
Lexology |
Jan 2, 2020 |
2019
|
| "Uber Suffers Setback in Defense Against Waymo’s IP Infringement Case" |
BeInCrypto |
Nov 10, 2019 |
| "9 Ways Data Vampires Are Bleeding Your Sensitive Information" |
Informationweek |
Oct 31, 2019 |
| "An Alphabet Employee Was Charged With Stealing Intellectual Property: Employee Monitoring Can Prevent Future Incidents" |
IT Security Central |
Aug 30, 2019 |
| "Levandowski’s Fate May Turn on the Meaning of ‘Trade Secret’" |
Wired |
Aug 29, 2019 |
| "Google Burned By Insider Who Actively Competed Against His Employer’s Bottom Line" |
Clearance Jobs |
Aug 29, 2019 |
| "Former Seattle Tech Worker Indicted on Federal Charges for Wire Fraud and Computer Data Theft" |
US DOJ |
Aug 28, 2019 |
| "Eight Defendants Charged with Running Two of the Largest Illegal Streaming Services in U.S." |
US DOJ |
Aug 27, 2019 |
| "Former Star Google and Uber Engineer Charged With Theft of Trade Secrets" |
New York Times |
Aug 27, 2019 |
| "New cadre of experts to overhaul DoD’s intellectual property policie" |
Federal News Network |
Aug 27, 2019 |
| "Ex-Uber Engineer Levandowski Charged With Trade-Secret Theft" |
Wired |
Aug 27, 2019 |
| "America's colleges and universities are aggressively addressing foreign threats" |
The Hill |
Aug 22, 2019 |
| "New Warning As Hackers Use Google Drive To Bypass Corporate Security: Report" |
Forbes |
Aug 13, 2019 |
| "Nation State Threats" |
Cyber Defense Magazine |
Aug 13, 2019 |
| "Flamethrower row: Escobar's brother demands $100 mn from Elon Musk" |
Zee News |
Jul 12, 2019 |
| "Russia’s MTS Signs 5G Deal With Chinese Telecom Giant Huawei, Reports Say" |
The Moscow Times |
Jun 6, 2019 |
| "Leading fruit breeders form alliance to fight rising IP infringement" |
Fresh Fruit Portal |
Jun 6, 2019 |
| "Two Louisiana Residents Indicted for Conspiracy to Steal Trade Secrets" |
US Dept. of Justice |
Jun 5, 2019 |
| "Chinese Spies Stole NSA Cyber Weapons Before They Were Leaked by Shadow Brokers" |
CPO Magazine |
May 20, 2019 |
| "Zillow Sues Rival Compass Alleging IP Theft And Breach Of Contract Over Its Artificial Intelligence, Machine Learning, And Cloud Computing Real Estate Technologies" |
JD Supra |
May 16, 2019 |
| "A New Era of Warfare Begins as Cyberattack Leads to Airstrikes" |
Gizmodo |
May 6, 2019 |
| "Chinese spies acquired NSA tools, used them to attack US allies: report" |
The Hill |
May 6, 2019 |
| "Drug Lab Cyberattack Puts Spotlight on IP Theft Threat" |
Bank Info Security |
May 3, 2019 |
| "Intellectual property theft by Chinese corporations take a toll, but so does homegrown poaching" |
EIN World News |
Apr 9, 2019 |
| "Report: Hackers sneak into multiple networks once they get in" |
UPI |
Apr 2, 2019 |
| "Weak links in the defense supply chain" |
FCW |
Mar 31, 2019 |
| "NSA contractor arrested in biggest breach of U.S. secrets pleads guilty" |
Pulse (Nigreia) |
Mar 29, 2019 |
| "Former NSA contractor admits stealing secrets in biggest security breach in US history" |
Washington Examiner |
Mar 28, 2019 |
| "Plagiarism Policing and Profit" |
Inside Higher Ed |
Mar 8, 2019 |
| "The Week in Tech: Chinese and Iranian Hackers Have Returned" |
New York Times |
Feb 22, 2019 |
| "Russian hackers can breach an entire computer network in 18 minutes" |
Nine News (AU) |
Feb 22, 2019 |
| "No more MOUs! USTR Lighthizer tweaks trade terminology after dispute with Trump" |
Reuters |
Feb 22, 2019 |
| "Coons, Tillis to lead Senate Judiciary Subcommittee on Intellectual Property" |
Dover Post |
Feb 8, 2019 |
| "Trump Tipped to Ban Chinese Equipment from U.S. Mobile Networks" |
Fortune |
Feb 8, 2019 |
| "U.S. charges hackers, traders with stealing SEC filings" |
Reuters |
Jan 15, 2019 |
| "SEC Charges Hackers Who Broke Into EDGAR Database And Traded On Stolen Secrets" |
Forbes |
Jan 15, 2019 |
| "Huawei unveils cutting-edge ‘big data’ chip as China pushes for reduced reliance on technology imports" |
South China Morning Post |
Jan 8, 2019 |
| "Game-maker turned poacher? Grand Theft Auto in legal twist" |
The Herald Scotland |
Jan 7, 2019 |
| "The US Justice Department Is Just Getting Started Against State-Backed Hackers" |
The Diplomat |
Jan 3, 2019 |
2018
|
| "Trump should find a trade victory with China at the G-20 — before it’s too late" |
EIN News |
Nov 23, 2018 |
| "Trump’s Tightrope Trade Walk" |
Brown Political Review |
Nov 20, 2018 |
| "War of words between Mike Pence, Xi Jinping at APEC summit: Here’s what they said" |
The County Weekly News |
Nov 19, 2018 |
| "China calls for multilateralism, free trade system with EU" |
PressTV (IRAN) |
Oct 20, 2018 |
| "California Man Sentenced For Copyright Infringement" |
U.S. Dept. of Justice |
Oct 15, 2018 |
| "Apple stole Qualcomm chip secrets and gave them to Intel, Qualcomm claims" |
ARS Technica |
Sep 25, 2018 |
| "Steps to Protect American IP from China" |
Industry Week |
Sep 19, 2018 |
| "T-Mobile Database Breach Exposes 2 Million Customers' Data" |
Data Breach Today |
Aug 27, 2018 |
| "T-Mobile Alerts 2.3 Million Customers of Data Breach Tied to Leaky API" |
Threat Post |
Aug 24, 2018 |
| "GE trade secrets case raises cybersecurity questions" |
The Daily Gazette |
Aug 4, 2018 |
| "Honeytrap spy stole secrets of new RAF jet" |
Daily Mail (UK) |
Aug 4, 2018 |
| "Three members of notorious “FIN7” criminal ring in custody for attacking more than 100 companies" |
DataBreaches |
Aug 1, 2018 |
| "Three members of notorious “FIN7” criminal ring in custody for attacking more than 100 companies" |
DataBreaches |
Aug 1, 2018 |
| "2017 a ‘watershed year’ in IP theft" |
IP Pro |
Aug 1, 2018 |
| "US DoD prepares software “Do Not Buy” list" |
Enterprise Times |
Jul 31, 2018 |
| "One Hotel in Silicon Valley is a 'honeypot hotbed for Russian and Eastern European escorts'" |
EIN News |
Jul 29, 2018 |
| "Human Longevity sues J. Craig Venter Institute, alleging theft of trade secrets" |
The Virginia Pilot |
Jul 23, 2018 |
| "NSA leader creates task force to fight Russian cyberattacks" |
Engadget |
Jul 22, 2018 |
| "Symantec Unveils New Technology to Counter Cyber Attacks" |
Nasdaq |
Jul 18, 2018 |
| "Is this the last chance to save the WTO?" |
EIN News |
Jul 1, 2018 |
| "Asian nations form united front as Donald Trump goes it alone on trade" |
South China Morning Post |
Jul 1, 2018 |
| "New Types of Section 337 Investigations at the International Trade Commission" |
IP Litigation Current |
Jul 1, 2018 |
| "These 7 nation-state backed hacks have put us on the brink of a global cyber war" |
Security Boulevard |
Jun 28, 2018 |
| "Tesla Received Tip That Former Employee Was Going to 'Shoot the Place Up'" |
The Street |
Jun 21, 2018 |
| "Tesla sues former employee for $1 million over trade secret theft" |
Techcrunch |
Jun 20, 2018 |
| "Tesla′s Elon Musk Has Warned Staff About an Unnamed Employee Who Has Conducted 'Extensive and Damaging Sabotage.'
" |
EIN News |
Jun 19, 2018 |
| "Ex-CIA employee charged with leaking 'Vault 7' hacking tools to Wikileaks" |
The Hacker News |
Jun 18, 2018 |
| "Joshua Adam Schulte Charged with the Unauthorized Disclosure of Classified Information and Other Offenses Relating to the Theft of Classified Material from the Central Intelligence Agency" |
DOJ |
Jun 18, 2018 |
| "Fitbit Employees Charged With Having Stolen Trade Secrets" |
CBS |
Jun 15, 2018 |
| "EU Claims Kaspersky Lab Software 'Confirmed as Malicious'" |
Bank Info Security |
Jun 15, 2018 |
| "FBI announces arrest of 74 email fraudsters" |
ZD Net |
Jun 11, 2018 |
| "Senators aim to call Facebook, Google, Twitter to hearings" |
The Gazette |
Jun 8, 2018 |
| "A War Against Hackers: U.S. Is Focusing To Encounter Cyberthreat" |
NewsGram |
Jun 3, 2018 |
| "Homeland Security detected signs of cell phone spying in Washington DC" |
The Verge |
Jun 3, 2018 |
| "Trump causing chaos" |
Princeton George Citizen |
Jun 1, 2018 |
| "Education emerges as prime target of cybercriminals" |
CIO |
May 28, 2018 |
| "Koreas’ market opening must accompany protection of industrial property rights" |
EIN News |
May 27, 2018 |
| "USTR Releases 2018 Special 301 Report on Intellectual Property Rights" |
Global Trade Magazine |
May 4, 2018 |
| "US identifies IP infringing countries" |
Advanced Television |
May 1, 2018 |
| "Robert Reich: While China Picks Winners, Trump Picks Losers" |
YubaNet |
Apr 16, 2018 |
| "Aviation Industry May Be Vulnerable To Cyberattack Through Its Global Supply Chain" |
Forbes |
Apr 11, 2018 |
| "GOP senator rips Trump tariffs: Don't use 'real people' as collateral damage" |
The Hill |
Apr 5, 2018 |
| "Co-Owner & CEO of Computer Company Sentenced for Conspiring to Steal Intellectual Property" |
US DOJ |
Apr 5, 2018 |
| "Trade wars, Trump tariffs and protectionism explained" |
EIN News |
Mar 23, 2018 |
| "Trump grants tariff exemptions for EU and others on steel and aluminum" |
CNN |
Mar 22, 2018 |
| "What’s Intellectual Property and Does China Steal It?" |
Bloomberg |
Mar 22, 2018 |
| "U.N.: China IP filings soar, hard to judge if it plays fair" |
Asahi Shimbun |
Mar 22, 2018 |
| "Cyber-Enabled Economic Warfare: Assessing US Strategy" |
The Diplomat |
Mar 21, 2018 |
| "U.S Startup NuCurrent Sues Samsung For Intellectual Property Theft Relating to Wireless Charging" |
Gizmo China |
Mar 17, 2018 |
| "Judge eases feds' case against NSA hoarder" |
Politico |
Mar 17, 2018 |
| "Amrock ordered to pay $706 million for stealing trade secrets from HouseCanary" |
Housing Wire |
Mar 15, 2018 |
| "Cyber WAR: US and Russian hackers UNCOVERED after leaving EVIDENCE on a Chinese server" |
Express (UK) |
Mar 10, 2018 |
| "Google's quantum computing breakthrough: Our new chip might soon outperform a supercomputer" |
ZDNet |
Mar 9, 2018 |
| "What is AndroRAT? New Android malware comes with extensive spying and data-stealing abilities" |
Brinkwire |
Feb 17, 2018 |
| "'Olympic Destroyer' Malware Hit Pyeongchang Ahead Of Opening Ceremony" |
Wired |
Feb 12, 2018 |
| "Cyberattack Aimed to Disrupt Opening of Winter Olympics" |
Information Week |
Feb 12, 2018 |
| "A raucous Google-Uber fight is finally heading to trial" |
WPXI.com |
Feb 4, 2018 |
| "Rebuild Manufacturing: The Key to American Prosperity" |
Industry Week |
Feb 2, 2018 |
| "Exclusive: Aspen Institute launches cybersecurity initiative" |
AXIOS |
Jan 31, 2018 |
| "China goes on tech-hiring binge and wages soar, closing gap with Silicon Valley" |
Reuters |
Jan 24, 2018 |
| "Did Trump just start a trade war with China?" |
CNN |
Jan 23, 2018 |
| "Factbox: Trump administration prepares for raft of trade decisions" |
Reuters |
Jan 23, 2018 |
| "China Sends Top Economic Adviser to Davos as Trade War Concerns Grow" |
VOA |
Jan 23, 2018 |
| "Baltimore CBP seizes nearly 3,000 counterfeit stainless steel sinks" |
Homeland Preparedness News |
Jan 23, 2018 |
| "Chinese Hacking Against Taiwan: A Blessing for the United States?" |
The Diplomat |
Jan 23, 2018 |
| "China, South Korea Protest US Solar, Washing Machine Tariffs" |
London South East |
Jan 23, 2018 |
| "China says United States is real threat to global trade" |
Times of Oman |
Jan 22, 2018 |
| "Businesses Report All-Time High Levels Of Fraud, Cyber, And Security Incidents During 2017" |
Business Insider |
Jan 22, 2018 |
| "Meltdown and Spectre: Here’s what Intel, Apple, Microsoft, others are doing about it" |
ARS Technica |
Jan 5, 2018 |
| "What You Need to Do Because of Flaws in Computer Chips" |
New York Times |
Jan 4, 2018 |
| "Understanding Those Alarming Computer Chip Security Holes: 'Meltdown' and 'Spectre'" |
Fortune |
Jan 4, 2018 |
| "Ex-U.S. NSA contractor to plead guilty to massive theft of secret data" |
Reuters |
Jan 4, 2018 |
| "Intel Chip Flaw" |
Information Security Buzz |
Jan 4, 2018 |
| "Researchers Discover Two Major Flaws in the World’s Computers" |
New York Times |
Jan 3, 2018 |
| "Ex-N.S.A. Worker Accused of Stealing Trove of Secrets Offers to Plead Guilty" |
New York Times |
Jan 3, 2018 |
2017
|
| "A Cute Toy Just Brought a Hacker Into Your Home" |
New York Times |
Dec 21, 2017 |
| "White House May Restrict Some Foreign Students" |
Inside Higher Ed |
Dec 19, 2017 |
| "Every Single American Household Exposed in Massive Leak" |
Info Security |
Dec 19, 2017 |
| "Letter From Ex-Uber Employee's Lawyer Describes Targeted Trade Secret Theft, Discovery Evasion" |
The Recorder |
Dec 15, 2017 |
| "Ex-NSA Hackers Worry China And Russia Will Try to Arrest Them" |
Motherboard |
Dec 1, 2017 |
| "Industrial spying helped East Germany narrow economic gap" |
Journalist's Resource |
Nov 20, 2017 |
| "An Update on U.S.-China Cybersecurity Relations" |
Council on Foreign Relations |
Nov 17, 2017 |
| "Exclusive: This Cybersecurity Startup Raised $25M to Expand Dark Web Intel Service" |
Fortune |
Oct 31, 2017 |
| "Australian unis helping China's military surpass US" |
The Courier (AU) |
Oct 30, 2017 |
| "Trump’s China Trip to Broker Billions of Dollars in Energy Deals" |
Bloomberg |
Oct 27, 2017 |
| "Ottawa pushed Bombardier to partner with Airbus after Chinese merger was considered " |
CBC News |
Oct 25, 2017 |
| "https://teiss.co.uk/news/battleye-purges-cheaters-hackers-pubg/" |
TEISS |
Oct 23, 2017 |
| "Judge Koh Grants Samsung New Damages Trial in Apple iPhone Patent Infringement Trial" |
Mac Observer |
Oct 23, 2017 |
| "Canada's Electronic Spy Agency Makes Its Malware Analysis Tool Public" |
CircleID |
Oct 20, 2017 |
| "Google's efforts to highlight non-secure websites is paying off" |
TechSpot |
Oct 20, 2017 |
| "What is Hacker's Door? Old sophisticated Chinese Trojan resurfaces after more than a decade" |
International Business Times |
Oct 18, 2017 |
| "Mysterious cyber espionage campaign uses 'torpedo' lure to trick you into downloading malware" |
ZD Net |
Oct 18, 2017 |
| "Internal Actors -- Their Growth, Their Threat" |
Forbes |
Oct 17, 2017 |
| "You have almost certainly been hacked" |
The Week |
Oct 15, 2017 |
| "Why it's hard to trust the U.S. on Russia's alleged Kaspersky espionage" |
Yahoo Finance |
Oct 14, 2017 |
| "Trump’s Foreign Trade Policy: Opening a Pandora’s Box?" |
The Market Mogul |
Oct 14, 2017 |
| "What is a fileless attack? How hackers invade systems without installing software" |
IT World |
Oct 9, 2017 |
| "Hacker Hides Backdoor Inside Fake WordPress Security Plugin" |
Bleeping Computer |
Sep 29, 2017 |
| "What Is a 'Supply Chain Attack?'" |
Motherboard |
Sep 29, 2017 |
| "CCleaner malware might have been designed to steal trade secrets" |
Digital Journal |
Sep 22, 2017 |
| "The Electoral College Is a National Security Threat" |
Politico |
Sep 20, 2017 |
| "Hackers hid malware in official CCleaner app and millions are at risk" |
Mashable |
Sep 18, 2017 |
| "Institutional Theft: When Stolen Intellectual Property Is Your Business Model" |
Heartland Institute |
Sep 9, 2017 |
| "Hackers target research from UK universities" |
The Week |
Sep 5, 2017 |
| "Donald Trump's cybersecurity advisers resign en masse, accuse US president of ignoring national security" |
FirstPost |
Aug 27, 2017 |
| "Trump elevates U.S. Cyber Command, vows ‘increased resolve’ against threats" |
Matthew Aid |
Aug 18, 2017 |
| "CYBERCOM: Finally A Real Command, But Still Dual Hatted" |
Breaking Defense |
Aug 18, 2017 |
| "Trump lifts Cyber Command status to boost cyber defense" |
Reuters |
Aug 18, 2017 |
| "China regains leverage on US as top debtholder" |
Nikkei Asina Review |
Aug 17, 2017 |
| "Critical Infrastructure At Risk: Hackers Sell Network Access On Dark Web" |
International Business Times |
Aug 15, 2017 |
| "Four People Arrested And Charged In India For Game Of Thrones Priracy" |
Segment Next |
Aug 15, 2017 |
| "China’s Quantum Satellite Proves its Power to Transmit Unbreakable Code" |
Wall Street Pit |
Aug 13, 2017 |
| "Dark web marketplace allegedly selling access to 'power plants, hospitals and airlines'" |
International Business Times |
Jul 28, 2017 |
| "Two Indian Nationals Arrested on Suspicion of Attempted Theft of Sarine’s Intellectual Property" |
Internet Stones |
Jul 27, 2017 |
| "Who are the Shadow Brokers? Signs point to an intelligence insider" |
TechTarget |
Jul 27, 2017 |
| "Germany warns of nation-state cyber espionage threat" |
CSO Online |
Jul 27, 2017 |
| "Asian business fear former employees, consultants are most likely to steal secrets" |
Networks Asia |
Jul 26, 2017 |
| "Waymo Puts Uber Lawyers in Hot Seat Over Trade-Secret Theft" |
Bloomberg |
Jul 26, 2017 |
| "Experts: Software theft shows threat of mercenary hackers" |
ABC News |
Jul 26, 2017 |
| "U.S. treads water on cyber policy as destructive attacks mount" |
Reuters |
Jul 26, 2017 |
| "US to create independent military cyber command" |
Ottawa Citizen |
Jul 17, 2017 |
| "GCHQ Says Hackers Have Likely Compromised UK Energy Sector Targets" |
Vice.com |
Jul 17, 2017 |
| "OmniRAT-Based Android Backdoor Emerges" |
Security Week |
Jul 17, 2017 |
| "A Ukrainian Cyberattack Shows How Dangerous Software Backdoors Can Be" |
Future Tense |
Jul 12, 2017 |
| "Kaspersky axed from government-wide contracts" |
FCW |
Jul 12, 2017 |
| "Cybersecurity firm Kaspersky fires back at critics" |
ITBusiness (CA) |
Jul 12, 2017 |
| "Trump administration limits government use of Kaspersky Lab software" |
Reuters |
Jul 11, 2017 |
| "Hacker "Incursio" Gets Two Years in Prison for Hacking CIA, DHS, DOJ, and FBI" |
Information Security Newspaper |
Jul 1, 2017 |
| "Time to Stand Up, Protect American Invention from So-Called ‘Trading Partners’" |
CNS News |
Jun 30, 2017 |
| "Hackers breached a US nuclear power plant's network, and it could be a 'big danger'" |
Business Insider |
Jun 29, 2017 |
| "Issa seems to believe patents are an entitlement, not a property right" |
IP Watchdog |
Jun 28, 2017 |
| "Turns Out New Petya is Not a Ransomware, It's a Destructive Wiper Malware" |
The Hacker News |
Jun 28, 2017 |
| "The mysteries of Petya: How a global ransomware outbreak unfolded from Ukraine" |
International Business Times |
Jun 28, 2017 |
| "Petya Or Not? Global Ransomware Outbreak Hits Europe's Industrial Sector, Thousands More" |
Information Week |
Jun 27, 2017 |
| "Hacking in Qatar Highlights a Shift Toward Espionage-for-Hire" |
New York Times |
Jun 8, 2017 |
| "Inside the mind of a hacker: Culprit behind leak of 25,000 plastic surgery photos opens up" |
International Business Times |
Jun 2, 2017 |
| "Shadowbrokers Put Price on Monthly Zero Day Leaks" |
Threat Post |
May 30, 2017 |
| "Uber Just Fired The Engineer That Google Accused Of Theft" |
Vanity Fair |
May 30, 2017 |
| "Senate judiciary committee holds nomination hearing for Vishal J. Amin to serve as IPEC" |
IP Watchdog |
May 30, 2017 |
| "
NSA tools hacking group Shadow Brokers starts up monthly security subscription service" |
Computing UK |
May 30, 2017 |
| "Hackers Hide Cyberattacks in Social Media Posts" |
New York Times |
May 28, 2017 |
| "Congressman files new 'hack back' bill" |
FCW |
May 26, 2017 |
| "AI, IoT and the end of Moore's Law add to US national security worries" |
ZD Net |
May 11, 2017 |
| "Trump signs executive order on cybersecurity, White House now runs the show" |
The Register |
May 11, 2017 |
| "Ten-X Wins Settlement from CREXi in Trade Secret Theft Lawsuit" |
PR Newswire |
May 10, 2017 |
| "Trade Secret Cases Surge as Race for New Tech, Top Talent Heats Up" |
Bloomberg |
May 10, 2017 |
| "Microsoft’s recent success in blocking zero-day attacks is eerily good" |
ARS Technica UK |
May 10, 2017 |
| "Trump's cybersecurity executive order: 4 things you need to know" |
TechRepublic |
May 10, 2017 |
| "China, India named and shamed on lax IP" |
Securing Industry |
May 2, 2017 |
| "IBM Supply Chain Breached as Storwize USBs Ship With Malware" |
Security Week |
May 1, 2017 |
| "USTR Releases 2017 Special 301 Report on Intellectual Property Rights" |
Office of United States Trade Representative |
Apr 28, 2017 |
| "Malicious emails at five-year high" |
Australian Business Review |
Apr 28, 2017 |
| "Report: Cyberespionage now most popular form of cybercrime in many industries" |
Tech Republic |
Apr 27, 2017 |
| "Email access: cyber espionage and ransomware attacks are on the increase - Verizon" |
Information Age |
Apr 27, 2017 |
| "Cyber attacks ten years on: from disruption to disinformation" |
The Conversation |
Apr 26, 2017 |
| "Just Ivanka: As her fame skyrockets, Trump daughter launches legal battle to protect her first name" |
National Post |
Apr 21, 2017 |
| "Hackers are after your intellectual property, not only your money" |
National Cyber Security |
Apr 20, 2017 |
| "Tesla settles lawsuit with former head of its Autopilot system
Read more: http://www.nasdaq.com/article/tesla-settles-lawsuit-with-former-head-of-its-autopilot-system-20170419-01376#ixzz4fHSjkTER" |
NASDAQ |
Apr 19, 2017 |
| "Where Trump Goes Next on Trade" |
IPP Review |
Apr 19, 2017 |
| "Five reasons to worry about the ShadowBrokers hack" |
The Hill |
Apr 18, 2017 |
| "Brexit: foreign states may have interfered in vote, report says" |
The Guardian |
Apr 12, 2017 |
| "Observations on China’s New International Cyberspace Cooperation Strategy" |
Lawfare |
Apr 7, 2017 |
| "IACC Welcomes Presidential Executive Order to Enhance Intellectual Property Enforcement" |
PR Newswire |
Apr 3, 2017 |
| "“Hackers-For-Hire” Tried To Swipe Baidu’s Driverless Car Tech" |
PYMNTS |
Mar 23, 2017 |
| "Hackers Reportedly Tried to Steal Self-Driving Car Secrets From Chinese Web Company Baidu" |
Slate |
Mar 21, 2017 |
| "Hackers took down Adobe Reader, Apple Safari, Microsoft Edge, and Ubuntu Linux PWN2OWN 2017" |
Threatpost |
Mar 16, 2017 |
| "Trump taps NSA hacker Rob Joyce for National Security Council cyber role" |
Matthew Aid |
Mar 15, 2017 |
| "Wide Swath of Corporate America Exposed in D&B Leak" |
Info Security Magazine |
Mar 13, 2017 |
| "Google has asked a judge to freeze Uber's use of self-driving-car tech" |
Business Insider |
Mar 10, 2017 |
| "Pentagon: Russia, China Able to Launch Catastrophic Cyber Attacks on U.S. Infrastructure for Next 10 Years" |
Free Beacon |
Mar 10, 2017 |
| "Fabricate and NOT stitch your security for today's hostile threat landscape" |
Networks Asia |
Mar 10, 2017 |
| "China Slams US For ‘Stealing Secrets’ After Hacking America For Years" |
The Daily Caller |
Mar 9, 2017 |
| "CIA contractors likely source of latest WikiLeaks release, say US officials" |
Christian Science Monitor |
Mar 8, 2017 |
| "Wikileaks' CIA dump looks like a dud for now" |
Chicago Tribune |
Mar 8, 2017 |
| "Wikileaks' CIA hacking revelations: Cyber security experts respond with a collective 'meh'" |
Mirror (UK) |
Mar 8, 2017 |
| "What WikiLeaks’ massive CIA leak tells us about cybersecurity" |
Sophos |
Mar 8, 2017 |
| "Connectivity
The Wikileaks CIA Stash May Prove Interesting, But Not Necessarily for the Hacks" |
Technology Review |
Mar 7, 2017 |
| "Observations on China’s New International Cyberspace Cooperation Strategy" |
Lawfare Blog |
Mar 7, 2017 |
| "Does the Google-Uber Lawsuit Hold the Key to Self-driving Cars?" |
Wharton |
Mar 2, 2017 |
| "Intelligence community seeks answers in aftermath of Harold Martin case" |
Cyberscoop |
Feb 28, 2017 |
| "Xiaomi, Huawei, Oppo turn to cutting-edge technology to take on global giants" |
LiveMint |
Feb 28, 2017 |
| "Google lawsuit against Uber could mean multi-billion dollar settlement and possibly jail for some" |
NextBigFuture |
Feb 28, 2017 |
| "Uber accused of 'calculated theft' of Google's self-driving car technology" |
The Guardian |
Feb 23, 2017 |
| "Clash Of The Autonomous Titans: Alphabet's Waymo Sues Uber Claiming Tech Theft" |
Forbes |
Feb 23, 2017 |
| "Framework and Terminology for Understanding Cyber-Enabled Economic Warfare" |
Foundation for Defense of Democracies |
Feb 22, 2017 |
| "US Government Hacked With Its Own Spyware?" |
National Cyber Security Ventures |
Feb 20, 2017 |
| "Roots of innovation: 45 countries ranked in global IP index" |
Next Silicon Valley |
Feb 16, 2017 |
| "A Tale of Two Trading Partners" |
Global Trade Magazine |
Feb 16, 2017 |
| "CyberX Discovers Operation BugDrop: A Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations" |
Yahoo Finance |
Feb 16, 2017 |
| "‘No doubt’ Russians tried to undermine US election" |
Irish Times |
Feb 14, 2017 |
| "Ex-NSA contractor pleads not guilty to spying charges in federal court" |
Matthew Aid |
Feb 14, 2017 |
| "Cyber Spies: In-House Legal Fights Back Against Cyberespionage" |
Legaltech News |
Feb 9, 2017 |
| "Former NSA contractor may have stolen 75% of TAO’s elite hacking tools" |
ARS Technica |
Feb 6, 2017 |
| "Trump Delays Signing Cyber Order to Focus on Immigration Suit" |
Singapore Hardware Zone |
Feb 2, 2017 |
| "Shocking details as Russian spies charged with treason" |
CBS NEWS |
Feb 1, 2017 |
| "Tesla News This Week Includes Theft, Intrigue, and Politics" |
TorqueNews |
Jan 31, 2017 |
| "Trump hits control-Z on cybersecurity order: No reason given for delay" |
The Register |
Jan 31, 2017 |
| "Twist Bioscience Files Response to Agilent Technologies Lawsuit" |
Genomeweb |
Jan 30, 2017 |
| "Trump trade war with China - the implications" |
The Financial Express |
Jan 28, 2017 |
| "Trump talks tough on China’s hacking. Why not Russia’s?" |
Politico |
Jan 28, 2017 |
| "Global IP Protection Group Names New CEO" |
Market Wired |
Jan 25, 2017 |
| "NY Appeals Court Decision Signals that Cybersecurity Whistleblowing Implicates Corporate Theft" |
National Law Review |
Jan 25, 2017 |
| "Ex-Goldman Sachs programmer found guilty, again, of source code theft" |
ARS Technica |
Jan 24, 2017 |
| "What Donald Trump’s appointments reveal about his incoming administration" |
The Economist |
Jan 21, 2017 |
| "Alibaba's Ma makes star turn as Davos pivots to China" |
Channel News Asia |
Jan 20, 2017 |
| "Where Will The Cards Fall When Trump Reshuffles The Deck On IP Policy?" |
Forbes |
Jan 20, 2017 |
| "Trump team challenge: Hardening critical infrastructure" |
Asia Times |
Jan 20, 2017 |
| "Jack Ma says the US wasted all the money it made on globalization in fighting costly wars" |
Shanghaiist |
Jan 19, 2017 |
| "Thomas Wright: The dangerous side to the art of the deal" |
Nikkei Asian Review |
Jan 19, 2017 |
| "Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace" |
The Diplomat |
Jan 19, 2017 |
| "Just Discovered Fruitfly Malware Uses Pre-OS X Code" |
Mac Observer |
Jan 18, 2017 |
| "Four Cyber Trends To Watch in 2017" |
Gov Tech Works |
Jan 18, 2017 |
| "Zuckerberg takes the stand in Oculus trade secrets trial" |
The Verge |
Jan 17, 2017 |
| "
Office of United States Trade Representative : USTR Releases 2016 Report to Congress on China’s WTO Compliance" |
USTR |
Jan 17, 2017 |
| "Top 5 State-Sponsored Hacking Collectives" |
The Merkle |
Jan 10, 2017 |
| "US losing dominance in cyber war" |
Centre Daily Times |
Jan 10, 2017 |
| "Massive cyber attack affecting 500 industrial companies in 50 countries, says Kaspersky" |
Roborics & Automation News |
Jan 5, 2017 |
| "How Will Criminal Trade Secret Prosecutions Fare Under President Trump?" |
JD Supra |
Jan 5, 2017 |
| "Cyberwar for Sale" |
New York Times |
Jan 4, 2017 |
| "Wilbur Ross’ Chinese love affair" |
Politico |
Jan 2, 2017 |
2016
|
| "Yahoo under scrutiny after latest hack, Verizon seeks new deal terms" |
4-Traders |
Dec 15, 2016 |
| "Industry welcomes US's 'robust' plan on IP infringement" |
Securing Industry |
Dec 14, 2016 |
| "U.S. files first charges in generic drug price-fixing probe" |
Reuters |
Dec 14, 2016 |
| "France launches first cyber-warfare unit" |
LangueDocLiving |
Dec 13, 2016 |
| "How A Single Typo Led To The Unraveling Of Hillary Clinton’s Campaign" |
Huffington Post |
Dec 13, 2016 |
| "The Failed Trans-Pacific Partnership: What It Might Have Meant To Biotech and Pharma" |
JD Supra |
Dec 12, 2016 |
| "Executive report lays blueprint for IP enforcement" |
US DHS ICE |
Dec 12, 2016 |
| "Real deal: Hackers steal steelmaker trade secrets" |
The Register |
Dec 8, 2016 |
| "ThyssenKrupp’s Trade Secrets Targeted in ‘Massive’ Cyber Attack" |
Insurance Journal |
Dec 8, 2016 |
| "Data Theft At ThyssenKrupp Highlights Industrial Espionage Threat" |
InformationWeek |
Dec 8, 2016 |
| "China-championed Asia trade pact should wrap up fast, ADB says" |
Malaymail Online |
Dec 6, 2016 |
| "Cyber Attacks on U.S. Companies in 2016" |
Heritage Foundation |
Dec 2, 2016 |
| "Cyber Attacks on U.S. Companies in 2016" |
Heritage Foundation |
Dec 2, 2016 |
| "About 15,000 illegal websites seized and 48,000 erroneous ecommerce links removed over the past year" |
Voice Online |
Nov 28, 2016 |
| "How a Grad Student Found Spyware that Could Control Anybody's iPhone From Anywhere in the World" |
Vanity Fair |
Nov 28, 2016 |
| "Fake goods pose real threat" |
The Monitor |
Nov 25, 2016 |
| "Symantec: Hackers Are Becoming Expert IP Hunting Professionals" |
Silicon (UK) |
Nov 15, 2016 |
| "Two Men Charged With Stealing Defense Contractor's Trade Secrets" |
Hartford Courant |
Nov 14, 2016 |
| "Happenstance and enemy action" |
The Economist |
Nov 12, 2016 |
| "Russian 'Dukes' of Hackers Pounce on Trump Win" |
Krebs on Security |
Nov 10, 2016 |
| "7 Shocking Statistics on Small Business Data Theft" |
Business 2 Community |
Nov 9, 2016 |
| "'It's heart-wrenching': Independent designers face a flood of knock-off products" |
Globe and Mail (UK) |
Nov 7, 2016 |
| "The Government's "Jaws" & the Threat to Intellectual Property & Trade Secrets" |
Fox News |
Nov 4, 2016 |
| "Windows computers vulnerable to attack tied to DNC hackers, Microsoft warns" |
Washington Post |
Nov 2, 2016 |
| "SPECIAL REPORT-John Brennan's attempt to lead the CIA into the age of cyberwar" |
Reuters |
Nov 2, 2016 |
| "UK Government launches new National Cyber Security Strategy today" |
SC Magazine |
Nov 1, 2016 |
| "NSA security gaps revealed after suspect arrested in breach" |
Seattle Times |
Oct 28, 2016 |
| "Strengthening our cyber defences: A person, a bank, a country - it's a free-for-all" |
Straits Times |
Oct 23, 2016 |
| "Check out the Maps of the DDos Attacks! See Right Where the Hackers Hit!" |
OSINT |
Oct 22, 2016 |
| "How Podesta became a cybersecurity poster child" |
Politico |
Oct 21, 2016 |
| "Hacking vendetta seen in attack on East Coast web host" |
Chicago Tribune |
Oct 21, 2016 |
| "Pakistan Government Officials Targeted with RATs in Cyber-Espionage Campaign" |
Cyber Security Review |
Oct 21, 2016 |
| "Former Secretary of Defense: 'I have wasted more money on IT than anyone in history'" |
ZD Net |
Oct 19, 2016 |
| "Which country has the best hackers: Russia or China?" |
InfoWorld |
Oct 18, 2016 |
| "Nation-State Hackers Hit Japanese Nuclear Facility" |
Info Security Magazine |
Oct 18, 2016 |
| "A New Spy Scandal Exposes the Corruption of Privatized Intelligence" |
The Nation |
Oct 14, 2016 |
| "6 US Soldiers, 2 Civilians Charged in Theft of Sensitive Army Gear" |
VOA News |
Oct 8, 2016 |
| "NSA contractor arrested in alleged theft of classified material" |
The Hill |
Oct 8, 2016 |
| "NSA contractor charged with stealing secret data" |
Reuters |
Oct 6, 2016 |
| "FBI Searching for Suspect in Theft of Intellectual Property" |
Houston Patch |
Oct 4, 2016 |
| "Houston Energy Company Targeted in Unique Theft" |
ABC 13 |
Oct 4, 2016 |
| "Breaking News: Yahoo Secretly Copied Customers Emails for US Intelligence Community" |
Matthew Aid |
Oct 4, 2016 |
| "Quadsys Five walk free after hacking rival company" |
The Register |
Sep 30, 2016 |
| "The Internet of Things Goes Rogue" |
Technology Review |
Sep 30, 2016 |
| "Yahoo Says Hackers Stole Data on 500 Million Users in 2014" |
New York Times |
Sep 23, 2016 |
| "In Yahoo Breach, Hackers May Seek Intelligence, Not Riches" |
ABC News |
Sep 23, 2016 |
| "Yahoo's future in doubt as BT and Sky users are hauled into biggest ever hack" |
The Guardian |
Sep 23, 2016 |
| "Weapon systems will remain vulnerable to hackers for decades, Air Forces Cyber Commander says" |
FedScoop |
Sep 23, 2016 |
| "It's strange Yahoo took 2 years to discover a data breach, security experts say" |
LA Times |
Sep 23, 2016 |
| "Big Security Bug Affects Hundreds Of Thousands Of Cisco Devices" |
Fortune |
Sep 22, 2016 |
| "Trade Secrets: Changes In The Law On Protection Of Trade Secrets In The United States And European Union" |
JD Supra |
Sep 22, 2016 |
| "Yahoo is expected to confirm massive data breach, impacting hundreds of millions of users" |
CNBC |
Sep 22, 2016 |
| "Malware Evades Detection With Novel Technique" |
Threatpost |
Sep 22, 2016 |
| "The Cyber Cold War: the Newest Front in Political & Corporate Espionage" |
Info Security Magazine |
Sep 21, 2016 |
| "GCHQ plans to protect the country with a national firewall" |
Security Affairs |
Sep 18, 2016 |
| "Congressional Report Slams OPM on Data Breach" |
Krebs on Security |
Sep 16, 2016 |
| "The Threat Landscape as Seen Through FireEye's Eyes" |
Cyberwire |
Sep 14, 2016 |
| "Nation's first CISO brings vision, strategy to cybersecurity mission" |
Federal Times |
Sep 14, 2016 |
| "Data is the currency of the cyber world" |
Tech Central |
Sep 13, 2016 |
| "Russians and Chinese Hacking U.S. “All The Time,” Spy Director Claims" |
District Sentinel |
Sep 7, 2016 |
| "Cyber commander: U.S. not drawing 'red lines' in cyberspace" |
Fed Scoop |
Sep 7, 2016 |
| "Congressional Probe Says OPM Hackers Arrived in 2012 and We Will Never Know What They Took" |
Nextgov |
Sep 7, 2016 |
| "Fact Sheet: The 2016 G-20 Summit in Hangzhou, China" |
4 Traders |
Sep 5, 2016 |
| "Huawei tries again in Australia" |
Telecom Asia |
Sep 5, 2016 |
| "Former electronic spy chief urges Ottawa to prepare for ‘cyber war’" |
Cyber Attacks Squad News |
Sep 1, 2016 |
| "Annual Cybercrime Costs to Double to $6 Trillion by 2021" |
Info Security |
Sep 1, 2016 |
| "'Guccifer' Hacker Gets 52 Months in US Prison" |
VOA |
Sep 1, 2016 |
| "Clinton: Treat cyberattacks 'like any other attack'" |
The Hill |
Aug 31, 2016 |
| "Microsoft joining China's cybersecurity council paves the way for better relations between the two largest internet markets" |
Business Insider |
Aug 29, 2016 |
| "FBI: Election Systems Hacked in 2 States" |
Newser |
Aug 29, 2016 |
| "Will The Election Be Hacked: FBI Finds "Foreigners" Breached Two State Election Databases" |
Zero Hedge |
Aug 29, 2016 |
| "India and the Scorpene Leak: Untangling the Knots" |
The Diplomat |
Aug 27, 2016 |
| "China Is Fueling a Submarine Arms Race in the Asia-Pacific" |
Foreign Policy |
Aug 26, 2016 |
| "Patchwork cyberespionage group expands targets from governments to wide range of industries" |
Symantec |
Aug 25, 2016 |
| "This Government Agency’s Cover-Up May Have Hindered US Cybersecurity" |
Daily Signal |
Aug 25, 2016 |
| "Fear or greed: what drives the response to Chinese investment in Australia?" |
WA Today (AU) |
Aug 19, 2016 |
| "Here's why the NSA won't release a 'smoking gun' implicating Russia in these major hacks" |
Business Insider |
Aug 19, 2016 |
| "Evidence mounts that NSA computer code was stolen" |
National Cybersecurity |
Aug 18, 2016 |
| "Clinton Foundation announces it will stop accepting foreign and corporate donations if Hillary Clinton is elected President" |
NY Daily News |
Aug 18, 2016 |
| "Sage Employee Arrested At Heathrow Airport" |
Tech Week Europe |
Aug 18, 2016 |
| "Opinion: Why political campaigns need chief information security officers" |
Christian Science Monitor |
Aug 17, 2016 |
| "China's Launch of Quantum Satellite Major Step in Space Race" |
Popular Mechanics |
Aug 17, 2016 |
| "Organizations in 30 Countries Targeted in "Operation Ghoul"" |
Security Week |
Aug 17, 2016 |
| "Did NSA Get Hacked?" |
Nextgov |
Aug 16, 2016 |
| "No One Wants To Buy Those Stolen NSA-Linked 'Cyberweapons'" |
Wired |
Aug 16, 2016 |
| "Confirmed: hacking tool leak came from “omnipotent” NSA-tied group" |
ARS Technica |
Aug 16, 2016 |
| "Did 'Shadow Brokers' steal NSA cyberweapons?" |
Christian Science Monitor |
Aug 16, 2016 |
| "New Information Stealing Trojan Steals and Uploads Corporate Files" |
Bleeping Computer |
Aug 12, 2016 |
| "U.S. Intelligence to Help Companies Avert Supply-Chain Hacking" |
Bloomberg |
Aug 10, 2016 |
| "America Finally Takes on an IP Criminal" |
Economics21 |
Aug 9, 2016 |
| "U.S. cyber arsenal is smaller than imagined — on purpose" |
The Hill |
Aug 9, 2016 |
| "The Hacking Teams: who they are, what they want, and how they hack" |
Tech Republic |
Aug 9, 2016 |
| "ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms" |
SecureList |
Aug 8, 2016 |
| "Cybergate: 5 major political cyber attacks" |
Computer Business Review |
Aug 8, 2016 |
| "Symantec Discovers Strider, A New CyberEspionage Group" |
Information Week |
Aug 8, 2016 |
| "Guarding The Grid" |
Information Week |
Aug 8, 2016 |
| "Precision Discovery, Inc. Announces ERA, a Tool to Protect Valuable Intellectual Property" |
PR Newswire |
Aug 3, 2016 |
| "Russian hackers keep business booming for Irvine cybersecurity firm" |
LA Times |
Aug 2, 2016 |
| "DIA cyber officer profiles global threat actors" |
C4ISRNET |
Aug 1, 2016 |
| "Analyzing Clinton's Positions on Cybersecurity, Privacy" |
Bank Info Security |
Jul 25, 2016 |
| "Top Republican lawmaker resigns suddenly citing "cyber security issues"" |
Daily Herald |
Jul 24, 2016 |
| "These are the most feared hacker groups in the world" |
Business Insider |
Jul 22, 2016 |
| "Majority Of Companies Say Trade Secrets Likely Compromised" |
Information Week |
Jul 21, 2016 |
| "Predicting heightened malicious cyber activity, the old fashioned way" |
The Hill |
Jul 20, 2016 |
| "IP3C Launched from Europe to Stop Online Intellectual Property Abuse" |
Spam Fighter |
Jul 20, 2016 |
| "Notorious Hacker ‘Phineas Fisher’ Says He Hacked The Turkish Government" |
Motherboard |
Jul 20, 2016 |
| "GE, Huawei to partner on Internet of Things
" |
USA Today |
Jul 20, 2016 |
| "Hacker Selling Entire US Voters’ Registration Records on Dark Net" |
Hack Read |
Jul 18, 2016 |
| "The EU GDPR: The clock is ticking for UK businesses" |
IT Pro Portal |
Jul 17, 2016 |
| "Canadian Man Behind Popular 'Orcus RAT'" |
Krebs on Security |
Jul 16, 2016 |
| "Nation-backed malware that infected energy firm is 1 of 2016’s sneakiest" |
ARS Technica |
Jul 12, 2016 |
| "Stealthy cyberespionage malware targets energy companies" |
CSO Online |
Jul 12, 2016 |
| "USAF Wants Cyber-Hard Supply Chain For B-21" |
Aviation Week |
Jul 12, 2016 |
| "U.S. officials seize $6.5m in counterfeit goods in Puerto Rico" |
Retail Dive |
Jul 8, 2016 |
| "Hacker Group DROPPING ELEPHANT Targets China and Asian Regional Entities" |
Matthew Aid |
Jul 8, 2016 |
| "Huawei proves Samsung is infringing its patents" |
China Daily |
Jul 7, 2016 |
| "APT Group 'Patchwork' Cuts-and-Pastes a Potent Attack" |
ThreatPost |
Jul 7, 2016 |
| "Why rogue employees may pose bigger threat to corporate data than hackers" |
Christian Science Monitor |
Jul 7, 2016 |
| "‘Zero Days’ details U.S. vulnerability to cyberattacks" |
Seattle Times |
Jul 7, 2016 |
| "Opinion: The U.S. doesn’t even enforce trade rules, never mind enact favorable deals" |
Market Watch |
Jul 7, 2016 |
| "How the Trade Secrets Act Will Benefit Manufacturers" |
Industry Week |
Jul 7, 2016 |
| "Attention, small biz using Symantec AV: Smash up your PCs, it's the safest thing to do" |
The Register |
Jul 6, 2016 |
| "UK Employee Theft Statistics Report More Thefts by Senior Management" |
LPM Insider |
Jul 5, 2016 |
| "Hackers use 'cyber weapons' rather than malware to evade detection when deploying attacks, study finds" |
International Business Times |
Jul 1, 2016 |
| "The US Really Does Want to Constrain Commercial Espionage: Why Does Nobody Believe It?" |
Lawfare |
Jul 1, 2016 |
| "Alibaba Group Hosts Inaugural Summit for International IP Rights Holders" |
Market Watch |
Jun 30, 2016 |
| "Qualcomm files 17 new complaints in China courts against smartphone maker Meizu" |
Reuters |
Jun 30, 2016 |
| "Terror-suspect database used by banks, governments, has been leaked" |
CSO Online |
Jun 29, 2016 |
| "New Balance ordered to pay 5 million RMB for infringing on Chinese company's trademark" |
Shanghai List |
Jun 28, 2016 |
| "Putting the Brakes on Intellectual Property Crime
Trio Pirated Mercedes-Benz Diagnostic Software" |
FBI |
Jun 24, 2016 |
| "U.S. lottery firm says its 'most-prized' secrets have been taken" |
Brantford Expositor |
Jun 24, 2016 |
| "From Articulation to Implementation:Enabling progress on cybersecurity norms" |
Microsoft |
Jun 23, 2016 |
| "Intel Security: Connecting with strangers on LinkedIn puts firms at risk of phishing attacks" |
The Inquirer |
Jun 23, 2016 |
| "Apple’s Loss in Chinese Patent Fight Seen Emboldening Rivals" |
Bloomberg |
Jun 21, 2016 |
| "Kaspersky battles hackers in internet’s ‘dark ages’" |
Seattle Times |
Jun 21, 2016 |
| "Someone Got Into 45 Million Accounts From Hundreds Of Car, Tech, Sports Forums" |
Nextgov |
Jun 20, 2016 |
| "Russia, China to Sign Intellectual Property Deal on Rocket Tech" |
Sputnik News |
Jun 20, 2016 |
| "US Deputy Homeland Security Secretary: US-Israel to sign automated cyber information sharing agreement" |
Jerusalem Post |
Jun 20, 2016 |
| "U.S. Cyber Command Chief on What Threats to Fear the Most" |
Wall Street Journal |
Jun 19, 2016 |
| "Apple IPhones Found to Have Violated Chinese Rival’s Patent" |
Bloomberg |
Jun 17, 2016 |
| "Trade Secrets Now Federally Protected Intellectual Property" |
JDSupra |
Jun 16, 2016 |
| "A Chaotic Whodunnit Follows The DNC’s Trump Research Hack" |
Wired |
Jun 15, 2016 |
| "White House Cyber Commission May Endorse Security Ratings System for Software" |
OSINT |
Jun 15, 2016 |
| "Unit 8200: Israel’s cyber spy agency" |
Veterans Today |
Jun 10, 2016 |
| "A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet" |
New York Times |
Jun 10, 2016 |
| "U.S.-India cyber agreement puts more pressure on China" |
FedScoop |
Jun 10, 2016 |
| "Researchers Demo How To Build Nearly Invisible Backdoor In Computer Chips" |
Information Week |
Jun 6, 2016 |
| "The Long and Winding Road to US-India Cyber Cooperation" |
The Wire |
Jun 6, 2016 |
| "Chinese tech giant Huawei under U.S. investigation for North Korea ties" |
UPI |
Jun 3, 2016 |
| "There's a Stuxnet Copycat, and We Have No Idea Where It Came From" |
Motherboard |
Jun 2, 2016 |
| "China Gains Stealth Access to World's Hotels" |
EIN Newsdesk |
Jun 2, 2016 |
| "Federal Reserve was hacked more than 50 times in the past five years" |
The Guardian |
Jun 1, 2016 |
| "Critical flaws on HP, Dell, Acer, Asus and Lenovo laptops let hackers take over in 10 minutes" |
International Business Times |
May 31, 2016 |
| "Oil’s collapse puts secrets at risk" |
San Antonio Express-News |
May 31, 2016 |
| "Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes" |
McAfee |
May 31, 2016 |
| "Hackers offering Microsoft Windows zero-day exploit for $90,000" |
SC Magazine |
May 31, 2016 |
| "This Map Locates Where Governments Hack Activists and Reporters" |
TechWorm |
May 27, 2016 |
| "List of data breaches and cyber attacks in May 2016" |
IT Governance |
May 27, 2016 |
| "A First Look at America’s Supergun" |
Wall Street Journal |
May 26, 2016 |
| "Samsung Electronics Hints at Counter-Suit Against China's Huawei" |
KBS World Radio |
May 25, 2016 |
| "China's Huawei files patent suits against Samsung Elec" |
Reuters |
May 24, 2016 |
| "Here's how the US military is beating hackers at their own game" |
Tech Insider |
May 24, 2016 |
| "U.S. targets spying threat on campus with proposed research clampdown" |
Reuters |
May 20, 2016 |
| "House defense bill elevates cyber force, defying White House" |
The Hill |
May 19, 2016 |
| "Foreign Hackers May Be Targeting US Presidential Candidates" |
NextGov |
May 19, 2016 |
| "Cyber's Hot, but Low-Tech Spies Are Still a Threat" |
The National Interest |
May 18, 2016 |
| "Here's How to End the Fog of Cyber War" |
Scientific American |
May 18, 2016 |
| "Hackers Target Think Tanks to Get a Peek at U.S. Government Strategy" |
Bloomberg |
May 12, 2016 |
| "Protecting America's Secret Sauce: The Defend Trade Secrets Act Signed Into Law" |
Huffington Post |
May 11, 2016 |
| "Obama signs trade secrets bill, allowing companies to sue
" |
USA Today |
May 11, 2016 |
| "Data-hungry cyber hackers turn gaze to connected autos" |
Financial Times |
May 11, 2016 |
| "Shared Interests and Responsibility: The US and China Must Join to Promote a Rules-based Cyberspace" |
World Post |
May 11, 2016 |
| "US’s DARPA developing technology to identify and track hackers worldwide" |
Techworm |
May 7, 2016 |
| "World War Web: Are nation state attacks really on the rise?" |
IT Pro |
May 6, 2016 |
| "U.S. tech firms urge presidential candidates to embrace trade, high-tech visas" |
Reuters |
May 5, 2016 |
| "Romanian hacker Guccifer: I breached Clinton server, 'it was easy'" |
Fox News |
May 4, 2016 |
| "‘Guccifer’ claims he hacked Hillary Clinton’s ‘completely unsecured’ server" |
Washington Times |
May 4, 2016 |
| "Hacker 'Guccifer': I Got Inside Hillary Clinton's Server" |
NBC News |
May 4, 2016 |
| "Spy malware has been delivered through Office macros for a decade: Report" |
IT World Canada |
May 4, 2016 |
| "The Pentagon Wants to ‘Fingerprint’ the World’s Hackers" |
Defense One |
May 4, 2016 |
| "Election fraud feared as hackers target voter records" |
The Hill |
May 2, 2016 |
| "Sneak attack on bank-message system led to global breach" |
Seattle Times |
Apr 30, 2016 |
| "Tick Cyber-Espionage Group Targets Japanese Companies with Daserf Backdoors" |
Softpedia |
Apr 29, 2016 |
| "Analysis: Are US, Israel winning or losing newest cyber battles" |
The Jerusalem Post |
Apr 28, 2016 |
| "Analysis: Are US, Israel winning or losing newest cyber battles" |
Jerusalem Post |
Apr 28, 2016 |
| "US keeps China, India on intellectual property priority watch list" |
Live Mint |
Apr 27, 2016 |
| "U.S. Congress passes legislation to protect firms' trade secrets" |
Reuters |
Apr 27, 2016 |
| "MIT builds Artificial Intelligence system that can detect 85% of Cyber Attacks" |
The Hacker News |
Apr 19, 2016 |
| "Phineas Fisher's Account of How He Broke Into Hacking Team Servers" |
Softpedia |
Apr 17, 2016 |
| "German spy chiefs on Snowden: Leaks were Russian op to drive ‘wedge’ between US & Europe" |
Russia Today |
Apr 16, 2016 |
| "PowerShell Increasingly Being Used To Hide Malicious Activity" |
InformationWeek |
Apr 15, 2016 |
| "Shape-shifting and supremely tough malware is targeting the public sector" |
PC Authority |
Apr 14, 2016 |
| "Qbot Malware Morphs Quickly to Evade Detection" |
Threatpost |
Apr 13, 2016 |
| "Symantec Speaks on Latest Threat Trends" |
Security Week |
Apr 12, 2016 |
| "Be afraid, very afraid : New cybersecurity report" |
are you hacker proof? |
Apr 12, 2016 |
| "Nuclear employee sentenced for cyber attack" |
IOL |
Apr 12, 2016 |
| "Federal Defend Trade Secrets Act Clears the Senate: Is the Uniform Act on Life Support?" |
Lexology |
Apr 11, 2016 |
| "Prosecutors raid Panama Papers law firm Mossack Fonseca" |
Financial Times |
Apr 11, 2016 |
| "Researchers help shut down spam botnet that enslaved 4,000 Linux machines" |
ARS Technica |
Apr 9, 2016 |
| "Huawei, LeEco to commence local manufacturing in India" |
International Business Times |
Apr 9, 2016 |
| "Caught in the Matrix: Hillary, meet Marcel “Guccifer” Lazar" |
Communities Digital News |
Apr 8, 2016 |
| "US Serves up Cyber Justice Against Foreign Hackers" |
Daily Signal |
Apr 8, 2016 |
| "The next Cold War has already begun – in cyberspace" |
Phys.Org |
Apr 7, 2016 |
| "#Panamapapers: Mossack Fonseca was a Hack Waiting to Happen" |
htxt.africa |
Apr 7, 2016 |
| "Why the Panama Papers are a good thing for hackers – and the rest of us" |
TNW |
Apr 6, 2016 |
| "How a Federal Trade Secrets Law Would Impact Silicon Valley" |
eWeek |
Apr 6, 2016 |
| "Trustwave Case Highlights Cyber-Risk to Professional Service Providers" |
JD Supra |
Apr 5, 2016 |
| "U.S. Cyber Command should be combatant command, DoD's top cyber warrior says" |
Military Times |
Apr 5, 2016 |
| "Senate Passes Trade-Secrets Bill" |
Wall Street Journal |
Apr 4, 2016 |
| "How to Hack an Election" |
Bloomberg |
Mar 31, 2016 |
| "UK cops tell suspect to hand over crypto keys in US hacking case" |
ARS Technica |
Mar 31, 2016 |
| "Alexander Mining : Shares Soar After Being Awarded Patent In China" |
4-Traders |
Mar 31, 2016 |
| "The anatomy of a nation-state hack attack" |
BBC News |
Mar 30, 2016 |
| "Contra Costa Times editorial: U.S. right to use courts to pursue security threats" |
Contra Costa Times |
Mar 25, 2016 |
| "Justice Department indicts seven Iranians for campaign of cyberattacks " |
Christian Science Monitor |
Mar 24, 2016 |
| "New U.S. Customs Law Combats Counterfeiting" |
TTI |
Mar 24, 2016 |
| "White House Says Agencies Reported 77,200 Cyber Incidents In 2015" |
Nextgov |
Mar 21, 2016 |
| "Apple’s FBI Battle is Complicated. Here’s What’s Really Going On" |
WIRED |
Mar 18, 2016 |
| "Cyber war - bigger than ever - is here to stay" |
Wahington Post |
Mar 18, 2016 |
| "Business suffering 'industrial scale' cyber theft, warns GCHQ head" |
The Telegraph |
Mar 18, 2016 |
| "Stealing America's trade secrets" |
Press Reader |
Mar 18, 2016 |
| "Senate to Vote on Trade Secrets Bill" |
Bloomberg |
Mar 17, 2016 |
| "UK universities 'losing cyber security battle'" |
Times Higher Education |
Mar 16, 2016 |
| "The tech industry, according to Trump" |
Venture Beat |
Mar 13, 2016 |
| "Security Researchers Challenge Claims Data Breaches Increasing" |
Cyber Parse |
Mar 13, 2016 |
| "Going’s good in US-Asean relations... but Trump?" |
The Star Online |
Mar 12, 2016 |
| "Ofcom investigates former employee after data breach" |
SC Magazine |
Mar 11, 2016 |
| "Who Took The Cookies From The Cookie Jar?" |
Information Week |
Mar 11, 2016 |
| "RSA 2016: Future of cyber-espionage" |
SC Magazine |
Mar 4, 2016 |
| "Hackers targeting internet-connected systems to steal oil, expert warns" |
The Guardian |
Mar 4, 2016 |
| "Sea pirates ditch guns for computer hacking to plunder booty from cargo ships" |
International Business Times |
Mar 3, 2016 |
| "Intellectual Property Office : UK attachés export intellectual property expertise across the globe" |
4 Traders |
Mar 2, 2016 |
| "Windows 10 is Adding APT Protection. Here's Why That's A Big Deal" |
Nextgov |
Mar 2, 2016 |
| "Gentle Reminder at RSA: Hacking Back is a Bad Idea" |
ThreatPost |
Mar 2, 2016 |
| "What’s the Deal With Cyberwar?" |
Slate |
Mar 1, 2016 |
| "The 2016 Presidential Candidates' Views on Cyber Warfare" |
Gizmodo |
Mar 1, 2016 |
| "Pentagon unleashes Fort Meade cyberwarriors on Islamic State" |
Baltimore Sun |
Mar 1, 2016 |
| "SSL 'DROWNs' In Yet Another Serious Security Flaw" |
InformationWeek |
Mar 1, 2016 |
| "Cyber War Against ISIL Hones Weapons Vs. Russia, China" |
Breaking Defense |
Feb 29, 2016 |
| "UC Berkeley breach: Universities increasingly targeted in cyberattacks" |
Christian Science Monitor |
Feb 29, 2016 |
| "Commanders urge Pentagon to counter growing threat of cyber attacks on industrial controllers" |
Flash Critic |
Feb 28, 2016 |
| "Exclusive Inside Story on China’s Database of Americans" |
China Watch Canada |
Feb 26, 2016 |
| "Destructive Hacking Attacks Spread in Wake of Breaches at Sony: FireEye" |
Gadgets 360 |
Feb 26, 2016 |
| "Waging war in zeros and ones" |
American Enterprise Institute |
Feb 26, 2016 |
| "Treasury Fails To Name Any Cyber Worst Actors For Economic Sanctions" |
The Daily Caller |
Feb 26, 2016 |
| "Companies quicker to detect breaches, hackers more aggressive" |
SC Magazine |
Feb 26, 2016 |
| "Feds advise utilities to pull plug on Internet after Ukraine attack" |
Washington Examiner |
Feb 25, 2016 |
| "Cyber-crime set to hit most British companies in the next two years" |
The Telegraph |
Feb 25, 2016 |
| "The making of America's cyberweapons" |
Christian Science Monitor |
Feb 24, 2016 |
| "Interview: Eugene Kaspersky on saving the world from cyber attacks" |
Gulf Business |
Feb 24, 2016 |
| "Patent bills: too broad, too soon, too heavy-handed" |
Washington Times |
Feb 23, 2016 |
| "Embattled OPM CIO Steps Down" |
Nextgov |
Feb 22, 2016 |
| "Navy Wants to Unplug From Some Networks to Stay Ahead of Cyberattacks" |
Military.com |
Feb 19, 2016 |
| "CNN, ABC: Arrest in hacking case of high-ranking Obama admin officials" |
HotAir |
Feb 12, 2016 |
| "Sony attackers thought to be behind multiple large attacks" |
InfoWorld |
Feb 12, 2016 |
| "Ukraine Railway, Mining Company Attacked With BlackEnergy" |
InformationWeek |
Feb 12, 2016 |
| "US Industry IP Index Rates Nations" |
IP Watch |
Feb 11, 2016 |
| "Poseidon APT Group Identified as First Portuguese-Speaking Campaign" |
ThreatPost |
Feb 9, 2016 |
| "DNI: China Continues Cyber Espionage" |
Washington Free Beacon |
Feb 9, 2016 |
| "Extend NATO Cybersecurity To Asian-Pacific Allies" |
Forbes |
Feb 9, 2016 |
| "Small Websites Compromised by the Thousands, Scatter Angler and CryptoWall" |
Heimdal Security |
Feb 9, 2016 |
| "Hacking by China, Iran and North Korea set to increase dramatically over next 12 months" |
International Business Times |
Feb 8, 2016 |
| "The Former Federal Employee Who Tried To Launch A Cyberattack On Nuclear Scientists" |
Nextgov |
Feb 6, 2016 |
| "Global Threat Report 2016" |
Crowdstrike |
Feb 5, 2016 |
| "Agilent Files Intellectual Property Theft Lawsuit Against Twist Bioscience" |
GenomeWeb |
Feb 5, 2016 |
| "Operation Team Player' nets $39 million in fake sports merchandise" |
ICE |
Feb 4, 2016 |
| "Government software may have let in foreign spies" |
The Hill |
Feb 2, 2016 |
| "Former Nuclear Regulatory Commission Worker Pleads Guilty Over Attempted Hack" |
Security Week |
Feb 2, 2016 |
| "Federal Government Confirms That It Still Sucks at Cyber Security" |
Re/Code |
Feb 2, 2016 |
| "The Geography of a Hack: Where Are Your Cyber Villains Located?" |
The Street |
Feb 1, 2016 |
| "Hacking attacks on businesses up 38% in 2015, study shows" |
Irish Times |
Feb 1, 2016 |
| "DHS Chief Defends $6 Billion Federal Firewall After Stinging Audit" |
Nextgov |
Feb 1, 2016 |
| "The myth of ‘backdoor’ data access" |
The Depaulia |
Jan 31, 2016 |
| "UCOP Ordered Spyware Installed On UC Data Networks" |
Remaking the University |
Jan 30, 2016 |
| "NSA Hacker-In-Chief: No Need For Zero-Days To Hack You, Just Persistence And Focus" |
Tech Times |
Jan 30, 2016 |
| "Israel's Cyber Sector Blooms in the Desert" |
Security Week |
Jan 30, 2016 |
| "The first man charged of cyber terrorism has been extradited to the US" |
Security Affairs |
Jan 30, 2016 |
| "1st computer virus is written, January 30, 1982" |
EDN Network |
Jan 30, 2016 |
| "DHS $6 Billion Firewall May Not Be Effective In Keeping Hackers Out Of Government, Audit Says" |
Nextgov |
Jan 28, 2016 |
| "China has cyber capability to take down U.S. power grid, warns NSA" |
Natural News |
Jan 27, 2016 |
| "The Pentagon's plan to defend the power grid against hackers" |
Christian Science Monitor |
Jan 25, 2016 |
| "Here's How the Pentagon Plans to Protect Security Clearance Data" |
Nextgov |
Jan 25, 2016 |
| "Cybercriminals Making Computer Malware at a Record Rate: Researchers" |
NBC |
Jan 25, 2016 |
| "US faces technological 'peer competitors' in cyberspace, says USCYBERCOM" |
Fierce Government IT |
Jan 25, 2016 |
| "Canada Discovers It's Under Attack by Dozens of State-Sponsored Hackers" |
Vice News |
Jan 25, 2016 |
| "Countries starting to use non-state middlemen for cyber ops" |
Jane's |
Jan 20, 2016 |
| "The Industrial Internet of Things under attack" |
IT Portal |
Jan 15, 2016 |
| "Global Risk Report, how we are thinking about cyber dependence, cyber attack, data theft, cyber terrorism, cyber war, dark web, state sponsored attacks…" |
Computer Business Review |
Jan 15, 2016 |
| "The man on a mission to 'save the world' from cyber attacks" |
ZAWYA |
Jan 15, 2016 |
| "Cyber Security for the Power Grid-- Why We Should Fear Hackers" |
CyberWire |
Jan 14, 2016 |
| "NSA is world's best hacker thief, says former director" |
CNN Money |
Jan 12, 2016 |
| "FAC Publishes Cyber-Related Sanctions Regulations" |
JD Supra |
Jan 11, 2016 |
| "Fearful of Hacks, Pentagon Considers More Classified Programs" |
Defense News |
Jan 9, 2016 |
| "5 Reasons Why The Government Can’t Get a Grip on Cybersecurity" |
Hurricane Labs |
Jan 7, 2016 |
| "Project 'Gridstrike' Finds Substations To Hit For A US Power Grid Blackout" |
InformationWeek |
Jan 7, 2016 |
| "Lawmakers notch win in fight for global cyber laws" |
The Hill |
Jan 3, 2016 |
| "Cyber Crime" |
The Cipher Brief |
Jan 3, 2016 |
2015
|
| "White House finally acquiesces to Congress on cyber deterrence policy" |
Federal News Radio |
Dec 29, 2015 |
| "Former Boston Scientific engineer to be sentenced for stealing trade secrets" |
Star Tribune |
Dec 29, 2015 |
| "Largest U.S. electrical company battles to keep cyber attacks at bay" |
Glitch News |
Dec 28, 2015 |
| "The Highs and Lows of U.S. National Security in 2015: A Year-End Review" |
Observer News |
Dec 28, 2015 |
| "Tolkachev, Cold War Spycraft, and Modern Risks for China" |
The Diplomat |
Dec 28, 2015 |
| "Honeypot Trap Suggests NSA Monitoring Associated With Juniper Breach" |
EMQ Tech |
Dec 23, 2015 |
| "Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out." |
Security Affairs |
Dec 22, 2015 |
| "Juniper mysteries" |
Politico |
Dec 22, 2015 |
| "Cisco Starts Company-Wide Code Audit to Search for Hidden Backdoors" |
Softpedia |
Dec 22, 2015 |
| "Attackers are hunting for tampered Juniper firewalls" |
IT World |
Dec 21, 2015 |
| "AEP guarding the grid against online attacks" |
Columbus Dispatch |
Dec 21, 2015 |
| "Juniper faces questions about spying code planted in software" |
ComputerWorld |
Dec 21, 2015 |
| "Latest Hack May Open Doors For Hackers To Spy on US Government" |
HackRead |
Dec 19, 2015 |
| "Sneaky US Government Passes CISA Bill, Hidden Inside Generic Budget Bill" |
Softpedia |
Dec 19, 2015 |
| ""Unauthorized code" in Juniper firewalls decrypts encrypted VPN traffic" |
ARS Technica |
Dec 17, 2015 |
| "China Tries to Sell its Views on Internet Controls" |
VOA |
Dec 16, 2015 |
| "Cyberespionage IP Theft May Soon Lead to Court" |
Bloomberg |
Dec 16, 2015 |
| "Enhancing Legal Defense of Trade Secrets" |
Townhall.com |
Dec 16, 2015 |
| "Pentagon Memo: U.S. Weapons Open to Cyberattacks" |
Daily Beast |
Dec 16, 2015 |
| "Cybersecurity Researchers Are Hunted from All Sides" |
Motherboard |
Dec 14, 2015 |
| "Cyber Espionage Is Reaching Crisis Levels" |
Fortune |
Dec 12, 2015 |
| "Microsoft, US senators want to grease wheels of trade secret theft cases" |
The Register |
Dec 3, 2015 |
| "Gates sparks multinational plan to spend billions on clean energy tech" |
Stockhouse |
Nov 30, 2015 |
| "Cyberspace squadrons and ops group bringing almost 300 jobs to ScottAFB" |
Belleville News |
Nov 30, 2015 |
| "DARPA wants early warning system for power-grid cyberattacks" |
NetworkWorld |
Nov 24, 2015 |
| "Canberra physicists working on 'unbreakable' cyber security systems" |
ABC News (AU) |
Nov 24, 2015 |
| "Presidential Hopeful John McAfee Talks Cybersecurity" |
NBC News |
Nov 23, 2015 |
| "Researchers Say the Juniper Hack Could be the Work of Government: But Which One?" |
Fast Company |
Nov 23, 2015 |
| "Pendulum swings to security" |
The Hill |
Nov 22, 2015 |
| "New Two Billion Dollar Strategic Intellectual Property Entertainment Fund Formed" |
Music Industry News Network |
Nov 22, 2015 |
| "Does Anyone Really Care about a Data Breach?" |
PR Week |
Nov 20, 2015 |
| "Chinese Firms’ U.S. Advantage" |
PoliZette |
Nov 20, 2015 |
| "A Decade of Data Breaches: Facts and Myths" |
Baseline |
Nov 19, 2015 |
| "The Second Mouse Gets the Cheese – The Innovator’s IP Dilemma" |
IP Watchdog |
Nov 19, 2015 |
| "And Now, A Cyber Arms Race Towards Critical Infrastructure Attacks
" |
InformationWeek |
Nov 19, 2015 |
| "Cyber Attacks On US Companies Since November 2014 – Analysis" |
Eurasia Review |
Nov 19, 2015 |
| "Hackers a threat to defence: Xenophon" |
MSN |
Nov 19, 2015 |
| "Hacking group Strontium dogs NATO and government targets" |
The Register |
Nov 18, 2015 |
| "Microsoft Security Intelligence Report: Strontium" |
Microsoft |
Nov 18, 2015 |
| "Fighting talk from Great Britain as it says it will hit back against internet attacks" |
We Live Security |
Nov 18, 2015 |
| "The ‘other’ hacking groups working to bring down Islamic State" |
News.Com (AU) |
Nov 18, 2015 |
| "Security in 2016: The death of advanced persistent threats" |
ZDNet |
Nov 17, 2015 |
| "Opinion: Poisoning the Internet won't stop more Paris attacks" |
Christian Science Monitor |
Nov 17, 2015 |
| "Britain to build cyber attack forces to tackle IS, hackers" |
Reuters |
Nov 17, 2015 |
| "Restricting Encryption Would Not Have Prevented the Paris Attacks" |
Defense One |
Nov 17, 2015 |
| "What Donald Trump Wrote About Chinese-Sponsored Hackers Who Launched Cyber Attacks On U.S. Companies" |
Forbes |
Nov 17, 2015 |
| "$21mn contract to protect Chinese hacking victims broke gov’t rules, IG memo finds" |
Russia Today |
Nov 17, 2015 |
| "Cyber Warfare: How The UK Could Come To A Halt In Three Days" |
Forces TV |
Nov 17, 2015 |
| "The world’s richest countries agree that hacking industrial targets for profit isn’t right
" |
The Verge |
Nov 17, 2015 |
| "U.S. federal agencies refuse to testify about OPM hack" |
Reuters |
Nov 17, 2015 |
| "China Is Actually a Majority Shareholder of 33 Radio Stations Across the World" |
The Liberty Web |
Nov 17, 2015 |
| "Cyber Sections of the Latest G20 Leaders' Communiqué" |
Lawfare |
Nov 17, 2015 |
| "75% of Companies Are Insider Threat Victims" |
InfoSecurity |
Nov 16, 2015 |
| "Anonymous Declares Cyber War on ISIS. Why It Matters" |
Fortune |
Nov 16, 2015 |
| "How Islamic State Teaches Tech Savvy to Evade Detection" |
Wall Street Journal |
Nov 16, 2015 |
| "Cyber Attacks on U.S. Companies Since November 2014" |
Heritage Foundation |
Nov 16, 2015 |
| "World’s richest nations agree hacking for commercial benefit is off-limits" |
Washington Post |
Nov 16, 2015 |
| "Lawmakers Demand US Military Carry Out Pretend Cyber War Against China, Russia" |
Defense One |
Nov 14, 2015 |
| "Cyber and real war come together in the Ukraine" |
SC Magazine |
Nov 11, 2015 |
| "No surprise here: Adobe's Flash is a hacker's favorite target" |
CSO Online |
Nov 9, 2015 |
| "A third of employees would sell their firms’ intellectual property ‘for the right price’" |
Business Reporter |
Nov 9, 2015 |
| "10 reasons why phishing attacks are nastier than ever" |
CSO Online |
Nov 9, 2015 |
| "Opinion: Will TPP undermine the global Internet? Read this before you decide" |
Christian Science Monitor |
Nov 5, 2015 |
| "Pacific trade deal takes aim at Chinese hacking" |
Financial Times |
Nov 4, 2015 |
| "December date set for first China-US cyber meetings" |
The Hill |
Nov 4, 2015 |
| "U.S. grapples with controlling 'cyber-munitions' while recruiting 6,000 new cyber-warriors" |
TechRepublic |
Nov 3, 2015 |
| "Constructing a Cyber Superpower" |
BizMonthly |
Nov 3, 2015 |
| "U.S. firms to pay $13 million to settle claim they paid Russians for security work" |
Washington Post |
Nov 2, 2015 |
| "White House unveils plan to fight hackers" |
The Hill |
Nov 2, 2015 |
| "Where Is America’s Cyber Defense Plan?" |
Matthew Aid |
Oct 31, 2015 |
| "Modernizing Federal Cybersecurity" |
U.S. Chief Information Officer |
Oct 30, 2015 |
| "Cybersecurity Strategy and Implementation Plan (CSIP) for the Federal Civilian Government" |
Executive Office of the President, Office of Management and Budget |
Oct 30, 2015 |
| "A 'Cyber Party' with John McAfee and the White House Cybersecurity Czar" |
Cybersecurity Podcast |
Oct 30, 2015 |
| "Invincea CEO on CISA" |
Invincea |
Oct 30, 2015 |
| "Cybersecurity Deal Between China And Germany In The Works: Report" |
International Business Times |
Oct 30, 2015 |
| "John McAfee: CISA will not stop a single important hack, let alone cyberterrorism" |
International Business Times |
Oct 29, 2015 |
| "Will AI Be Smart Enough To Protect Us From Online Threats?" |
TechCrunch |
Oct 29, 2015 |
| "Cybercrime has replaced nuclear war as the global threat" |
Irish Examiner |
Oct 29, 2015 |
| "On Cyberdefense, China and North Korea Are Said to Be Poorly Prepared" |
Wall Street Journal |
Oct 28, 2015 |
| "How Hackers Can Hack The Oil & Gas Industry Via ERP Systems" |
InformationWeek |
Oct 28, 2015 |
| "South Korean manufacturing industry targeted with new backdoor program" |
ComputerWorld |
Oct 27, 2015 |
| "Senate passes first major cyber bill in years" |
The Hill |
Oct 27, 2015 |
| "Duuzer back door Trojan targets South Korea to take over computers" |
Symantec |
Oct 26, 2015 |
| "Washington Post: Time to move on cybersecurity" |
Salt Lake Tribune |
Oct 26, 2015 |
| "Chattering Wi-Fi devices are a short hop away from the crown jewels of your network" |
Graham Cluley |
Oct 23, 2015 |
| "Space age perils: hackers find a new battleground on the final frontier" |
Reuters |
Oct 22, 2015 |
| "America Isn't Cyber Superior -- We Need A Strategy To Stop Playing Catch-Up" |
Forbes |
Oct 19, 2015 |
| "America Isn't Cyber Superior -- We Need A Strategy To Stop Playing Catch-Up" |
Forbes |
Oct 19, 2015 |
| "Why news organizations are such a juicy target for hackers" |
The Washington Post |
Oct 16, 2015 |
| "Cybersecurity Expert: Be Afraid, America. Be Very Afraid." |
Daily Beast |
Oct 14, 2015 |
| "Big issues facing the Internet: Economic espionage" |
Brookings Institute |
Oct 14, 2015 |
| "Online Attacks on Infrastructure Are Increasing at a Worrying Pace" |
New York Times |
Oct 14, 2015 |
| "Lawmakers push to protect trade secrets from Chinese hackers" |
The Hill |
Oct 9, 2015 |
| "Pentagon: Human-thinking machines are the answer to cyberthreats" |
Washington Examiner |
Oct 9, 2015 |
| "Economic Espionage: The Myth That 'We Have Nothing of Interest'" |
Security Intelligence |
Oct 9, 2015 |
| "U.S. Justice Department Creates Office to Combat Cyberattacks" |
Government Technology |
Oct 7, 2015 |
| "Drone phone poses as printer to hack from the air" |
SC Magazine |
Oct 6, 2015 |
| "Trade deal could curb cyber theft, advocates say" |
The Hill |
Oct 5, 2015 |
| "Pull Up Your Socks – The TPP Is Done" |
IP Watch |
Oct 5, 2015 |
| "Department of Justice plans to crack down on counterfeits sold online" |
Engadget |
Oct 5, 2015 |
| "Justice Dept. Announces New Strategy to Combat Intellectual Property Crimes" |
Sky Valley Chronicle |
Oct 3, 2015 |
| "The Evolution Of Malware" |
InformationWeek |
Oct 2, 2015 |
| "Corebot cleverly written botnet malware with growth potential" |
CSO |
Sep 16, 2015 |
| "Hackers seize control of Cisco routers in four countries" |
Consumer Affairs |
Sep 15, 2015 |
| "Report: Secret Service, ICE vulnerable to 'clickjacking'" |
Washington Examiner |
Sep 15, 2015 |
| "The new art of war: How trolls, hackers and spies are rewriting the rules of conflict" |
Tech Republic |
Sep 15, 2015 |
| "Cisco router break-ins bypass cyber defences" |
The Express Tribune |
Sep 15, 2015 |
| "Jihadist cyber-attack on Cabinet was entirely avoidable, say experts" |
SC Magazine |
Sep 15, 2015 |
| "Kremlin says hackers attacked Putin website" |
Reuters |
Sep 14, 2015 |
| "USA, China find common cyber-enemy within" |
The Register |
Sep 14, 2015 |
| "New cyber threat center to hit initial stride in October" |
Federal News Radio |
Sep 14, 2015 |
| "Bangladesh launches drive against pirated software of Microsoft" |
Dhaka Tribune |
Sep 13, 2015 |
| "Intel chiefs draw distinction between digital espionage and malicious hacks" |
Christian Science Monitor |
Sep 11, 2015 |
| "Chinese and Russian Cyber Espionage: The Kaiser Would Be Jealous" |
War on the Rocks |
Sep 11, 2015 |
| "Russia, China, North Korea and Iran remain top US cyber concerns" |
V3.CO.UK |
Sep 11, 2015 |
| "U.S. urged to tighten cyber security to counter Chinese hacking" |
Reuters |
Sep 10, 2015 |
| "Spy Chief Warns About Hackers Disrupting Financial Markets" |
Bloomberg |
Sep 10, 2015 |
| "MIT, Cambridge, Other Universities Get D's In Internet Security" |
Information Week |
Sep 10, 2015 |
| "Moscow, Beijing to Increase Cooperation in Counterfeit Fight" |
EIN News |
Sep 9, 2015 |
| "Cyber Espionage to Splinter Internet Governance" |
Stratfor |
Sep 9, 2015 |
| "Energy Dept. hacked 150 times in 4 years" |
The Hill |
Sep 9, 2015 |
| "Cyber War: a guide to state-sponsored digital assaults" |
Catch News |
Sep 7, 2015 |
| "Apple and Other Tech Companies Tangle With U.S. Over Data Access" |
New York Times |
Sep 7, 2015 |
| "Lincoln, labor and intellectual property rights" |
Washington Examiner |
Sep 7, 2015 |
| "How The Rules Of Cyber Engagement Have Changed" |
TechCrunch |
Sep 6, 2015 |
| "Crime and Espionage Becoming Tangled Online" |
Voice of America |
Sep 5, 2015 |
| "Cyber security: A thorn in US-China relations" |
GB Times |
Sep 4, 2015 |
| "Cyber Sanctions and Breach Impacts
" |
National Cybersecurity Institute |
Sep 3, 2015 |
| "Singapore: Asia’s new intellectual property hub?" |
Blouin beat Business |
Sep 2, 2015 |
| "Why Israel dominates in cyber security" |
Fortune |
Sep 1, 2015 |
| "We're At Cyberwar: A Global Guide To Nation-State Digital Attacks" |
Wired |
Sep 1, 2015 |
| "Russia and China Use Data Received From Hackers to ID U.S. Spies" |
New American |
Sep 1, 2015 |
| "Russia, China Pounce on U.S. Hacked Data" |
WorldNetDaily |
Sep 1, 2015 |
| "Exclusive: U.S. weighs sanctioning Russia as well as China in cyber attacks" |
Reuters |
Sep 1, 2015 |
| "The 20 Most Infamous Cyberattacks of the 21st Century (Part II)" |
MIT Technology Review |
Aug 27, 2015 |
| "Latest Update on Federal Trade Secrets Legislation" |
JD Supra |
Aug 27, 2015 |
| "Kaspersky catches the phishes" |
IT Wire |
Aug 27, 2015 |
| "Phishing is a $3.7-million annual cost for average large company" |
CSO Magazine |
Aug 26, 2015 |
| "Opinion: How digital voyeurism is destroying privacy" |
Christian Science Monitor |
Aug 26, 2015 |
| "Anatomy of an attack: deploying military tactics against a retailer" |
Third Certainty |
Aug 26, 2015 |
| "Latest Update on Federal Trade Secrets Legislation" |
Trading Secrets |
Aug 26, 2015 |
| "The 20 Most Infamous Cyberattacks of the 21st Century (Part I)" |
MIT Technology Review |
Aug 25, 2015 |
| "Wyndham Must Face Hacker Suit as Court Upholds FTC Power" |
Bloomberg |
Aug 24, 2015 |
| "Money, bureaucracy and weed: Why the feds are failing at cyber" |
The Hill |
Aug 24, 2015 |
| "Court Says The FTC Can Slap Companies For Getting Hacked" |
Wired |
Aug 24, 2015 |
| "Fiorina: Make cyber warfare 'very painful' for China" |
The Hill |
Aug 24, 2015 |
| "Impact of Economically Weaker China on Cyber Spying" |
Data Breach |
Aug 24, 2015 |
| "Developing a Proportionate Response to a Cyber Incident" |
Council on Foreign Relations |
Aug 23, 2015 |
| "No Blood Shed but the War is Dangerous: US and China in Cyber Conflict" |
IndraStra |
Aug 23, 2015 |
| "How to Combat the Global Cybercrime Wave" |
Brink |
Aug 18, 2015 |
| "Adobe settles hacking case that affected 38 million people and pays $1.2m legal bill" |
V3.CO.UK |
Aug 17, 2015 |
| "Michigan's battalion of digital defenders raises bar for states' cybersecurity" |
Christian Science Monitor |
Aug 17, 2015 |
| "64% of Organizations are Potential Targets for Nation-State Cyberattacks, says Survey" |
Tripwire |
Aug 17, 2015 |
| "IRS says cyberattacks more extensive than previously thought" |
Reuters |
Aug 17, 2015 |
| "A Veil of Secrecy Aids Surge in Cyber-Attacks in Asia" |
Slinking Toward Retirement |
Aug 16, 2015 |
| "How China has cyber-stumped the US and why Israel could be next" |
The Jerusalem Post |
Aug 14, 2015 |
| "Department of Homeland Security reveals top sector at risk for cyber attacks" |
Insurance Business America |
Aug 14, 2015 |
| "Russian, Chinese hackers use nearly identical tactics on US" |
The Hill |
Aug 13, 2015 |
| "CAUGHT: Lenovo crams unremovable crapware into Windows laptops – by hiding it in the BIOS" |
The Register |
Aug 12, 2015 |
| "Here’s Why People Are Furious About Lenovo Laptops Right Now" |
Time Magazine |
Aug 12, 2015 |
| "Kerry Says China and Russia 'Very Likely' Reading His Emails" |
Security Week |
Aug 12, 2015 |
| "The Most Hacker-Active Countries – Part 2" |
InfoSec Institute |
Aug 12, 2015 |
| "Hackers stole secrets for up to $100 million insider-trading profit: U.S" |
Reuters |
Aug 11, 2015 |
| "Yes, YOU will be Hacked" |
AirInsight |
Aug 11, 2015 |
| "Hacker Cracks Satellite Communications Network" |
Defense One |
Aug 6, 2015 |
| "Symantec exposes Butterfly hacking group for corporate espionage" |
Tech Republic |
Aug 6, 2015 |
| "Filer Beware! E-Filing Error Can Destroy Trade Secret Status" |
Mondaq |
Aug 5, 2015 |
| "Pentagon Hack ‘Most Sophisticated’ Ever" |
The Daily Beast |
Aug 5, 2015 |
| "Is CISA gift-wrapped for hackers and nation-state actors?" |
The Hill |
Aug 3, 2015 |
| "Beware of UAE markets: Hackers target companies to fib stock prices" |
Albawaba |
Aug 2, 2015 |
| "Super spy 'Edward Snowden wannabe' sentenced to federal prison" |
Examiner |
Aug 1, 2015 |
| "Watch out: A dangerous Windows 10 scam is being circulated online" |
Giz Burn |
Aug 1, 2015 |
| "Pentagon seeks cyberweapons strong enough to deter attacks" |
Chicago Tribune |
Jul 31, 2015 |
| "Chris Hadnagy on the Def Con hackers posing as your coworkers" |
Christian Science Monitor |
Jul 31, 2015 |
| "Former national security officials: The fear over ubiquitous data encryption is overblown" |
Business Insider |
Jul 30, 2015 |
| "Cyber criminals targeting unwary businesses - report" |
Startup Smart |
Jul 30, 2015 |
| "Australia is facing a barrage of daily cyber espionage activity" |
Rapid News Network |
Jul 30, 2015 |
| "Cyber insecurity: Hacking back" |
Financial Times |
Jul 30, 2015 |
| "Washington: Pentagon takes computer system offline" |
IBN Live |
Jul 29, 2015 |
| "How hackers can take over nuclear power plants" |
The Daily Dot |
Jul 29, 2015 |
| "Phishing Attacks Drive Spike In DNS Threat" |
InformationWeek |
Jul 27, 2015 |
| "A data security guy's musings on the OPM data breach train wreck" |
Help Net Security |
Jul 27, 2015 |
| "Flash back, Flash forward" |
Christian Science Monitor |
Jul 24, 2015 |
| "Opinion: Why the US government must lose cryptowars 2.0" |
Christian Science Monitor |
Jul 23, 2015 |
| "Catch Me If You Can: How APT Actors Are Moving Through Your Environment Unnoticed" |
Trend Micro |
Jul 23, 2015 |
| "How the US Is Trying to Shape Norms in Cyberspace" |
The Diplomat |
Jul 23, 2015 |
| "After hack, U.S. lawmakers look to protect 'dot-gov' domain" |
Reuters |
Jul 22, 2015 |
| "Is the Ashley Madison data breach worse than other data breaches?" |
AVAST |
Jul 21, 2015 |
| "As Nations Hack Each Other, Protecting Personal Information Must Become National Security Priority" |
Forbes |
Jul 21, 2015 |
| "U.S. vs. Hackers: Still Lopsided Despite Years of Warnings and a Recent Push" |
New York Times |
Jul 18, 2015 |
| "Just get rid of Java finally" |
CSO Online |
Jul 17, 2015 |
| "Ex-employees probed in attack on Italian cybersecurity firm" |
Reuters |
Jul 17, 2015 |
| "Google expanding security feature that prevents malware installs" |
ZDNet |
Jul 16, 2015 |
| "The Weakest Link in the Supply Chain: Beware of Third Party Hacks" |
Comilion |
Jul 16, 2015 |
| "Welcome to the Electronic Age of the Spy: Internet is Making it Easier to Steal and Trade information." |
Matthew Waid |
Jul 15, 2015 |
| "“International Cyber Stability” and the UN Group of Governmental Experts" |
Critical Infrastructure Daily |
Jul 15, 2015 |
| "US probe of Darkode reached into Canada" |
Cambridge Times |
Jul 15, 2015 |
| "Hacking Forum Darkode Dismantled in Multi-Nation Operation" |
Security Week |
Jul 15, 2015 |
| "U.S. says computer hacking forum Darkode dismantled, 12 charged" |
Reuters |
Jul 15, 2015 |
| "4 Lasting Impacts Of The Hacking Team Leaks" |
Information Week |
Jul 15, 2015 |
| "NYSE Outage May Have Been A Cyber Attack: John McAfee" |
Value Walk |
Jul 14, 2015 |
| "Pay attention to cyber security" |
Daily Record |
Jul 14, 2015 |
| "Three UK politicians hacked while using open WiFi networks" |
Digital Munition |
Jul 12, 2015 |
| "The Great Wall St. hack mystery" |
Silicon Angle |
Jul 9, 2015 |
| "These Are The Hacker Groups Everyone’s Watching Right Now" |
The Daily Caller |
Jul 9, 2015 |
| "Hackers of Apple, Facebook seen as independent group seeking money: Report" |
FirstPost |
Jul 9, 2015 |
| "U.S. and China Collaborate on Global Supply Chain Security" |
Amber Road |
Jul 9, 2015 |
| "Morpho, the financially motivated espionage target giant firms" |
Security Affairs |
Jul 9, 2015 |
| "To Prevent Cyberattacks, Share the Threat Data" |
Wall Street Journal |
Jul 9, 2015 |
| "Creepy cyber coincidence? Probably not" |
PBS News |
Jul 9, 2015 |
| "Day of ‘technical’ glitches puts lawmakers on edge" |
The Hill |
Jul 8, 2015 |
| "Hackers Could Be Probing Stock Exchange Network, Says Cybersecurity Firm" |
Epoch Times |
Jul 8, 2015 |
| "Symantec Report Suggests Hackers’ Motives Are Blurring" |
New York Times |
Jul 8, 2015 |
| "Hackers of Apple, Facebook seen as independent group seeking money" |
GMA News |
Jul 8, 2015 |
| "Meet the hackers who break into Microsoft and Apple to steal insider info" |
ARS Technica |
Jul 8, 2015 |
| "Duqu 2.0: New, menacing programming concept" |
Homeland Security News Wire |
Jul 2, 2015 |
| "Harvard Reveals It Had An IT Breach In June Impacting 8 Colleges And Administrations" |
TechCrunch |
Jul 2, 2015 |
| "Team GhostShell hacktivists dump data from US universities and hundreds of sites" |
Computerworld |
Jul 1, 2015 |
| "A Critical Threat" |
SC Magazine |
Jul 1, 2015 |
| "Defense cyber strategy: We can and will hit back" |
C4ISR & Networks |
Jul 1, 2015 |
| "Spies Warned Feds About OPM Mega-Hack Danger" |
The Daily Beast |
Jun 30, 2015 |
| "America's cyber sentinel asleep on guard duty" |
CNN |
Jun 30, 2015 |
| "Constructing a Cyber Superpower" |
Defense News |
Jun 29, 2015 |
| "6 reasons why there will be another OPM-style hack" |
Computerworld |
Jun 29, 2015 |
| "The OPM Breach: Timeline of a Hack" |
Tripwire |
Jun 29, 2015 |
| "Top Secret Anti-Hacking Unit Foiled Attack On Nato Summit" |
Sun Nation |
Jun 27, 2015 |
| "Anesthetized by Data Breaches" |
Invincea |
Jun 26, 2015 |
| "The high cost of cyber-espionage" |
Washington Times |
Jun 25, 2015 |
| "How Fortune got inside the Sony hack" |
Fortune |
Jun 25, 2015 |
| "The new Cold War: how Russia and China are hacking British companies and spying on their employees" |
The Telegraph (UK) |
Jun 25, 2015 |
| "GEOINT 2015: Intel chief wants decisive cyber response" |
C4ISR & Network |
Jun 25, 2015 |
| "Why Cyber War Is Dangerous for Democracies" |
The Atlantic |
Jun 25, 2015 |
| "China, US agree to establish cyber code of conduct" |
ZD Net |
Jun 25, 2015 |
| "FIN4 hacking group English speakers with banking sector ties" |
V3.CO.UK |
Jun 25, 2015 |
| "Exclusive: SEC hunts hackers who stole corporate emails to trade stocks" |
Reuters |
Jun 24, 2015 |
| "Hackers target Polish airline LOT, ground 1,400 passengers" |
Business Insider |
Jun 21, 2015 |
| "Hunt for Deep Panda intensifies in trenches of U.S.-China cyberwar" |
Reuters |
Jun 21, 2015 |
| "EMC Is Caught in the Crosshairs of a Cyberwar That Never Ends" |
Bloomberg |
Jun 19, 2015 |
| "The US defense industry is reeling after the latest massive cyber attack" |
Business Iinsider |
Jun 18, 2015 |
| "MI6 Agents Have Been Identified From Snowden Files, Report" |
Mathew Aid |
Jun 14, 2015 |
| "Britain moves spies as Russia cracks Snowden files" |
Raidió Teilifís Éireann |
Jun 14, 2015 |
| "Cyber expert: People are missing the real question we should ask about Israel spying on Iran talks" |
Business Insider |
Jun 11, 2015 |
| "RAND study: Cyber-defense must change course, or else" |
ZD Net |
Jun 10, 2015 |
| "The Defender's Dilemma
Charting a Course Toward Cybersecurity [PDF]" |
RAND Corp. |
Jun 10, 2015 |
| "Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border" |
New York Times |
Jun 4, 2015 |
| "NSA's secret hunt for hackers: How widespread? (+video)" |
Christian Science Monitor |
Jun 4, 2015 |
| "America’s Passive-Aggressive Cyber Stance" |
The CyberSecurity Place |
Jun 4, 2015 |
| "US-Japan cyber cooperation comes to life" |
Asian Review |
Jun 4, 2015 |
| "A quarter of small businesses had their IP infringed in last five years" |
Elite Business |
Jun 3, 2015 |
| "Protecting ideas and inventions 'too costly' and 'complex' for small firms" |
The Telegraph |
Jun 3, 2015 |
| "The ‘Innovation Act’ exposes American companies to foreign spies" |
The Hill |
Jun 2, 2015 |
| "Businesses See 106 Unknown Malware Attacks Per Hour" |
Info Security Magazine |
Jun 2, 2015 |
| "Getting the Word Out About Fake Tech Support Scams" |
Blue Coat Labs |
Jun 1, 2015 |
| "Cyber Attacks rising from the ashes of Communism" |
CSO Magazine |
Jun 1, 2015 |
| "Recent Intellectual Property Lawsuit Reveals the Serious Nature of Insider Threats" |
IT Business Edge |
Jun 1, 2015 |
| "Net of Insecurity: The Long Like of a Quick 'Fix'" |
Washington Post |
May 31, 2015 |
| "Net of Insecurity: A flaw in the design" |
Washington Post |
May 30, 2015 |
| "State-Sponsored Cybercrime: A Growing Business Threat" |
InformationWeek |
May 26, 2015 |
| "Cyber Threat Analysis: A Call for Clarity" |
InformationWeek |
May 22, 2015 |
| "More bad news: The bad guys are getting better" |
GCN |
May 22, 2015 |
| "Unknown Hackers Hit Systems at Bundestag" |
Cyber Defense Magazine |
May 21, 2015 |
| "'Black Cloud' darkens the enterprise to all but authorized devices" |
GCN |
May 20, 2015 |
| "FireEye has become go-to company for breaches" |
USA Today |
May 20, 2015 |
| "Hackers cause major data breach for Telstra's Pacnet" |
Mashable |
May 20, 2015 |
| "Hackers Exposed Government Data in Breach of Telstra's Pacnet" |
Bloomberg |
May 20, 2015 |
| "Cyber attacks against govt expose fatal cracks in Pakistan's digital fence" |
Dawn |
May 19, 2015 |
| "Hackers just did something VERY scary" |
Komando |
May 19, 2015 |
| "Login system supplies fake passwords to hackers" |
PC World |
May 19, 2015 |
| "Why The Cybersecurity Domino Effect Matters" |
Forbes |
May 18, 2015 |
| "Venom, Chinese attacks and DeputyDog: What we learned in security this week" |
V3.co.uk |
May 15, 2015 |
| "Report warns ports, maritime industry at high risk for cyber attacks" |
MyNorthwest |
May 13, 2015 |
| "The State Department's Weary Soldier in America's Cyber War" |
Foreign Policy |
May 13, 2015 |
| "Russia - China Put Up United Front Against US With Cyber Treaty" |
Russia Insider |
May 12, 2015 |
| "Russia and China Pledge to Fight Together for Cyber Security" |
Cloudtweaks |
May 12, 2015 |
| "Fortune 500 businesses could collapse under cybercrime threat, security firm warns" |
Australian Financial Review |
May 11, 2015 |
| "Russia, China May Sign Information Security Cooperation Deal on May 8" |
Sputnik International |
May 7, 2015 |
| "Shamed Germany severs US spy links after they were accused of jointly spying on European governments and companies" |
Daily Mail (UK) |
May 7, 2015 |
| "How Airbus Built a Security System to Protect Itself from IP Theft - that German and US Intelligence Undermined" |
DCL Search |
May 6, 2015 |
| "Rombertik is a Bizarre, Scary Brilliant Piece of Self-Destructing Malware" |
Daily Tech |
May 6, 2015 |
| "The impossible task of counting up the world's cyber armies" |
ZD Net |
May 6, 2015 |
| "Breaches prompt lobbying surge behind cyber bill" |
The Hill |
May 5, 2015 |
| "Executive Order Authorizes Sanctions against Cybercriminals" |
WeComply |
May 4, 2015 |
| "Rombertik Malware Can Overwrite MBR If Audited" |
ThreatPost |
May 4, 2015 |
| "Super secretive malware wipes hard drive to prevent analysis" |
ArsTechnica |
May 4, 2015 |
| "India, Japan vow to crack down on cyber crimes" |
Times of India |
May 3, 2015 |
| "The cyber gold rush" |
Christian Science Monitor |
May 3, 2015 |
| "Air traffic system replaced amid hacking worries" |
The Hill |
May 2, 2015 |
| "Why hackers target background investigation databases" |
Security Affairs |
May 1, 2015 |
| "VA reaching breaking point as malware attacks rise" |
Federal Times |
Apr 30, 2015 |
| "Colleges in a cyber war with hackers; open networks vulnerable to attacks" |
NorthJersey |
Apr 29, 2015 |
| "6 Ways to Protect U.S. Grid from Cyber Attacks" |
Wall Street Journal |
Apr 28, 2015 |
| "No monkeys for CozyDuke" |
Kaspersky Lab |
Apr 28, 2015 |
| "Thin Clients & Persistent Threats: Coping With The New Cyber Dangers" |
Breaking Defense |
Apr 28, 2015 |
| "CozyDuke's rampaging 'funny monkeys' prove no one is immune to phishing" |
V3.CO.UK |
Apr 27, 2015 |
| "Hacker Implants NFC Chip In His Hand To Bypass Security Scans And Exploit Android Phones" |
Forbes |
Apr 27, 2015 |
| "We are not prepared for a cyber attack on Western energy infrastructure" |
Security Affairs |
Apr 27, 2015 |
| "Will Xbox Hacker Sentence Deter Others?" |
Data Breach |
Apr 27, 2015 |
| "NSA veteran chief fears crippling cyber-attack on Western energy infrastructure" |
The Telegraph (UK) |
Apr 26, 2015 |
| "Official: US Readying Hacking-Related Sanctions" |
ABC News |
Apr 25, 2015 |
| "Apple wins patent appeal in China" |
NMFMP Blog |
Apr 24, 2015 |
| "At cybersecurity gathering, the White House steps up charm offensive" |
Christian Science Monitor |
Apr 24, 2015 |
| "Here's why the Pentagon is publishing its cyber-warfare rulebook" |
The Register |
Apr 24, 2015 |
| "Men in black – NATO's cybermen" |
NATO |
Apr 24, 2015 |
| "What's new in the U.S. cyber strategy" |
Washington Post |
Apr 24, 2015 |
| "Foreign hacker sentenced for first time ever in US" |
Delaware Online |
Apr 23, 2015 |
| "Official: State Department Hit By Hackers 'Thousands of Times a Day'" |
Washington Free Beacon |
Apr 23, 2015 |
| "Pentagon Announces New Strategy for Cyberwarfare" |
New York Times |
Apr 23, 2015 |
| "Pentagon cybersecurity strategy comes with olive branch to Silicon Valley" |
Christian Science Monitor |
Apr 23, 2015 |
| "Pentagon Responds to Russian Hacker Breach by 'Showing a Little Leg'" |
VICE |
Apr 23, 2015 |
| "Pentagon: Cyberwarfare a viable option in conflicts with enemies" |
CBS News |
Apr 23, 2015 |
| "RSA 2015: Panelists debate a way forward for matters of cyber conflict" |
SC Magazine |
Apr 23, 2015 |
| "The new German spying scandal is a big deal" |
Washington Post |
Apr 23, 2015 |
| "Why U.S. Grid Still Vulnerable to Cyber Attack" |
Deloitte CIO Journal |
Apr 22, 2015 |
| "Feds Warn Airlines To Look Out For Passengers Hacking Jets" |
Wired |
Apr 21, 2015 |
| "Hacker's Tweet Reignites Ugly Battle Over Security Holes" |
Wired |
Apr 21, 2015 |
| "RSA President Amit Yoran offers up a five-point plan to deal with the new security environment" |
NetworkWorld |
Apr 21, 2015 |
| "Smart City Technology May Be Vulnerable to Hackers" |
New York Times |
Apr 21, 2015 |
| "Snowden revelations just gave China more ammunition against US hacking" |
Democratic Underground |
Apr 21, 2015 |
| "Internet Security Threat Report" |
Symantec |
Apr 20, 2015 |
| "Snowden revelations just gave China more ammunition against US hacking" |
Business Insider |
Apr 20, 2015 |
| "Future of U.S. Cybersecurity In the Hands of U.S. Congress, Many of Whose Members Don't Know How to Use Email" |
Matthew Aid |
Apr 19, 2015 |
| "The Pentagon's new cyber attack plan: 'Blunt force trauma'" |
POLITICO |
Apr 18, 2015 |
| "Hackers have 'begun targeting nuclear power plants,' cyber warfare expert warns" |
Jerusalem Post |
Apr 16, 2015 |
| "ICE, CBP hosts intellectual property rights training in Kuwait" |
U.S. ICE |
Apr 16, 2015 |
| "2015 Data Breach Investigation Report" |
Verizon |
Apr 15, 2015 |
| "Disneyland IP to be protected" |
Shanghai.Gov |
Apr 15, 2015 |
| "Verizon Releases 2015 Data Breach Investigation Report" |
SurfWatch |
Apr 15, 2015 |
| "Why Standardized Threat Data Will Help Stop the Next Big Breach" |
Information Week |
Apr 15, 2015 |
| "'APT-On-APT' Action" |
Information Week |
Apr 14, 2015 |
| "Caught in the Crossfire: The Business Impact of Cyberwar and High Tech Espionage" |
Tripwire |
Apr 14, 2015 |
| "The Wolves of Vuln Street - The First System Dynamics Model of the 0day Market" |
HackerOne |
Apr 14, 2015 |
| "Japan - Record-Breaking Trade Secret Cases" |
Conventus Law |
Apr 13, 2015 |
| "LETTER: It's time to 'get serious' about theft of intellectual property" |
Sioux City Journal |
Apr 12, 2015 |
| "Thousands could launch Sony-style cyberattack, says ex-hacker" |
CNet |
Apr 12, 2015 |
| "Will China and America Clash in Cyberspace?" |
The National Interest |
Apr 12, 2015 |
| "Hacking Critical Infrastructure is Accelerating and More Destructive" |
Gov Tech |
Apr 11, 2015 |
| "Another Reason For Ubiquitous Web Encryption: To Neuter China's 'Great Cannon'" |
Forbes |
Apr 10, 2015 |
| "Cyber Security of Critical Infrastructures in the Americas" |
Trend Micro |
Apr 10, 2015 |
| "Qubits Haven: Quantum Broadband Breakthrough to Give Hackers Many a Sleepless Night" |
World Industrial Reporter |
Apr 10, 2015 |
| "The 'Great Cannon' is Chinas Powerful New Hacking Weapon" |
Motherboard |
Apr 10, 2015 |
| "Global Tensions Increase Cyber Threat" |
Financial Times |
Apr 9, 2015 |
| "'Digital Oilfield' Vulnerable to Cyber Threats" |
Brink News |
Apr 7, 2015 |
| "Many big companies are still vulnerable to the biggest computer bug ever discovered, report says" |
InstaMun |
Apr 7, 2015 |
| "Former Cyber-Security Czar Says Network Perimeter Defenses Don't Work" |
eWeek |
Apr 6, 2015 |
| "National Security Council Advisor Urges US-China Cybersecurity Cooperation" |
Dark Matters |
Apr 6, 2015 |
| "Promoting Norms for Cyberspace" |
Council on Foreign Relations |
Apr 6, 2015 |
| "Trade secrets and national security" |
CSTV Univ. Waterloo |
Apr 6, 2015 |
| "U.S. Seizure of Jewelry, Watches by Value Drops 25% to $375M" |
Rapaport |
Apr 6, 2015 |
| "Why it's so hard to create norms in cyberspace" |
Washington Post |
Apr 6, 2015 |
| "Arrested hacker pleads guilty to $100 million theft of Microsoft, Valve, U.S. Army data" |
Digital Munition |
Apr 2, 2015 |
| "Google, Firefox will pop up warnings to indicate exposure to hackers if users visit the Chinese sites" |
Techworm |
Apr 2, 2015 |
| "Obama Draws Cyber Line in Sand" |
TechNewsWorld |
Apr 2, 2015 |
| "Watch Out Would-Be Hackers! The United States Is Playing Cyber Hard Ball" |
The Diplomat |
Apr 2, 2015 |
| "Are Hackers Threatening to Punch America's Lights Out?" |
Investment U |
Apr 1, 2015 |
| "Influencers: Companies should not be allowed to hack back" |
Christian Science Monitor |
Apr 1, 2015 |
| "New Obama Order Allows Sanctions Against Foreign Hackers" |
Wired |
Apr 1, 2015 |
| "New Obama Order Allows Sanctions Against Foreign Hackers" |
Wired |
Apr 1, 2015 |
| "Obama Declares Hacking a 'National Emergency'" |
Motherboard |
Apr 1, 2015 |
| "Obama Emergency Cyber Sanctions 'Another Salvo In War On Legitimate Hackers'" |
Forbes |
Apr 1, 2015 |
| "Obama targets foreign hackers and state-owned companies over cyber-attacks" |
The Guardian |
Apr 1, 2015 |
| "Opinion: Sanctions may be Obama's best idea yet to battle cyberattacks" |
Christian Science Monitor |
Apr 1, 2015 |
| "The Obama administration just opened a new 'weaponization of finance' front" |
Business Insider |
Apr 1, 2015 |
| "U.S. establishes sanctions program to combat cyberattacks, cyberspying" |
Washington Post |
Apr 1, 2015 |
| "U.S. targets overseas cyber attackers with sanctions program" |
Reuters |
Apr 1, 2015 |
| "War on Hackers: a Clear and Present Danger" |
Errata Security |
Apr 1, 2015 |
| "Hackers attack the energy industry with malware designed for snooping" |
Fortune |
Mar 31, 2015 |
| "Taiwan: A Useful Ally Against China's Cyber Warriors?" |
The Diplomat |
Mar 31, 2015 |
| "DARPA Launches 'Plan X' to Defeat Chinese and Russian Hackers" |
China Topix |
Mar 29, 2015 |
| "The Pentagon is building an app store for cyberoperations" |
Christian Science Monitor |
Mar 29, 2015 |
| "Cyber War and Cyber Profits" |
Money & Markets |
Mar 23, 2015 |
| "Defence Ministry Warns of Espionage Attempts by China, Pakistan; Sounds Red Alert" |
International business Times |
Mar 23, 2015 |
| "Hackers Have Found a Way to Get into Nearly Every Computer" |
BullFax |
Mar 23, 2015 |
| "Many computers vulnerable to BIOS leak (HP and DELL are included)" |
CyberWarZone |
Mar 23, 2015 |
| "The US has started to put bounties on the heads of hackers" |
Business insider |
Mar 23, 2015 |
| "Everything is insecure and will be forever says Cisco CTO" |
The Register |
Mar 22, 2015 |
| "Gone in 60 seconds: Chinese hackers shut down Adobe Flash, Internet Explorer ... but only for top hackathon" |
South China Morning Post |
Mar 21, 2015 |
| "Future Crimes -- A Guide To Tech Threats From Hackers, China, Google And Facebook" |
Forbes |
Mar 20, 2015 |
| "No Browser is safe : Chrome, Firefox, Internet Explorer, Safari all hacked at Pwn2Own contest" |
TechWorm |
Mar 20, 2015 |
| "Major US health insurer hacked, affecting 11 million" |
Business Standard |
Mar 18, 2015 |
| "Authorities Closing In on Hackers Who Stole Data From JPMorgan Chase" |
New York Times |
Mar 15, 2015 |
| "Cybersecurity firms hunt foreign spies" |
ABS-CBN News |
Mar 15, 2015 |
| "Website Hackers Slip Under The Radar With Impersonator Bots" |
TechCrunch |
Mar 14, 2015 |
| "Equation Group is NSA in Disguise New evidence by Kaspersky researchers suggests" |
TechWorm |
Mar 12, 2015 |
| "Politics intrude as cybersecurity firms hunt foreign spies" |
Reuters |
Mar 12, 2015 |
| "Banks warned to stay out of politics as state-sponsored cyber-attacks get personal" |
OTC Space |
Mar 11, 2015 |
| "Justice Dept. vows to strike harder against hackers, nations behind cyberattacks" |
Christian Science Monitor |
Mar 9, 2015 |
| "Pentagon to hire 3000 hackers" |
IT News |
Mar 9, 2015 |
| "Millions at risk from 'Freak' encryption bug" |
ITP |
Mar 8, 2015 |
| "Animals in the APT Farm" |
SecureList |
Mar 6, 2015 |
| "Efforts To Team Up And Fight Off Hackers Intensify" |
Information Week |
Mar 5, 2015 |
| "Georgia: Giving Up the Pirate Life?" |
Eurasianet |
Mar 5, 2015 |
| "One Way to Counter Chinese Hacking: Poison the Well" |
Real Clear Defense |
Mar 5, 2015 |
| "4 Top Hacker Groups And What They Want" |
Make Use Of |
Mar 4, 2015 |
| "A New Economic Threat: State-Sponsored Hacking" |
Investopedia |
Mar 4, 2015 |
| "Who's Really Spreading through the Bright Star?" |
Secure List |
Mar 4, 2015 |
| "'FREAK' - New SSL/TLS Vulnerability Explained" |
The Hacker News |
Mar 3, 2015 |
| "Lockheed sees shift in focus on infrastructure cyber security" |
Reuters |
Mar 2, 2015 |
| "North Korean Cyber Attack on Sony Poses Tough Security Questions" |
National Defense Magazine |
Mar 2, 2015 |
| "The Democratization of Cyberattack" |
Schneier on Security |
Mar 2, 2015 |
| "What You Need To Know About Nation-State Hacked Hard Drives" |
Information Week |
Mar 2, 2015 |
| "What's Next in Government Surveillance" |
The Atlantic |
Mar 2, 2015 |
| "Wall Street Journal CIO Network Event: Old Thinking Won't Fix New Problems" |
Bromium |
Feb 27, 2015 |
| "'Cyber Armageddon' not likely to wipe out US, intelligence director says" |
Ars Technica |
Feb 26, 2015 |
| "Hackers Steal Trading Algorithms" |
Data Breach Today |
Feb 26, 2015 |
| "Lenovo Website Hijacked" |
Data Breach Today |
Feb 26, 2015 |
| "Part III: Solving the mystery of shadow hacking organization The Equation Group" |
RedOrbit |
Feb 26, 2015 |
| "Part II: Solving the mystery of shadow hacker organization The Equation Group" |
RedOrbit |
Feb 25, 2015 |
| "Cybercrime, Cyber Espionage Tactics Converge" |
Information Week |
Feb 24, 2015 |
| "Despite Increased Awareness, Hackers Can Still Breach Your Network in Under 30 Minutes" |
Whir |
Feb 24, 2015 |
| "From Hacking Systems To Hacking People" |
Information Week |
Feb 24, 2015 |
| "Mandiant Report: Beyond the Breach" |
FireEye |
Feb 24, 2015 |
| "Part I: Solving the mystery of shadow hacker organization The Equation Group" |
RedOrbit |
Feb 24, 2015 |
| "What NSA Director Mike Rogers Doesn't Get About Encryption" |
Cato Institute |
Feb 24, 2015 |
| "Three hacking groups you need to know" |
The Hill |
Feb 23, 2015 |
| "A Russian cyber-security company is impressing the skeptics" |
Business Insider |
Feb 22, 2015 |
| "Ars: SSL-Busting Code That Threatened Lenovo Users Found In a Dozen More Apps" |
Slashdot |
Feb 22, 2015 |
| "Cyberspying Targets Energy Secrets Intruders seek data on oil deposits, cutting-edge technology" |
CyberArmyBD |
Feb 22, 2015 |
| "Why are we still constantly surprised that Intelligence (espionage) Agencies do exactly what they're supposed to do?" |
Cytegic |
Feb 22, 2015 |
| "NSA helped British steal cell phone codes" |
South China Morning Post |
Feb 20, 2015 |
| "Visual Hacking Is Highly Successful at Getting Sensitive Information" |
SoftPedia |
Feb 20, 2015 |
| "Equation Group: from Houston with love" |
SecureList |
Feb 19, 2015 |
| "Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections" |
ArsTechnica |
Feb 19, 2015 |
| "Lenovo to stop pre-installing controversial software" |
Reuters |
Feb 19, 2015 |
| "The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle" |
The Intercept |
Feb 19, 2015 |
| "The Secret's Out: NSA Personnel are Out-Hacking the Chinese and Russians" |
To Inform is to Influence |
Feb 19, 2015 |
| "New Report Highlights China's Cybersecurity Nightmare" |
The Diplomat |
Feb 18, 2015 |
| "Hacked Hardware Could Cause The Next Big Security Breach" |
Popular Science |
Feb 17, 2015 |
| "Examining the Risks and Advantages of Biohacking" |
ThreatPost |
Feb 16, 2015 |
| "Newly Discovered 'Master' Cyber Espionage Group Trumps Stuxnet" |
Information Week |
Feb 16, 2015 |
| "Russian researchers expose breakthrough U.S. spying program" |
Reuters |
Feb 16, 2015 |
| "Google's Project Zero gets tough on companies with lax security patch policies" |
TechWorm |
Feb 15, 2015 |
| "Best hacker defense? Let them in, experts say." |
Christian Science Monitor |
Feb 11, 2015 |
| "Daniels: CTIIC will take pressure off White House" |
FCW |
Feb 11, 2015 |
| "Let hackers in - experts say traps might be better than walls" |
National Cyber Security |
Feb 11, 2015 |
| "Possible Cyber-Attack at Defense Agency" |
Data Breach Today |
Feb 11, 2015 |
| "US Creates Cyber-CIA to Fight Hackers" |
Space War |
Feb 11, 2015 |
| "Business, the Feds and Cybersecurity" |
Wall Street Journal |
Feb 9, 2015 |
| "Canadian agencies use data stolen by foreign hackers, memo reveals" |
Globe and Mail |
Feb 6, 2015 |
| "China frees Canadian held on spying charge" |
Global News (Canada) |
Feb 5, 2015 |
| "iOS Devices Targeted by Cyber-Espionage Campaign" |
SoftPedia |
Feb 5, 2015 |
| "Army readies for digital battlefield" |
Times of India |
Feb 4, 2015 |
| "Guest Post: Two Years Later, The EU's Cybersecurity Strategy Stumbles Forward" |
Council on Foreign Relations |
Feb 3, 2015 |
| "New Technology Detects Hacks in Milliseconds" |
Bloomberg |
Feb 3, 2015 |
| "Another Unpatched Adobe Flash Zero-Day vulnerability Exploited in the Wild" |
The Hacker News |
Feb 2, 2015 |
| "Malware: Software with malice" |
Northbay Business Journal |
Feb 2, 2015 |
| "Target Malware Kingpins" |
Brookings Institute |
Feb 2, 2015 |
| "US ups stakes in cyberwarfare" |
Aljazeera |
Jan 29, 2015 |
| "What every utility should know about the new physical security standard" |
Intelligent Utility |
Jan 29, 2015 |
| ""Game of Threats" PwC's new game to create awareness against hacking" |
TechWorm |
Jan 27, 2015 |
| "Digital Jihad: Isis, Al Qaeda Seek a Cyber Caliphate to Launch Attacks on US" |
Unity Coalition for Israel |
Jan 27, 2015 |
| "We Are On Notice: Terrorists Target Grids" |
Breibart |
Jan 27, 2015 |
| "The Threat of International Cyber Hacking" |
Economy Watch |
Jan 24, 2015 |
| "Unregulated cyberspace a cause for concern" |
East Asia Forum |
Jan 24, 2015 |
| "Companies Will Increasingly Be in the Cross-Hairs of Nation-State Cyber-Attacks" |
EMC |
Jan 23, 2015 |
| "Why the Sony Hack Matters" |
Elsevier |
Jan 23, 2015 |
| "Cisco 2015 Annual Security Report" |
CiscoZine |
Jan 21, 2015 |
| "Senate: Homeland Security Totally Screwed Up Cyber Defense" |
Sputnik News |
Jan 17, 2015 |
| "CISP Report: Sony Pictures Entertainment hacked" |
CERT-UK |
Jan 16, 2015 |
| "Governments Struggle to Respond to Hackers" |
Defense News |
Jan 16, 2015 |
| "Hackers Managing Infiltration Almost 'At Will,' Says FireEye" |
spam News |
Jan 16, 2015 |
| "Need Some Espionage Done? Hackers Are for Hire Online" |
To Inform Is To Influence |
Jan 16, 2015 |
| "Needed: an international cyber treaty" |
Asia Times |
Jan 16, 2015 |
| "US and UK declare red-team CYBER WAR – on EACH OTHER" |
The Register |
Jan 16, 2015 |
| "Spear-Fishing Website Hosts Outlook Web App Phishing Page" |
Softpedia |
Jan 15, 2015 |
| "The modern hacker takes on a new role" |
A Breaking News |
Jan 15, 2015 |
| "UK and US spies to carry out fake hacking attacks on banks, airlines and nuclear plants" |
Daily Mail |
Jan 15, 2015 |
| "Malicious hackers use simple email scam to WRECK German steel mill" |
Mirror |
Jan 14, 2015 |
| "New report: DHS is a mess of cybersecurity incompetence" |
ZDNet |
Jan 14, 2015 |
| "Why CENTCOM Was Cyber Stupid" |
The National Interest |
Jan 14, 2015 |
| "British Hacker Linked To Attack On Pentagon Twitter Feed" |
Huffington Post |
Jan 13, 2015 |
| "Exploits: The Next Generation" |
Public Technology |
Jan 13, 2015 |
| "How Should The US Respond To Cyber Attacks?" |
Task & Purpose |
Jan 13, 2015 |
| "Maginot Revisited: More Real-World Results from Real-World Tests" |
FireEye |
Jan 13, 2015 |
| "Security Experts React to President's Cybersecurity Proposals" |
IT News |
Jan 13, 2015 |
| "US probes military account hack" |
Technology Spectator |
Jan 13, 2015 |
| "'Skeleton Key' Malware Bypasses Active Directory" |
Information Week |
Jan 12, 2015 |
| "Malware Statistics" |
AV-Test |
Jan 12, 2015 |
| "Mutually Assured Destruction? Nation States on the Cyber Offensive" |
Veracode |
Jan 12, 2015 |
| "Skeleton Key Malware Analysis" |
Dell |
Jan 12, 2015 |
| "Study: Majority of enterprises breached in first half of 2014, regardless of vertical" |
SC Magazine |
Jan 12, 2015 |
| "Wrong message sent in the Sony hack debate" |
The Hill |
Jan 12, 2015 |
| "Ireland on frontline in cyber war as hackers box clever" |
Independent |
Jan 11, 2015 |
| "Stuxnet-like cyberattack on German steel plant deepens security concerns" |
Homeland Security News Wire |
Jan 9, 2015 |
| "Today's computers face more attacks than ever" |
CNet |
Jan 9, 2015 |
| "10 Ominous State-Sponsored Hacker Groups" |
ListVerse |
Jan 8, 2015 |
| "Hacking Attack Causes Physical Damage at German Steel Mill" |
Schneier on Security |
Jan 8, 2015 |
| "How NOT To Be The Next Sony: Defending Against Destructive Attacks" |
Information Week |
Jan 8, 2015 |
| "As cyber attacks swell, a move toward improved industry collaboration" |
Fortune |
Jan 7, 2015 |
| "Sony Cyber Hacking Fallout: Lawful Cowboys Versus Elizabethan Pirates" |
Cold War Daily |
Jan 5, 2015 |
| "The Sony Hackers and the Blame Game" |
Bloomberg |
Jan 5, 2015 |
| "We Still Don't Know Who Hacked Sony" |
The Atlantic |
Jan 5, 2015 |
| "Hunting the hackers: Tough and getting tougher, but more important than ever" |
ZDNet |
Jan 4, 2015 |
| "Is Kim Jong Un innocent?" |
The Economist |
Jan 3, 2015 |
2014
|
| "China Begins Investigating Hacking on S. Korea's Nuclear Manager" |
KBS World |
Dec 31, 2014 |
| "IT Security Year in Review: Start-Stop-Stay 2015" |
Anitian |
Dec 31, 2014 |
| "Sony hackers threaten attack on US news organization" |
New York Post |
Dec 31, 2014 |
| "Who infiltrated GOV.AF? - Chinese Hackers or US Hackers?" |
Bashir |
Dec 31, 2014 |
| "FBI Investigating Whether Companies Are Engaged in Revenge Hacking" |
Bloomberg |
Dec 30, 2014 |
| "The Year of the Breach: 10 Federal Agency Data Breaches in 2014" |
Nextgov |
Dec 30, 2014 |
| "Hacker fakes German minister's fingerprints using photos of her hands" |
The Guardian |
Dec 30, 2014 |
| "A number of private security researchers are increasingly voicing doubts that the hack of Sony's computer systems was the work of North Korea" |
Boston Globe |
Dec 24, 2014 |
| "Deadline Looms as Hackers Threaten to Destroy Control Systems of Nuclear Facilities" |
Alternative News |
Dec 24, 2014 |
| "These Cybersecurity Experts Still Don't Think North Korea Hacked Sony" |
WRC |
Dec 24, 2014 |
| "Attributing Cyber Attacks" |
Journal of Strategic Studies |
Dec 23, 2014 |
| "South Korean nuclear operator hacked amid cyber-attack fears" |
The Guardian |
Dec 23, 2014 |
| "North Korea Loses Its Link to the Internet" |
New York Times |
Dec 22, 2014 |
| "Cyberattack on German Iron Plant Causes 'Widespread Damage': Report" |
Wall Street Journal |
Dec 18, 2014 |
| "ICANN Spear Phishing Attack Strikes at the Heart of the Internet" |
Info Security Magazine |
Dec 18, 2014 |
| "What Did Federal CIOs Learn About Cybersecurity in 2014?" |
Nextgov |
Dec 18, 2014 |
| "5 lessons from the Sony hack" |
CNN |
Dec 17, 2014 |
| "Report: North Korea May Be Behind Sony Pictures Hack After All (Update)" |
Gizmodo |
Dec 17, 2014 |
| "Sony Pictures Breach: Saga Yields Insight On Basic Security Lapses" |
CRN |
Dec 17, 2014 |
| "Top 10 information security bloggers in 2014" |
27001 Academy |
Dec 17, 2014 |
| "India remains a laggard in innovation, China overtakes US" |
Live Mint |
Dec 16, 2014 |
| "Cyber attack: Waiting to strike" |
Khaleej Times |
Dec 15, 2014 |
| "Sony hacked in February, knew about security flaws before data leak" |
Network World |
Dec 14, 2014 |
| "Sony ignored security evaluation before GOP hack, more data coming" |
Electronista |
Dec 14, 2014 |
| "The Sony Pictures hack: Everything we know so far" |
TheNextWeb |
Dec 13, 2014 |
| "Here's How Cyber-Warfare Started And Where It's Going" |
Business Insider |
Dec 12, 2014 |
| "No Respite for Sony" |
TechNewsWorld |
Dec 12, 2014 |
| "SONY INSIDER: 'The Security Team Has No F---ing Clue'" |
Business Insider |
Dec 12, 2014 |
| "Digital Spies Target Diplomats' iPhones, Androids And PCs With 'Inception' Malware" |
Forbes |
Dec 10, 2014 |
| "Stealthy 'Inception' attack framework detailed; possible return of 'Red October' group" |
SC Magazine |
Dec 10, 2014 |
| "The Year of Hacking Dangerously" |
Bloomberg |
Dec 10, 2014 |
| "Blue Coat Exposes 'The Inception Framework'; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Business Execs" |
Blue Coat |
Dec 9, 2014 |
| "Cyber attack could cost Sony studio as much as $100 million" |
Reuters |
Dec 9, 2014 |
| "A huge intelligence screw-up turned the government and private companies into cyberwarfare partners" |
PRI |
Dec 8, 2014 |
| "Kaspersky: That 2 years we took to warn you about Regin? We had GOOD REASON" |
The Register |
Dec 5, 2014 |
| "Russia and China have the best hackers" |
BetaNews |
Dec 4, 2014 |
| "Sony Hack: 'Destover' Malware Identified" |
Data Breach Today |
Dec 4, 2014 |
| "Sony Hackers Knew Details Of Sony's Entire IT Infrastructure" |
Information Week |
Dec 4, 2014 |
| "Why 'Regin' Malware Changes Threatscape Economics" |
Information Week |
Dec 4, 2014 |
| "Did North Korea really hack Sony Pictures? Some experts aren't so sure" |
Mashable |
Dec 3, 2014 |
| "Inside the "wiper" malware that brought Sony Pictures to its knees [Update]" |
Ars Technica |
Dec 3, 2014 |
| "Sony Blames North Korea for Hacking, but Washington Left Them Completely Vulnerable" |
Daily Beast |
Dec 3, 2014 |
| "Sony Pictures denounces 'brazen' cyberattack but downplays North Korea role" |
The Guardian |
Dec 3, 2014 |
| "UPDATED: Top 18 Most Important Internet Security Events & Threats of 2014" |
Heimdal Security |
Dec 3, 2014 |
| "Cyber Ring Corporate Secrets Heist Uncovered: Cyber-Espionage Ring Threatens US Stock Market" |
Jobs & Hire |
Dec 2, 2014 |
| "Cyber Round Up: Hacking Wall Street; FBI Warning Post Sony Malware; Hacking E-Cigs, Parking Lots, and Issues with Cryptography" |
Cyber Security Law and Policy |
Dec 2, 2014 |
| "Exclusive: FBI warns of 'destructive' malware in wake of Sony attack" |
MSN |
Dec 2, 2014 |
| "FBI warns of major malware-based attacks following the Sony Pictures hack" |
Security Affairs |
Dec 2, 2014 |
| "400 Hackers Are Defending NATO in a Massive Cyberwar Game" |
Indian Defense |
Dec 1, 2014 |
| "Did Hackers Gain an Edge on Wall Street?" |
Wall Street Journal |
Dec 1, 2014 |
| "Hackers gave Sony Pictures Entertainment a major headache Thanksgiving week" |
Washington Post |
Dec 1, 2014 |
| "Hackers target biotech firms in bid to rig insider trades: FireEye" |
The Globe and Mail |
Dec 1, 2014 |
| "Law Firms Are a Weak Link For Hackers: Finch" |
Bloomberg |
Dec 1, 2014 |
| "Q&A: Shaun Rein, China expert, on why the nation has traded copying for innovation" |
EIN News |
Nov 28, 2014 |
| "The Five Ws of REGIN" |
Cyber Security Law and Policy |
Nov 27, 2014 |
| "Cyber Hackers Could Cause An Economic Collapse, President Obama Warns" |
Survival Based |
Nov 26, 2014 |
| "Government is the #1 Cyber-Criminal!" |
Venitism |
Nov 25, 2014 |
| "Obama Sends a C-17 to a Chinese Air Show Despite Concerns Inside the Pentagon" |
YourNewsWire |
Nov 25, 2014 |
| "'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described" |
The Register |
Nov 24, 2014 |
| "Cyber Round Up: REGIN Malware; Egyptian Cyber Army; Potential Iran Cyber Attacks; State-Sponsored Hackers VS Human Rights Groups" |
Cyber Security Law and Policy |
Nov 24, 2014 |
| "Cybersecurity was missing in action on Election Day" |
EIN News |
Nov 24, 2014 |
| "Regin: Top-tier espionage tool enables stealthy surveillance" |
Symantec |
Nov 24, 2014 |
| "Super Sophisticated Malware "Regin" has been Spying on Users for Years" |
LiquidThink |
Nov 24, 2014 |
| "World's most advanced hacking spyware uncovered" |
Mail Online (UK) |
Nov 24, 2014 |
| "Computer spying malware uncovered with 'stealth' features: Symantec" |
The Boston Journal |
Nov 23, 2014 |
| "Computer spying malware uncovered with 'stealth' features: Symantec" |
The Boston Journal |
Nov 23, 2014 |
| "Fury as China unveils £14,000 copy of Range Rover" |
Mail Online (UK) |
Nov 23, 2014 |
| "Here's What Chinese Hackers Can Actually Do To The US Power Grid" |
Business Insider |
Nov 23, 2014 |
| "Here's What Chinese Hackers Can Actually Do To The US Power Grid" |
Business Insider |
Nov 23, 2014 |
| "Intel boss' warning on cyber attacks no joke, say experts" |
Fox News |
Nov 23, 2014 |
| "JPMorgan Hacking Raises Alarm About Banks' Cyber Defences" |
Bloomberg |
Nov 23, 2014 |
| "JPMorgan Hacking Raises Alarm About Banks' Cyber Defences" |
Bloomberg |
Nov 23, 2014 |
| "Hacked: When Cyber Spies Attack" |
Top Documentary Films |
Nov 22, 2014 |
| "Extensive Network of Secret Chinese Military Units Attack US on Daily Basis" |
EIN News |
Nov 21, 2014 |
| "NATO Conducts Seventh Annual Cyber Coalition Exercise" |
Cyber Security Law and Policy |
Nov 21, 2014 |
| "NSA: China thefts could lead to attack" |
Trib Live |
Nov 21, 2014 |
| "Foreign Governments Have Hacked U.S. Grid, NSA Head Says" |
Bloomberg |
Nov 20, 2014 |
| "NSA Director Says Chinese Cyber Hackers Can Shut Down U.S. Power Grid" |
Inquisitor |
Nov 20, 2014 |
| "NSA Director: Yes, China Can Shut Down Our Power Grids" |
Business Insider |
Nov 20, 2014 |
| "NSA Worries Hackers May Shut Down American Utilities" |
ABC News |
Nov 20, 2014 |
| "U.S. Congress urged to consider sanctions on Chinese cyber-spies" |
Reuters |
Nov 20, 2014 |
| "U.S. Electrical, Financial Networks Mapped for Future Cyber Attacks" |
Washington Free Beacon |
Nov 20, 2014 |
| "US Control Systems Have Been Hacked By Nation States - NSA Director Warns 'This Is Not Theoretical'" |
Cyber Security Law and Policy |
Nov 20, 2014 |
| "10 top security threats of 2014 (so far)" |
ZD Net |
Nov 19, 2014 |
| "Cyber War - US State Department Hacked" |
Check & Secure |
Nov 19, 2014 |
| "Hewlett Foundation lays out MEELLIONS on security" |
The Register |
Nov 19, 2014 |
| "Stronger Locks and Taller Fences Won't Stop Cybercrime" |
1776 |
Nov 19, 2014 |
| "Three suspects arrested in china for spreading WireLurker malware" |
E Hacking News |
Nov 19, 2014 |
| "Chinese authorities arrest three over iOS malware" |
BBC |
Nov 18, 2014 |
| "Chinese Hackers? Russian Hackers? Hacktivists? Uncertainty Behind the Source of the Recent Breaches of Government Agencies" |
Cyber Security Law & Policy |
Nov 18, 2014 |
| "FBI Probes Agency Computer Breaches Said to Bear Signs of Spying" |
Bloomberg |
Nov 18, 2014 |
| "Hackers attacked the U.S. energy grid 79 times this year" |
CNN |
Nov 18, 2014 |
| "Half of U.K. Firms Would Hire Hackers, Ex-Convicts to Secure Their Networks" |
Wall Street Journal |
Nov 17, 2014 |
| "Intellectual Property: Making It Personal" |
CAGW |
Nov 17, 2014 |
| "Internet Hack Shutters Some State Department Computers" |
VOA News |
Nov 17, 2014 |
| "New CAGW Report on Intellectual Property" |
CAGW |
Nov 17, 2014 |
| "Spate of cyber attacks target U.S. government systems" |
CBS News |
Nov 17, 2014 |
| "Google's secret NSA alliance: The terrifying deals between Silicon Valley and the security state" |
Salon |
Nov 16, 2014 |
| "State Department email system hacked, shut down" |
CBS News |
Nov 16, 2014 |
| "State Department Targeted by Hackers in 4th Agency Computer Breach" |
New York Times |
Nov 16, 2014 |
| "Ex-NSA Chief Urges Congress to Step Up Fight Against Cyberattacks" |
GovTech |
Nov 12, 2014 |
| "Chinese hackers target human rights groups, Citizen Lab says" |
CBC News |
Nov 11, 2014 |
| "Darkhotel malware targets travelling executives: report" |
Syndey Morning Herald |
Nov 11, 2014 |
| "Can a cyber arms race with China be stopped?" |
CBS News |
Nov 10, 2014 |
| "Executive Cyber Intelligence Report: November 1" |
Tripwire |
Nov 10, 2014 |
| "Feds hacked: Is cybersecurity a bigger threat than terrorism?" |
Christian Science Monitor |
Nov 10, 2014 |
| "Half of US cybersecurity breaches caused by staffers' misconduct" |
Russian Times |
Nov 10, 2014 |
| "Information Warfare: Russia Strikes Back" |
Strategy Page |
Nov 10, 2014 |
| "Line dividing hacker cyber crime, state-sponsored terror attacks is murky" |
Stars and Stripes |
Nov 7, 2014 |
| "State-sponsored Hackers Gear Up for G20" |
Info Security Magazine |
Nov 7, 2014 |
| "The G20 and the New Reality of Cyber Espionage" |
FireEye |
Nov 4, 2014 |
| "US banks unite to identify hacking threats to global money pipelines" |
The Guardian |
Nov 4, 2014 |
| "16-31 October 2014 Cyber Attacks Timeline" |
Hackmageddon |
Nov 3, 2014 |
| "JPMorgan found breach through Corporate Challenge site" |
IT News (AUS) |
Nov 3, 2014 |
| "Justice Department seeks massive expansion of FBI hacking powers" |
WSWS |
Nov 3, 2014 |
| "Consensus sought with US on governance of Internet" |
TMC News |
Nov 2, 2014 |
| "How Did Russians Hack The White House?" |
KnowBe4 |
Nov 1, 2014 |
| "Trade Law As A Tool Against Chinese Hackers" |
Whitcomb Law |
Nov 1, 2014 |
| "Cybersecurity Not Just about Hackers" |
DFI News |
Oct 31, 2014 |
| "Hackers Infiltrate White House Network" |
security Week |
Oct 31, 2014 |
| "White House cyber breach - Is Anything Safe?" |
National Cybersecurity Institute |
Oct 31, 2014 |
| "GE and Siemens targeted by hackers" |
PEI |
Oct 30, 2014 |
| "Nato frontline in life-or-death war on cyber-terrorists" |
The Guardian |
Oct 30, 2014 |
| "White House hack just the beginning: experts say major cyberattack coming soon" |
Sydney Morning Herald |
Oct 30, 2014 |
| "Cyber Attacks Likely to Increase" |
Pew Research |
Oct 29, 2014 |
| "The link you just clicked may not be real" |
iPolitics |
Oct 29, 2014 |
| "Unwitting Workers Give Hackers Keys to Fortune 500 Firms' Networks: Study" |
NBC News |
Oct 29, 2014 |
| "These Are The Hacker Groups That Should Be Keeping You Up At Night" |
Business Insider |
Oct 28, 2014 |
| "US eyes cyber 'deterrence' to stop hackers" |
Phys.org |
Oct 28, 2014 |
| "Chinese-Russian Relations Enter Cyberspace" |
Indian Strategic Studies |
Oct 27, 2014 |
| "Continuing Federal Cyber Breaches Warn Against Cybersecurity Regulation" |
Heritage Foundation |
Oct 27, 2014 |
| "Researchers uncover sophisticated cyber espionage campaign" |
Computer Weekly |
Oct 27, 2014 |
| "Russia and China to sign cyber-security treaty in November" |
Computing (UK) |
Oct 26, 2014 |
| "The Sorry State of Cybersecurity" |
CIO Insight |
Oct 26, 2014 |
| "Micro-Targeting Malvertising Via Real-Time Ad Bidding" |
Invincea |
Oct 25, 2014 |
| "NIST finalizes cloud computing roadmap" |
SC Magazine |
Oct 23, 2014 |
| "Apple update on iCloud.com security" |
Apple |
Oct 22, 2014 |
| "Chinese NOAA employee caught stealing dam info" |
SurvivalMonkey |
Oct 22, 2014 |
| "The 'Cloud' is DEFINITELY a Huge and Tempting Target for Hackers" |
MPG |
Oct 22, 2014 |
| "US focus on naming foreign hackers gets criticized" |
The Hill |
Oct 22, 2014 |
| "US security prosecutors focus on cyber" |
IT Web |
Oct 22, 2014 |
| "Malvertising Campaigns Hit Us Military Industry to Steal Secrets and Intellectual Property" |
Cyber Defense Magazine |
Oct 20, 2014 |
| "UK companies at 'higher cyber risk' than rest of world" |
The Press & Journal |
Oct 20, 2014 |
| "There's a Silver Lining in the Fight Against Cyber Espionage" |
SoftPedia |
Oct 19, 2014 |
| "Hackers rip into heart of open-source software" |
Trib Live |
Oct 17, 2014 |
| "Sophisticated Malvertising Campaign Targets US Defense Industry" |
Information Week |
Oct 17, 2014 |
| "'Malvertising' targets U.S. military firms in new twist on old web threat" |
Yahoo News |
Oct 16, 2014 |
| "Cyber attacks an increasing threat for Mideast oil and gas" |
Gulf News |
Oct 16, 2014 |
| "Hacking Back and the Cyber Balance of Power" |
Huffington Post |
Oct 14, 2014 |
| "I Know It's A Shock, But Law Firms Are Jeopardizing Client Information" |
Above the Law |
Oct 14, 2014 |
| "Techno-nationalism in China's rise: the next gunpowder moment" |
The Strategist (AUS) |
Oct 14, 2014 |
| "Fighting in the cyber trenches" |
EIN News |
Oct 13, 2014 |
| "The Coming of Global Cyber War?" |
Intervid |
Oct 11, 2014 |
| "China Makes Efforts for Better Cyber Security" |
SoftPedia |
Oct 10, 2014 |
| "China angered after FBI head says Chinese hacking costs billions" |
Reuters |
Oct 9, 2014 |
| "SingTel and FireEye partner to launch first Managed Defense Solution Powered By FireEye in APAC to help enterprises contain rising cyber-attacks" |
InfoTech |
Oct 9, 2014 |
| "White House Cyber Chief: JP Morgan Underscores Critical Infrastructure Risk" |
Security Ledger |
Oct 9, 2014 |
| "White House Shifts Its Cyber Legislative Strategy" |
Gov Info Security |
Oct 9, 2014 |
| "Groups Named For First Federally Funded Cybersecurity Research Center" |
Defense News |
Oct 8, 2014 |
| "Obama Had Security Fears on JPMorgan Data Breach" |
New York Times |
Oct 8, 2014 |
| "Cyber attacks on critical infrastructure: Too much to C.H.E.W?" |
IT Pro Portal |
Oct 7, 2014 |
| "Hackers phishing for source code from Microsoft, Apple and Oracle" |
V3.co.uk |
Oct 7, 2014 |
| "Bored hackers flick Shellshock button to OFF as payloads shrink" |
The Register |
Oct 3, 2014 |
| "Hackers using Shellshock to sneak into NAS systems" |
V3.co.uk |
Oct 2, 2014 |
| "Shellshock: Attackers Laying Groundwork for "Massive Attacks"?" |
HackSurfer |
Oct 2, 2014 |
| "State-sponsored attacks expected to get worse" |
SC Magazine |
Oct 2, 2014 |
| "State-Sponsored Attacks Increasing" |
HackSurfer |
Oct 2, 2014 |
| "Hackers charged in software theft from US army, others" |
Yahoo News |
Oct 1, 2014 |
| "Insider incidents and high-profile crimes increasing" |
Help Net Security |
Oct 1, 2014 |
| "Four Members of International Computer Hacking Ring Indicted for Stealing Gaming Technology, Apache Helicopter Training Software" |
FBI |
Sep 30, 2014 |
| "Hackers charged with stealing military training software, data" |
New York Post` |
Sep 30, 2014 |
| "Hackers charged with stealing over $100m in US army and Xbox technology" |
The Guardian |
Sep 30, 2014 |
| "Three Steps to Protect US Intellectual Property" |
Forbes |
Sep 30, 2014 |
| "U.S. Charges 4 Hackers Over Theft Of Games From Microsoft, Army" |
NPR |
Sep 30, 2014 |
| "Fewer Cyber Pros, More Cyber Problems" |
NextGov |
Sep 29, 2014 |
| "General counsel need to be aware of risk from hackers involving even military-related computers" |
Inside Counsel |
Sep 29, 2014 |
| "UCSD fights cyber attacks targeting research" |
U-T San Diego |
Sep 28, 2014 |
| "Apple 'Bash bug' could cripple millions" |
Bangkok Post |
Sep 26, 2014 |
| "What We Know About Shellshock So Far, and Why the Bash Bug Matters" |
Security Week |
Sep 26, 2014 |
| "'Bash' may pose bigger threat than 'Heartbleed'" |
CNBC |
Sep 25, 2014 |
| "Google and Amazon Respond to Shellshock Security Flaw" |
Wall Street Journal |
Sep 25, 2014 |
| "Hackers exploit 'Shellshock' bug with worms in early attacks" |
CNBC |
Sep 25, 2014 |
| "Hackers exploit Shellshock bug as fixes prove ineffective" |
The Globe and Mail |
Sep 25, 2014 |
| "Hackers launch attacks exploiting 'Shellshock' bug in Bash software" |
Reuters |
Sep 25, 2014 |
| "Hackers steal crucial info from India’s biggest airport operator- AAI" |
Trans Asia News Srvice |
Sep 25, 2014 |
| "Security Experts Expect ‘Shellshock’ Software Bug in Bash to Be Significant" |
New York Times |
Sep 25, 2014 |
| "Airports Authority of India (AAI) hacked, critical data compromised" |
Tech Worm |
Sep 24, 2014 |
| "A Decoy Computer Was Set Up Online. See Which Countries Attacked It the Most" |
Bloomberg |
Sep 23, 2014 |
| "Unhappy Workers Hacking Employers on the Rise, FBI Says" |
Bloomberg |
Sep 23, 2014 |
| "Israel to Create Cyber Security Authority after Alleged Iranian Hacker Attack" |
National Cyber Security |
Sep 22, 2014 |
| "US House Approves New Law to Discourage Trade Secrets Theft" |
Info Security Magazine |
Sep 19, 2014 |
| "Here Are The Traits Of Americans That The CIA Feared Could Make The Country Vulnerable To Economic Espionage" |
Business Insider |
Sep 18, 2014 |
| "US Bolstering Cyber-Defence With New Corps: NSA Chief" |
NDTV |
Sep 16, 2014 |
| "Belden Research Reveals Dragonfly Malware Likely Targets Pharmaceutical Companies" |
Business Wire |
Sep 15, 2014 |
| "Defending Against the Dragonfly Cyber Security Attacks" |
Belden |
Sep 15, 2014 |
| "Dragonfly malware targeting pharmaceutical companies" |
Help Net Security |
Sep 15, 2014 |
| "Middle Eastern Petrochemical Plants Are Targets of Hackers" |
New York Times |
Sep 15, 2014 |
| "If Russian and Chinese hackers operate with impunity, why don't we cut these nations off from the internet?" |
Quora |
Sep 12, 2014 |
| "Civilian Casualties in a Cyber War?" |
ThreatGeek |
Sep 11, 2014 |
| "A New Threat Grows Amid Shades of 9/11" |
Wall Street Journal |
Sep 10, 2014 |
| "Every Part of the US Government Has Probably Already Been Hacked" |
Defense One |
Sep 10, 2014 |
| "Studies in Intelligence: Analyzing Economic Espionage" |
CIA |
Sep 10, 2014 |
| "AFP Letter to the House Republican Study Committee on Intellectual Property" |
Americans for Prosperity |
Sep 9, 2014 |
| "Let's pass cybersecurity legislation" |
The Hill |
Sep 9, 2014 |
| "'Undetectable' Peter Pan computer virus threatens UK businesses" |
The Telegraph |
Sep 8, 2014 |
| "McAfee and Symantec join Cyber Threat Alliance" |
Help Net Security |
Sep 8, 2014 |
| "The Enemy of My Enemy is My Cyber-Lessee" |
American Consumer Institute |
Sep 8, 2014 |
| "The Sad Truth About Breaches: We’re All Target" |
NoVa Infosec |
Sep 6, 2014 |
| "Cyber attacks: Perpetual state of siege for US companies" |
Canberra Times (AU) |
Sep 1, 2014 |
| "Nato set to clarify stance on cyber attack" |
Computer Weekly |
Sep 1, 2014 |
| "Reconnaissance code on industrial software site points to watering hole attack" |
PC Advisor (UK) |
Sep 1, 2014 |
| "Cyberwars: The Month of Cyberattacks" |
Stories by Williams |
Aug 30, 2014 |
| "Oil and energy industry in Norway is under attack" |
Security Affairs |
Aug 30, 2014 |
| "What Are Hackers Thinking?" |
PC Mag |
Aug 30, 2014 |
| "Banks lose $US23 million on average from cybercrime: survey" |
Canberra Times (AU) |
Aug 29, 2014 |
| "Caught in the crossfire of a cyber Cold War" |
EIN News |
Aug 29, 2014 |
| "JP Morgan’s security breach points to broader issues in cyber security" |
Venture Beat |
Aug 29, 2014 |
| "JPMorgan Hackers Came In the Front Door -- in June. Two Months of Mayhem" |
EIN News |
Aug 29, 2014 |
| "Defending Against Hackers of the Future" |
Bloomberg |
Aug 28, 2014 |
| "Hackers break into Huntington’s wellness program" |
Columbus Dispatch |
Aug 27, 2014 |
| "List of data breaches and cyber attacks in August" |
IT Governance |
Aug 27, 2014 |
| "Alabamians file lawsuit against hospital chain after cyber-attack by Chinese hackers" |
Alabama Today |
Aug 26, 2014 |
| "Cybersecurity Is A Severe And Growing Challenge For Government Contractors" |
Forbes |
Aug 26, 2014 |
| "Shipping and supply chain 'next playground for hackers'" |
Supply Management |
Aug 26, 2014 |
| "Software vulnerability patching is far too slow and leaves users at risk" |
BetaNews |
Aug 26, 2014 |
| "Top 5 Reasons Your Small Business Website is Under Attack" |
Dark Reading |
Aug 26, 2014 |
| "It Does Matter That The White House Cybersecurity Czar Lacks Technical Chops" |
Forbes |
Aug 25, 2014 |
| "Predicting the future' to stay one step ahead of hackers" |
The Telegraph |
Aug 25, 2014 |
| "Gov't Warns U.S. Retailers About Hacking Software" |
Epoch Times |
Aug 23, 2014 |
| "Hacking Gmail App with 92 Percent Success Rate" |
Hacker News |
Aug 23, 2014 |
| "Official says hackers hit up to 25,000 Homeland Security employees" |
Washington Post |
Aug 23, 2014 |
| "White House cybersecurity leader proudly claims he knows nothing about cybersecurity" |
TechTimes |
Aug 23, 2014 |
| "As security breach reports mount, experts fear alert fatigue" |
CNet |
Aug 22, 2014 |
| "Constant Hacking Leads to Making Fakes in China in Just One Day" |
Business Korea |
Aug 22, 2014 |
| "DHS Cybersecurity Program Finds Few Takers" |
GovTech |
Aug 22, 2014 |
| "Healthcare Industry, Feds Talk Information Sharing" |
Dark Reading |
Aug 22, 2014 |
| "U.S. undercover investigators among those exposed in data breach" |
Reuters |
Aug 22, 2014 |
| "UPS, Target, Supervalu and 1,000 American Businesses Affected By Cash Register Cyberattacks" |
International Business Times |
Aug 22, 2014 |
| "Worldwide Spending On Information Security To Surpass $70B By End Of 2014: Report" |
International Business Times |
Aug 22, 2014 |
| "China's Hack of 4.5 Million U.S. Medical Records? This Chart Will Make You Sick" |
Bloomberg |
Aug 21, 2014 |
| "Data Breaches in the U.S." |
Bloomberg |
Aug 21, 2014 |
| "Hacker Or Military? Best Of Both In Cyber Security" |
Dark Reading |
Aug 21, 2014 |
| "Hackers' Paradise: The rise of soft options and the demise of hard choices" |
The Register |
Aug 15, 2014 |
| "Brit infosec firm lets hackers think they've stolen something" |
The Register |
Aug 14, 2014 |
| "Majority of Hackers Do it for the Thrill, Believe They Won't Be Caught: Survey" |
SiteProNews |
Aug 14, 2014 |
| "Doomsday scenarios to keep you up at night: Mikko Hypponen talks cyberthreats" |
Venture Beat |
Aug 13, 2014 |
| "Survey: manufacturing businesses' intellectual property gets lost to security breaches" |
Kaspersky Lab |
Aug 13, 2014 |
| "Why the U.S. Can't Automatically Retaliate in Cyberspace, Yet" |
Wall Street Journal |
Aug 13, 2014 |
| "APAC seeing more APT attacks than other regions" |
ZDNet |
Aug 12, 2014 |
| "Fifteen countries KO'd in malware one-two punch" |
The Register |
Aug 12, 2014 |
| "House passes three bills to protect critical infrastructure from cyber attack" |
National Cyber Security |
Aug 12, 2014 |
| "State-Sponsored Hackers from the East Attack Former Soviet Countries" |
Info Security |
Aug 12, 2014 |
| "The Arms Industry Is Ripe Pickings for Hackers" |
Medium |
Aug 12, 2014 |
| "The network of USIS compromised by a cyber attack" |
Security Affairs |
Aug 12, 2014 |
| "The scary state of cybersecurity" |
C4ISR |
Aug 12, 2014 |
| "Battling Hackers" |
National Cyber Security |
Aug 11, 2014 |
| "The New Mafia: Battling Hackers Like Organized Crime" |
US News |
Aug 11, 2014 |
| "China: No government ban on Apple devices" |
Times of India |
Aug 9, 2014 |
| "Cyberspies Help Themselves to DHS Contractor's Data" |
Tech News World |
Aug 8, 2014 |
| "Spy Agencies Hit in Cyber Espionage Campaign: Kaspersky Lab" |
PicturesDotNews |
Aug 8, 2014 |
| "Ex-Citadel Worker Pleads Guilty to HFT Data Theft" |
Bloomberg |
Aug 7, 2014 |
| "Homeland Security Contractor Hit by Hackers" |
Tech Times |
Aug 7, 2014 |
| "Anonymous Says It Hacked the US Government Personnel Database Before China" |
Motherboard |
Aug 5, 2014 |
| "Hackers can exploit USB to steal data" |
Deutsche Welle |
Aug 3, 2014 |
| "Israeli Iron Dome Firms ‘Infiltrated by Chinese Hackers’" |
PicturesDotNews |
Aug 1, 2014 |
| "Wild Wild Web: For Now, Cybercrime Has the Upper Hand in Its Duel with the Law" |
RAND |
Aug 1, 2014 |
| "How do hackers breach institutions like Canada's NRC?" |
CTV News |
Jul 29, 2014 |
| "An IT emperor with no clothes, India lays bare to cyber attacks" |
Times of India |
Jul 27, 2014 |
| "NSA director: Cyber attacks need international norms" |
Aspen Daily News |
Jul 27, 2014 |
| "Internet Explorer the 'Most Vulnerable' Web Browser of 2014, States Study: Time to Switch to Chrome and Firefox?" |
IBT |
Jul 26, 2014 |
| "Security automation: Are humans still relevant?" |
GCN |
Jul 26, 2014 |
| "Why Do We Need to Share Cyber Threat Intelligence?" |
Medium.com |
Jul 26, 2014 |
| "Commentary: Congress must act now to address cybersecurity issues" |
Palm Beach Post |
Jul 25, 2014 |
| "Hackers exploiting Internet Explorer to expose security flaws on a huge scale" |
The Guardian |
Jul 25, 2014 |
| "Piracy Crumbling Businesses" |
Daily Guide Ghana |
Jul 25, 2014 |
| "Are Certain Countries a Threat to Web Security?" |
Web Hosting Geeks |
Jul 23, 2014 |
| "Businesses, Cyber Security Firms Are Coming Up With Creative Ways To Fight Hackers" |
Digital Trends |
Jul 23, 2014 |
| "International tensions heighten cyber security risks for business" |
City A.M. |
Jul 23, 2014 |
| "Apple "inadvertently admitted" to iOS backdoor: forensics expert" |
Network World |
Jul 22, 2014 |
| "Hackers Could Take Control of Your Car. This Device Can Stop Them" |
Wired |
Jul 22, 2014 |
| "It's Time to Get Ready for Cyberwar" |
Real Clear Defense |
Jul 22, 2014 |
| "Preparing for cyber warfare" |
Journal Sentinel |
Jul 22, 2014 |
| "The UK Cyber Security Strategy" |
U.K. Cabinet Office |
Jul 22, 2014 |
| "Chinese hackers take command of Tesla Model S" |
CNet |
Jul 17, 2014 |
| "Cybersecurity as Arms Control?" |
Weekly Standard |
Jul 17, 2014 |
| "Google recruit world's most notorious hacker" |
HITC Tech |
Jul 17, 2014 |
| "Here's How Easy It Could Be for Hackers to Control Your Hotel Room" |
Wired |
Jul 17, 2014 |
| "Tesla Model S Well and Truly Hacked By Chinese Security Experts" |
Transport Evolved |
Jul 17, 2014 |
| "Hack a Tesla Model S, win $10,000" |
Motoring |
Jul 16, 2014 |
| "Why Hackers May Be Impersonating Your Colleagues" |
CBR Online |
Jul 16, 2014 |
| "Automakers see growing threat from hackers" |
USA Today |
Jul 15, 2014 |
| "British Secret Agents No More Skilled Than An 'Average Hacker'" |
Forbes |
Jul 15, 2014 |
| "Google Creates Elite Team To Fight Hackers -- And Maybe The NSA" |
Huffington Post |
Jul 15, 2014 |
| "Google To Tackle Security Threats With New Project Zero Team" |
RedOrbit |
Jul 15, 2014 |
| "New York reports 900 data breaches in public, private institutions in 2013" |
Tech Times |
Jul 15, 2014 |
| "Phony messages highlight dangers of 'real' hackers" |
Times of Israel |
Jul 15, 2014 |
| "The Complex U.S. Electrical Grid Vulnerable to Cyberthreats and Physical Attack, Study Finds" |
Foreign Policy |
Jul 15, 2014 |
| "Congress is overdue in dealing with the cybersecurity threat" |
Washington Post |
Jul 13, 2014 |
| "Hackers Inc" |
The Economist |
Jul 12, 2014 |
| "Chinese Hackers Gain Access to Data of Thousands of US Federal Employees" |
RIA Novosti |
Jul 10, 2014 |
| "Report: Chinese hackers hit US personnel networks" |
Bloomberg |
Jul 10, 2014 |
| "Banks Dreading Computer Hacks Call for Cyber War Council" |
Bloomberg |
Jul 8, 2014 |
| "Meet Google's Security Princess" |
Elle |
Jul 8, 2014 |
| "Report on A Framework for International Cyber Stability" |
U.S. Dept. of State |
Jul 2, 2014 |
| "Check Point 2014 Security Report" |
Checkpoint |
Jun 30, 2014 |
| "Check Point Security Report 2014 - Malware in the enterprise" |
Bountolos |
Jun 30, 2014 |
| "Dragonfly: Western Energy Companies Under Sabotage Threat" |
Symantec |
Jun 30, 2014 |
| "Netflix Could Be Classified As a 'Cybersecurity Threat' Under New CISPA Rules" |
Motherboard |
Jun 28, 2014 |
| "Beware the Dangers of Congress' Latest Cybersecurity Bill" |
ACLU |
Jun 27, 2014 |
| "How Developers Battle Security Bugs" |
Forbes |
Jun 27, 2014 |
| "Strengthening Property Rights and the U.S. Economy Through Federal Trade Secret Protection" |
Heritage Foundation |
Jun 27, 2014 |
| "Surge in Cybersecurity Revs Up Startups" |
GCXMag |
Jun 27, 2014 |
| "As Stuxnet Anniversary Approaches, New SCADA Attack Is Discovered" |
Information Week |
Jun 26, 2014 |
| "Australians take title of 'best' internet pirates to new level" |
The World Today |
Jun 26, 2014 |
| "The Senate's New Cybersecurity Bill Threatens Net Neutrality" |
Motherboard |
Jun 26, 2014 |
| "House Judiciary Committee Looks to Strengthen Trade Secret Protection and Enforcement" |
ShopFloor |
Jun 25, 2014 |
| "IBM, Lenovo Tackle Security Worries on Server Deal" |
Wall Street Journal |
Jun 25, 2014 |
| "Researchers, brush up your Mandarin and get ready to spend time in China" |
The Guardian |
Jun 25, 2014 |
| "Strengthening Property Rights and the U.S. Economy Through Federal Trade Secret Protection" |
Heritage Foundation |
Jun 25, 2014 |
| "Theft By Led Zeppelin And Apple? No, Just Innovation" |
Forbes |
Jun 25, 2014 |
| "Trade Secret Theft: The Need for a Federal Civil Remedy" |
Global Policy Watch |
Jun 25, 2014 |
| "Trade Secret Theft: The Need for a Federal Civil Remedy" |
National Law Review |
Jun 25, 2014 |
| "Canadian law trumps the power of Google - and that's a good thing" |
National Post (Canada) |
Jun 24, 2014 |
| "Congressional Caucus: Protecting IP Boosts Creativity and Innovation" |
MPAA |
Jun 24, 2014 |
| "International Creativity and Theft-prevention Caucus 2014 Watch List" |
Sribd |
Jun 24, 2014 |
| "International Creativity and Theft-prevention Caucus Unveils '2014 International Piracy Watch List'" |
U.S. House Judicia Committee |
Jun 24, 2014 |
| "Watering Hole Hackers Sniff Out Industrial Control Systems for Future Attack" |
Info Security Magazine |
Jun 24, 2014 |
| "Court Hands Google a Worldwide Site Blocking Injunction" |
Copyright Enforcement Canada |
Jun 23, 2014 |
| "Hacker Tactic: Holding Data Hostage" |
New York Times |
Jun 22, 2014 |
| "DHS warns on threat of cyber attacks" |
Flash Critic: Cyber Threat News |
Jun 21, 2014 |
| "Espionage in the EU Capital: An Interview with Kristof Clerix" |
Ruth Jacobs |
Jun 21, 2014 |
| "GCHQ's favourite firms to get secret hacking alerts: National security fears raised over BT's links with Chinese company" |
Mail Online (UK) |
Jun 21, 2014 |
| "Roundup: London Tech Week" |
IDG Connect |
Jun 20, 2014 |
| "The Admiral Sets a Good Course" |
Huffington Post |
Jun 20, 2014 |
| "The Rise of Cyber-Security Blackwaters" |
EconoMonitor |
Jun 18, 2014 |
| "London Tech Week: Doing Business in China" |
IDG Connect |
Jun 17, 2014 |
| "Chinese Cyber Espionage: We Know Everything Except What to Do About it" |
EconoMonitor |
Jun 13, 2014 |
| "Inside Shenzhen: China's Silicon Valley" |
The Guardian |
Jun 13, 2014 |
| "Kevin Mandia '92 Leads Global Effort to Solve Cyber Crime" |
LaFayette |
Jun 13, 2014 |
| "FCC Urges Industry-Led Approach on Cybersecurity" |
Wall Street Journal |
Jun 12, 2014 |
| "Mergers and Acquisitions: When Two Companies and APT Groups Come Together" |
FireEye |
Jun 12, 2014 |
| "U.S. telecom chief tells industry to lead on cybersecurity" |
Reuters |
Jun 12, 2014 |
| "UK calls for global effort to tackle IP theft" |
Computer Weekly |
Jun 12, 2014 |
| "Vince Cable calls for global approach to tackling IP crime" |
The Telegraph |
Jun 12, 2014 |
| "The Internet: A Lawless Wild West?" |
The National Interest |
Jun 11, 2014 |
| "Hackers Steal Up To 20% Of Money Generated By The Internet" |
Business Insider |
Jun 10, 2014 |
| "Cybercrime costs $445B US a year to global economy, report finds" |
CBC News |
Jun 9, 2014 |
| "Is the global cost of cybercrime really £266bn a year? No, it isn't" |
The Guardian |
Jun 9, 2014 |
| "Net Losses: Estimating the Global Cost of Cybercrime" |
Mcafee |
Jun 9, 2014 |
| "Report: Cybercrime and espionage costs $445 billion annually" |
Washington Post |
Jun 9, 2014 |
| "Guilt or competition? Winning the Cyber Espionage War" |
Daily News Egypt |
Jun 7, 2014 |
| "Internet Giants Erect Barriers to Spy Agencies" |
New York Times |
Jun 6, 2014 |
| "The flawed US indictment of Chinese hackers" |
Tech Policy Daily |
Jun 6, 2014 |
| "Automating Cybersecurity" |
New York Times |
Jun 2, 2014 |
| "Indicting Chinese Military Officers for Cyber Theft: Huge Mistake" |
Fortuna's Corner |
Jun 1, 2014 |
| "CHINA: Inside the FBI's Fight Against Chinese Cyber-Espionage" |
Newsvine |
May 29, 2014 |
| "Chinese Cyber Hacking: Australia-China FTA talks under threat" |
Storify |
May 29, 2014 |
| "Pell Center Cybersecurity Conference Discusses Industrial Espionage and Cyber Counter Strikes" |
Pell Center |
May 28, 2014 |
| "The Chinese hacking indictments: Where's the strategy?" |
Tech Policy Daily |
May 28, 2014 |
| "A China-US tech war will cost the world dearly" |
EIN Newsdesk |
May 27, 2014 |
| "China Pulls Cisco Into Dispute on Cyberspying" |
New York Times |
May 27, 2014 |
| "Estonia exercise shows NATO's growing worry about cyber attacks" |
Reuters |
May 27, 2014 |
| "Security Insiders: Cyberspying Indictments Will Not Stop China From Hacking U.S. Businesses" |
EIN Newsdesk |
May 27, 2014 |
| "America, China and the Hacking Threat" |
New York Times |
May 25, 2014 |
| "China Cyber Threat: Case against 5 PLA hackers reveals U.S. counter cyberspying capabilities" |
FlashCritic |
May 25, 2014 |
| "China's Cyber Espionage Case a Guide to Hacking" |
VOice of America |
May 24, 2014 |
| "Organisms stop infections spreading by being diverse. So can computer apps" |
The Economist |
May 24, 2014 |
| "KGB General: Of Course Snowden is Working for Russian Intelligence" |
The XX Committee |
May 23, 2014 |
| "Editorial | China's hackers may finally face justice for theft" |
Myrtle Beach Online |
May 22, 2014 |
| "Former KGB general: Snowden is cooperating with Russian intelligence" |
Venture Beat |
May 22, 2014 |
| "Is Snowden working for the Russians?" |
Washington Post |
May 22, 2014 |
| "John Carlin's Speech at Brookings on 'Defending Our Nation by Prosecuting State-Sponsored Cyber Theft'" |
Brookings Institute |
May 22, 2014 |
| "Mysterious Hacker The real reason the U.S. is indicting Chinese hackers" |
Daily Dot |
May 22, 2014 |
| "Why the United States should go after the Chinese hackers" |
Miami Herald |
May 22, 2014 |
| "Chinese hackers" |
News-Gazette |
May 21, 2014 |
| "Chinese Hacking Raises Cyber Attack Disclosure Issue for Companies" |
Insurance Journal |
May 21, 2014 |
| "Espionage indictments against China deliver a useful message" |
Washington Post |
May 21, 2014 |
| "Moving Past Snowden" |
Brookings Institute |
May 21, 2014 |
| "US lawmakers praise hacking charges against Chinese military" |
PC World |
May 21, 2014 |
| "China Cyber Charges: Take Beijing to the WTO Instead" |
National Interest |
May 20, 2014 |
| "Chinese Hacker Indictments a Wakeup Call for Enterprises" |
NewsFactor |
May 20, 2014 |
| "Companies Bet Exposing Hacks Will Help" |
Wall Street Journal |
May 20, 2014 |
| "Global raids on 'BlackShades' hackers" |
IoL SciTech |
May 20, 2014 |
| "UK's Private Concerns About Chinese Cyber Spies" |
Sky News |
May 20, 2014 |
| "Canada joins global crackdown on BlackShades malware" |
CTV News |
May 19, 2014 |
| "FBI's Huge Hacker Bust Could Be Bogus" |
Daily Beast |
May 19, 2014 |
| "FBI raids BlackShades RAT Malware Customers in Europe and Australia" |
Hackernews |
May 16, 2014 |
| "Cyber attacks on Lockheed Martin quadruple" |
SC Magazine |
May 15, 2014 |
| "Is Elderwood the digital arms dealer that fuelled attacks on Google?" |
The Guardian |
May 15, 2014 |
| "New Strategies to Combat Counterfeit Parts" |
National Defense Magazine |
May 15, 2014 |
| "Technology Confounds the Courts" |
ACM |
May 14, 2014 |
| "Combating Economic Espionage and Trade-secret Theft" |
U.S. FBI |
May 13, 2014 |
| "Critical Data Discovery: Embarking on a Digital Treasure Hunt" |
Security Intelligence |
May 13, 2014 |
| "Cybersecurity in the private sector - playing catch-up" |
The Hill |
May 13, 2014 |
| "Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats? - Pamela Passman Testimony" |
U.S. Senate Judiciary |
May 13, 2014 |
| "Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats? - Peter Hoffman Testimony" |
U.S. Senate Judiciary |
May 13, 2014 |
| "Hackers steal Ukraine crisis data from Belgian foreign ministry" |
The Star Online |
May 12, 2014 |
| "Rogue Employees: The Biggest Threat to Information Security" |
International Business Times |
May 12, 2014 |
| "Trade Secrets Lessons From HBO's Silicon Valley" |
Orrick |
May 12, 2014 |
| "IBM launches new cybersecurity services" |
USA Today |
May 10, 2014 |
| "Former NSA Chief Keith Alexander to Launch Private Cybersecurity Firm" |
Mashable |
May 9, 2014 |
| "How to thwart hackers with a cyber playbook" |
Information Age |
May 9, 2014 |
| "Interview transcript: former head of the NSA and commander of the US cyber command, General Keith Alexander" |
Australian Financial Review |
May 9, 2014 |
| "KC software company sues JE Dunn for IP theft" |
KC Business Journal |
May 9, 2014 |
| "The Pentagon's New Army Is a Convention of Hackers" |
Fiscal Times |
May 9, 2014 |
| "Quincy software developer accused of stealing employer's intellectual property" |
Patriot Ledger |
May 8, 2014 |
| "International Counterfeiting Hits Small Businesses Hard" |
SBE Council |
May 7, 2014 |
| "Don't let hackers know Mandiant founder checks his email on an iPad. Oh." |
The Register |
May 6, 2014 |
| "Journalists, Media Under Attack From Hackers: Google Researchers" |
Shiloh International Missions |
May 6, 2014 |
| "Onshoring Because IP Matters" |
EBN |
May 6, 2014 |
| "Symantec: Antivirus is 'DEAD' - no longer 'a moneymaker'" |
The Register |
May 6, 2014 |
| "IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal" |
Wall Street Journal |
May 5, 2014 |
| "Symantec Says 'Antivirus Software Is Dead'" |
Mish's |
May 5, 2014 |
| "Virtual Legality 2: Oculus VR Responds Comprehensively To Zenimax Legal Letters" |
Forbes |
May 5, 2014 |
| "Europe's cybersecurity policy settings under attack" |
Phys.org |
May 4, 2014 |
| "Defense, energy, banks hit by Internet Explorer bug" |
FijiOne |
May 2, 2014 |
| "Innovative U.S. cybersecurity initiative to address cyberthreats" |
Homeland Security News Wire |
May 2, 2014 |
| "Missing In Asia: The Pivotal Person In Obama's Pivot" |
Forbes |
May 1, 2014 |
| "That was quick! Microsoft patches the "1776" hole in Internet Explorer" |
NakedSecurity |
May 1, 2014 |
| "The Wild Cyber West" |
TownHall.com |
May 1, 2014 |
| "Zimbabwe missing from the knowledge economy" |
zimpolitic |
May 1, 2014 |
| "Lots of Americans Heard About Heartbleed, but Not Many Were Worried" |
Slate |
Apr 30, 2014 |
| "The Danger Deepens: Neustar's Annual DDoS Attack Report" |
Neustar |
Apr 30, 2014 |
| "PDF"]
"Verizon annual cybersecurity report: 'The bad guys are winning'" target="_blank">USTR Releases Annual Special 301 Report on Intellectual Property Rights" |
USTR |
Apr 30, 2014 |
| "Cyber security: business is in the front line" |
Financial Times |
Apr 29, 2014 |
| "Cybersecurity skills crisis contributes to security breaches" |
BetaNews |
Apr 29, 2014 |
| "FBI Keeps Internet Flaws Secret to Defend Against Hackers" |
Bloomberg |
Apr 29, 2014 |
| "NSA reveals some cyber security flaws are left secret" |
Global News Canada |
Apr 29, 2014 |
| "Pirates beware as China opens first intellectual property centre" |
Irish Times |
Apr 29, 2014 |
| "Smokescreening: Data Theft Makes DDoS More Dangerous" |
CircleID |
Apr 28, 2014 |
| "The Road to Resilience: How Cybersecurity is Moving from the Back Office to the Boardroom" |
FireEye |
Apr 28, 2014 |
| "White House Details Thinking on Cybersecurity Flaws" |
New York Times |
Apr 28, 2014 |
| "Dept. of Homeland Security struggles to recruit, retain cybersecurity tech workers" |
The Raw Story |
Apr 26, 2014 |
| "Protecting African creatives: The importance of intellectual property law for SMEs" |
Biztech Africa |
Apr 26, 2014 |
| "DDOS Attacks an Increasing Cover for Theft, Fraud" |
Threat Post |
Apr 24, 2014 |
| "Ethical hackers say government regulations put information at risk" |
Global News Canada |
Apr 24, 2014 |
| "Tech Giants Pledge $3.6M to Help Fund OpenSSL Following Heartbleed Bug" |
International Business Times |
Apr 24, 2014 |
| "Life after Heartbleed: 'The Internet will never be 100% safe'" |
BGR |
Apr 23, 2014 |
| "2014 Data Breach Investigations Report" |
Verizon |
Apr 22, 2014 |
| "5 Tips to Cybersecure the Power Grid" |
GreenTechGrid |
Apr 22, 2014 |
| "Attacker Grabs Heartbleed VPN Sessions" |
ISS Source |
Apr 22, 2014 |
| "Hackers going after intelligence data, but most will also take your money" |
TechTimes |
Apr 22, 2014 |
| "New cyber-threats that go bump in the night" |
CNN Money |
Apr 22, 2014 |
| "Are inventions at risk to cyber attacks?" |
PhilMcKinney |
Apr 21, 2014 |
| "Heartbleed's Never-Ending Drip, Drip, Drip" |
Ecommerce Times |
Apr 21, 2014 |
| "China on frontlines of cyber security threat" |
Want China Times |
Apr 20, 2014 |
| "The Interview: 'MafiaBoy' speaks up" |
Yahoo News |
Apr 20, 2014 |
| "U.S. Promotes Network to Foil Digital Spying" |
New York Times |
Apr 20, 2014 |
| "Hackers Use Heartbleed Bug to Attack 'Major Corporation'" |
NBC News |
Apr 18, 2014 |
| "Heartbleed attack used to skip past multifactor authentication" |
CNet |
Apr 18, 2014 |
| "Heartbleed bug 'will cost millions'" |
The Guardian |
Apr 18, 2014 |
| "Insider Threat: Firms Aware, but Take No Action" |
ISS Source |
Apr 18, 2014 |
| "Mandiant: Hackers Broke In Using Heartbleed" |
Wall Street Journal |
Apr 18, 2014 |
| "The Lies Edward Snowden Tells" |
The Atlantic |
Apr 18, 2014 |
| "Crucial military satellite systems are vulnerable to hacking, experts say" |
The Guardian |
Apr 17, 2014 |
| "United States: Implications Of U.S. Sanctions Program On Intellectual Property Owners" |
Mondaq |
Apr 17, 2014 |
| "Hackers Are Scanning the Web for Websites Vulnerable to Heartbleed Attacks" |
SoftPedia |
Apr 16, 2014 |
| "Man who made light of 'Heartbleed thingamajig' hacked within minutes" |
The Telegraph |
Apr 16, 2014 |
| "Mounties always get their man: Heartbleed 'hacker', 19, CUFFED" |
The Register |
Apr 16, 2014 |
| "The first suspected Heartbleed hacker has been arrested" |
Washington Post |
Apr 16, 2014 |
| "After Heartbleed, can Britain's new Cyber Emergency Response Team beat the hackers?" |
Metro UK |
Apr 15, 2014 |
| "Between Heartbleed And Homeland, NSA Treads Cybersecurity Gray Area" |
NPR |
Apr 15, 2014 |
| "Hackers Test Water Treatment Plant Vulnerabilities" |
WSO |
Apr 15, 2014 |
| "Heartbleed: Cybersecurity as Melodrama" |
CSIS |
Apr 15, 2014 |
| "New technique to fight 'Heartbleed' virus" |
The Hindu |
Apr 15, 2014 |
| "On privacy, tech firms needs to step up: Editorial" |
LA Daily News |
Apr 15, 2014 |
| "TONKIN: Though needed in democracy, whistleblowing shouldn't threaten Constitution" |
Daily Nebraska |
Apr 15, 2014 |
| "Smarter military spending needed, not more" |
Post-Crescent |
Apr 14, 2014 |
| "Cybersecurity As A War Against Haunted Objects" |
Gizmodo |
Apr 13, 2014 |
| "Dark Reading: Heartbleed Will Go On Even After The Updates" |
ThreatConnect |
Apr 11, 2014 |
| "Heartbleed vuln under ACTIVE ATTACK as hackers map soft spots" |
The Register |
Apr 11, 2014 |
| "NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS" |
The Register |
Apr 11, 2014 |
| "NSA Said to Exploit Heartbleed Bug for Intelligence for Years" |
Bloomberg |
Apr 11, 2014 |
| "U.S. rallied 120 nations in response to 2012 cyberattack on American banks" |
Washington Post |
Apr 11, 2014 |
| "Why a hacker got paid for finding the Heartbleed bug" |
New Scientist |
Apr 11, 2014 |
| "From the Origins of Hacking to the recent Heartbleed" |
Docsity |
Apr 10, 2014 |
| "Mandiant 2014 Threat Report: Beyond the Breach" |
FireEye |
Apr 10, 2014 |
| "Anatomy of OpenSSL's Heartbleed: Just four bytes trigger horror bug" |
The Register |
Apr 9, 2014 |
| "Canada shuts access to tax website over 'Heartbleed bug' fears" |
Financial Times |
Apr 9, 2014 |
| "Insider Spies Are the New Cyberthreat" |
Epoch Times |
Apr 9, 2014 |
| "The Unfortunate Cookie - A Chinese Restaurant Cyber-Security Caper" |
OCEG |
Apr 8, 2014 |
| "Local firms to continue XP support" |
Global Times (China) |
Apr 7, 2014 |
| "Cyber Emergency Response Team launched by UK" |
BBC |
Apr 5, 2014 |
| "Be'er Sheva wooing cybersecurity firms" |
Haaretz |
Apr 2, 2014 |
| "Ex-Microsoft employee pleads guilty to trade secret theft" |
Computerworld |
Apr 1, 2014 |
| "Free tool calculates the damage of a cyber attack" |
Net Security |
Apr 1, 2014 |
| "UK reaches key milestone in cyber security" |
Computer Weekly |
Apr 1, 2014 |
| "Crack CERT warriors arrive to save UK from grid-crippling hack attacks" |
The Register |
Mar 31, 2014 |
| "Cyber security is economic opportunity for the UK, says government" |
Computer Weekly |
Mar 31, 2014 |
| "NOT JUST ONE! RSA adopted Two NSA Backdoored Encryption Tools" |
The Hacker News |
Mar 31, 2014 |
| "Popular Remote access Trojan njRAT fuels Middle East Cyber Crime" |
The Hacker News |
Mar 31, 2014 |
| "What's Wrong with America's Cyber Security Policy?" |
Huffington Post |
Mar 31, 2014 |
| "Pentagon to Triple Cyber Security Staff" |
Techno Buffalo |
Mar 29, 2014 |
| "White House cyber chief: future cyber attack to wipe out critical infrastructure" |
Flash Critic |
Mar 29, 2014 |
| "A digital fortress?" |
Economist |
Mar 28, 2014 |
| "Hacker black market more lucrative than drug trade" |
Merlin Intl. |
Mar 28, 2014 |
| "Hagel Seeks Peace Pact for Digital Realm" |
New York Times |
Mar 28, 2014 |
| "Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar" |
RAND Corp. |
Mar 28, 2014 |
| "Report: Hackers Would Rather Steal Your Twitter Account Than Your Credit Card" |
Consumerist |
Mar 27, 2014 |
| "Law Firms Are Pressed on Security for Data" |
New York Times |
Mar 26, 2014 |
| "Malaysian flight MH370 tragedy abused by Chinese hackers for Espionage attacks" |
The Hacker News |
Mar 26, 2014 |
| "The U.S. notified 3,000 companies that their computer systems had been hacked in 2013" |
Daily News |
Mar 25, 2014 |
| "Hackonomics: A First-of-Its-Kind Economic Analysis of the Cyber Black Markets" |
Juniper Networks |
Mar 24, 2014 |
| "Microsoft Word Zero-Day Vulnerability is being exploited in the Wild" |
The Hacker News |
Mar 24, 2014 |
| "Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370" |
FireEye |
Mar 24, 2014 |
| "'Most Wanted' Hacker Speaks Out" |
Raconteur |
Mar 21, 2014 |
| "Industry voice: Windows XP: The perils for businesses that fail to upgrade" |
Vaxxe |
Mar 21, 2014 |
| "United Front Can Foil the Hackers" |
Raconteur |
Mar 21, 2014 |
| "Hackers turning to Tor network to hide evolved malware, warns Kaspersky Lab" |
V3 |
Mar 20, 2014 |
| "Commercial RAT Used by Malicious Hackers" |
InfoSec Magazine |
Mar 18, 2014 |
| "From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms in RATs" |
FireEye |
Mar 18, 2014 |
| "Japan holds first broad cybersecurity drill, frets over Olympics risks" |
Reuters |
Mar 17, 2014 |
| "Windows XP deadline to leave 10 per cent of government PCs vulnerable" |
TechRadar |
Mar 17, 2014 |
| "LightOut is Latest Cyber Threat to Target Energy Sector" |
InfoSec Magazine |
Mar 15, 2014 |
| "Apple Inc.’s (AAPL) Safari browser tough but not invulnerable, according to PWN2OWN hackers" |
PF Hub |
Mar 14, 2014 |
| "Chinese hacker cracks Safari, wins $62.5K, praises Apple's security" |
CNN Money |
Mar 14, 2014 |
| "Gone phishing: Army uses Thrift Savings Plan in fake e-mail to test cybersecurity awareness" |
Washington Post |
Mar 14, 2014 |
| "The Next Move for Cyberwarfare Armies" |
ADI News |
Mar 14, 2014 |
| "All hacking eyes on the prize money at CanSecWest" |
CNet |
Mar 13, 2014 |
| "McAfee President Pulls Back Curtain on Cyber Security" |
St Mary's College |
Mar 13, 2014 |
| "New EU cybersecurity law avoids making big Internet companies report breaches" |
Network World |
Mar 13, 2014 |
| "State-Sponsored Cybercrime: From Exploitation to Disruption to Destruction" |
Alston & Bird |
Mar 13, 2014 |
| "The Cyberspies Who Don't Love Us" |
The Cutting Edge |
Mar 12, 2014 |
| "Web founder Berners-Lee calls for online 'Magna Carta' to protect users" |
Reuters |
Mar 12, 2014 |
| "Amid Cyber-Theft Onslaught, Calit2 Workshop Kicks Off New IP-Focused Program" |
Xconomy |
Mar 11, 2014 |
| "Cybersecurity: The Must-Read Books" |
Bank Info Security |
Mar 11, 2014 |
| "Protecting trade secrets is a challenge in a global economy" |
Global Post |
Mar 11, 2014 |
| "Cybersecurity" |
Hawaii Reporter |
Mar 10, 2014 |
| "Workshop to Highlight Growing Role of Innovation and IP as Drivers of the Global Economy" |
UCSD News |
Mar 10, 2014 |
| "How Many Cyberattacks Hit the United States Last Year?" |
NextGov |
Mar 8, 2014 |
| "Analysis: There's No Real Difference Between Online Espionage and Online Attack" |
Nextgov |
Mar 7, 2014 |
| "Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace" |
Heritage Foundation |
Mar 6, 2014 |
| "Four Federal Cyber Escapades to Watch for This Spring" |
Nextgov |
Mar 5, 2014 |
| "Avoiding data breaches is almost impossible - so now what?" |
IT Business (Canada) |
Mar 3, 2014 |
| "United States: If You Have A Trade Secret, You Better Protect It" |
Mondaq |
Mar 3, 2014 |
| "U.S. military not prepared for cyber warfare, commander warns" |
Washington Times |
Feb 28, 2014 |
| "Here's what $100,000 buys you at the cybersecurity industry's biggest conference" |
Washington Post |
Feb 27, 2014 |
| "How the cloud can improve security: Courtot" |
IT Business (Canada) |
Feb 27, 2014 |
| "Israeli venture capital fund is hooked on cyber security" |
Haaretz |
Feb 27, 2014 |
| "U.S. Supreme Court sets record for IP cases in coming year" |
Innovation Asset Group |
Feb 27, 2014 |
| "Cybersecurity industry at war with itself" |
CNBC |
Feb 26, 2014 |
| "H-P Lands $32M Cyber Security Contract From Dept. of Homeland Security" |
Fox Business |
Feb 26, 2014 |
| "Latest cybersecurity threat: WiFi virus" |
Homeland Security News Wire |
Feb 26, 2014 |
| "The Crisis of the Internet" |
Christie Boyden |
Feb 26, 2014 |
| "US Intelligence Warns On Counterintelligence and Cyber Espionage" |
Chainsoff's Blog |
Feb 26, 2014 |
| "U.S. military is playing catch-up in digital media war" |
Heritage Foundation |
Feb 24, 2014 |
| "Apple Admits Products Are Vulnerable to Hackers" |
ABC News |
Feb 22, 2014 |
| "White hats to the rescue" |
The Economist |
Feb 22, 2014 |
| "Top 10 worst state-sponsored hack campaigns: From PRISM to Stuxnet and Mask" |
V3.CO.UK |
Feb 21, 2014 |
| "Watch Out, Hackers: This VC-Backed, Israeli Special Ops Cybersecurity Company Will Hunt You Down" |
Forbes |
Feb 21, 2014 |
| "Former McAfee CTO's Cyber Security Data Company Cylance Raises $20M From Khosla, Blackstone" |
TechCrunch |
Feb 20, 2014 |
| "Google backs two more cyber security start-ups" |
Financial Times |
Feb 20, 2014 |
| "How international relations theory shapes U.S. cybersecurity doctrine" |
Washington Post |
Feb 20, 2014 |
| "Microsoft combats SnowMan hackers with rush fix for Internet Explorer" |
V3.CO.UK |
Feb 20, 2014 |
| "NSA, universities push to establish cybersecurity as a science" |
GCN |
Feb 20, 2014 |
| "ThreatStream Raises $4M From Google Ventures To Add Realtime Cybersecurity Intelligence" |
TechCrunch |
Feb 20, 2014 |
| "What cyberthreats are costing US companies" |
CNBC |
Feb 20, 2014 |
| "Hackers dropping Zeus in favour of Xtreme RAT Trojan, reports FireEye" |
V3.CO.UK |
Feb 19, 2014 |
| "Magal Chief Executive Seeks Cyber Security Acquisitions" |
Bloomberg |
Feb 19, 2014 |
| "Microsoft crash reports reveal Houdini hack campaign hitting firms" |
V3.CO.UK |
Feb 19, 2014 |
| "Exclusive: France's Snecma targeted by hackers - researcher" |
Reuters |
Feb 18, 2014 |
| "Navy Describes Iran Hack Attack As Obama Prepares 'Cybersecurity Framework'" |
InfoWars |
Feb 18, 2014 |
| "Tech Industry Praises Cybersecurity Framework From White House" |
CIO |
Feb 18, 2014 |
| "Cyber Security Canon" |
Terebrate |
Feb 16, 2014 |
| "2013 Out-of-Cycle Review of Notorious Markets" |
U.S. Trade Representative |
Feb 12, 2014 |
| "Government Passwords Are Incredibly Easy to Hack" |
Defense One |
Feb 12, 2014 |
| "Intellectual Property Theft: A Threat to U.S. Workers, Industries, and Our Economy" |
AFL-CIO |
Feb 12, 2014 |
| "New US cybersecurity standards: Will they do enough?" |
Yahoo News |
Feb 12, 2014 |
| "The U.S. Tells You Where to Buy the Best Fake Designer Handbags, Pirated Movies, and More" |
U.S. News |
Feb 12, 2014 |
| "Cybersecurity expert explains importance of NCCIP Act" |
Government Security News |
Feb 11, 2014 |
| "Target Corp. Breached at Weakest Link" |
Epoch Times |
Feb 11, 2014 |
| "Cyber criminals target smaller companies" |
Financial Times |
Feb 10, 2014 |
| "What was lost in the rush to the Internet of Things" |
Symantec |
Feb 5, 2014 |
| "DHS Agents Seized More Than $21.6 Million In Fake NFL Merchandise" |
HS Today |
Feb 3, 2014 |
| "Several cyber security initiatives lost after Snowden leaks" |
Stars and Stripes |
Feb 2, 2014 |
| "National cyber complex to open next to Ben-Gurion University of the Negev campus" |
Homeland Security News Wire |
Jan 31, 2014 |
| "Software piracy hitting pharmaceutical bottom lines" |
BioPrepWatch |
Jan 31, 2014 |
| "Two Israeli startups with innovative cybersecurity solutions raise combined $25 million" |
Homeland Security News Wire |
Jan 31, 2014 |
| "DNI: China, Russia grow as cyber, space threats to U.S. security" |
Washington Free Beacon |
Jan 30, 2014 |
| "International Index Charts Course to Stronger IP Protection" |
U.S. Chamber of Commerce |
Jan 30, 2014 |
| "New Study by Harvard Business School Professor and Nam Chief Economist Shows International Software Piracy Hampering Manufacturers in the U.S." |
NAM |
Jan 30, 2014 |
| "New Study by Harvard Business School Professor and NAM Chief Economist Shows International Software Piracy Hampering Manufacturers in the U.S." |
PR Newswire |
Jan 30, 2014 |
| "New study demonstrates that global software piracy costs U.S. manufacturers jobs, revenue and innovation" |
NAM |
Jan 30, 2014 |
| "New Worldwide Index Reveals Value of Intellectual Property to U.S. Prosperity" |
CFIF |
Jan 30, 2014 |
| "3D printing to cost $100bn a year in IP theft" |
CRN |
Jan 29, 2014 |
| "Charting the Course: Ranking the Players of Global Intellectual Property Rights" |
TAPP |
Jan 29, 2014 |
| "GIPC International IP Index" |
GIPC |
Jan 29, 2014 |
| "Help the Economy: Protect the Intellecutal Property in Your Business" |
Traklight |
Jan 29, 2014 |
| "Law enforcement in US, China, India, Romania collaborate to arrest hackers-for-hire" |
Naked Security |
Jan 29, 2014 |
| "Time for a Cybersecurity Overhaul" |
Security Affairs |
Jan 29, 2014 |
| "Worldwide Threat Assessment of the US Intelligence Community" |
U.S. DNI |
Jan 29, 2014 |
| "Care Enough to Protect Your Intellectual Property" |
HoGo |
Jan 23, 2014 |
| "Hacker Groups Embracing More Effective Tactics in Targeted Attacks" |
CIO |
Jan 23, 2014 |
| "Spies spy: CrowdStrike report says cyberspooks are EVERYWHERE" |
The Register |
Jan 23, 2014 |
| "2014's Hacking Pain is Cyber Security's Gain" |
Forbes |
Jan 22, 2014 |
| "CrowdStrike Takes On Chinese, Russian Attack Groups in Threat Report" |
Security Week |
Jan 22, 2014 |
| "Get Ready for Big Data Heists" |
Bloomberg |
Jan 22, 2014 |
| "Podcast: CrowdStrike’s Adam Meyers Discusses Attacks Emanating from China, Russia and the Middle East" |
IT Security News |
Jan 22, 2014 |
| "Politically Motivated Cyberattackers Adopting New Tactics, Report Says" |
Dark Reading |
Jan 21, 2014 |
| "Top 'good guy' hackers to tackle biggest cyber challenges yet" |
Times of Israel |
Jan 20, 2014 |
| "Encrypted Blackphone goes to war with snoopers" |
Space Daily |
Jan 19, 2014 |
| "Warning computer hackers shortens their intrusion" |
Phys.org |
Jan 17, 2014 |
| "Your Biggest Cybersecurity Threat Isn't Coming From the Outside" |
Business News Daily |
Jan 17, 2014 |
| "Cisco 2014 Annual Security Report" |
Cisco |
Jan 16, 2014 |
| "For The First Time, Hackers Have Used A Refrigerator To Attack Businesses" |
Business Insider |
Jan 16, 2014 |
| "Hacker threats rise, with defenders lacking: report" |
Space Daily |
Jan 16, 2014 |
| "Hacking threat is posed by malware : study" |
All Hacker News |
Jan 16, 2014 |
| "State Dept. computers open to hackers: report" |
Washington Times |
Jan 16, 2014 |
| "On-line or off, cyber-spies can get you, Israeli expert says" |
Times of Israel |
Jan 15, 2014 |
| "'Zero-day' hacking reform raises hackels with US tech groups" |
Financial Times |
Jan 14, 2014 |
| "N.S.A. Devises Radio Pathway Into Computers" |
New York Times |
Jan 14, 2014 |
| "The dangerous hacking groups you don't know" |
CNBC |
Jan 14, 2014 |
| "McAfee Labs 2014 Threats Predictions" |
McAfee |
Jan 13, 2014 |
| "McAfee security report suggests 2014 will be a rough year" |
Computerworld |
Jan 13, 2014 |
| "New cyber-attack model helps hackers time the next Stuxnet" |
The Conversation |
Jan 13, 2014 |
| "Terror Tactics: Report Urges Government to Use Financial, Trade and Immigration Systems to Squeeze Theft of IP" |
Electronics-Trade Blog |
Jan 13, 2014 |
| "The Scariest Thing About Cybersecurity Is How Unprepared We Are" |
Vice: Motherboard |
Jan 13, 2014 |
| "The State, the Internet and Cybersecurity" |
Brookings Institute |
Jan 13, 2014 |
| "ASSESSMENT: OSINT On NUCLEAR POWER SYSTEMS" |
krypt3ia |
Jan 11, 2014 |
| "Cyber-security: Small satellite dish systems called ripe for hacking" |
Christian Science Monitor |
Jan 11, 2014 |
| "From Heists to Hacktivists: 2013 Cybersecurity in Review" |
Cyber Security Law and Policy |
Jan 8, 2014 |
| "The case for forecasting cyberattacks" |
USA Today |
Jan 8, 2014 |
| "Top 10 countries where most of the world’s hackers come from" |
Hindustan Times |
Jan 8, 2014 |
| "United States: Trending Issues In The Prosecution Of Trade Secret Theft" |
Mondaq |
Jan 8, 2014 |
| "IPR Remains Among Top USTR Priorities For China In 2014" |
IP Watch |
Jan 7, 2014 |
| "Cybersecurity is for the C-suite, 'not just the IT crowd'" |
CNN |
Jan 6, 2014 |
| "Just the Right Amount of Cyber Fear" |
The Atlantic |
Jan 6, 2014 |
| "Hackers easily hijack Windows crash reports, report says" |
Tech Hive |
Jan 5, 2014 |
| "Windows crash reports may help hackers claims research" |
Neowin |
Jan 5, 2014 |
| "Thousands of visitors to yahoo.com hit with malware attack, researchers say" |
Washington Post |
Jan 4, 2014 |
| "Clean Energy Patent Growth Index" |
Cleantech Group |
Jan 2, 2014 |
| "Cyber security deal highlights threats from spying" |
CNBC |
Jan 2, 2014 |
| "Cybercriminals are eyeing these 5 targets in 2014" |
CBC News |
Jan 2, 2014 |
| "Cybersecurity Deal: FireEye Buying Mandiant for About $1 Billion" |
Wall Street Journal |
Jan 2, 2014 |
| "Cybersecurity forces align as FireEye acquires Mandiant" |
CNet |
Jan 2, 2014 |
| "FireEye Computer Security Firm Acquires Mandiant" |
New Yortk Times |
Jan 2, 2014 |
| "United States: Trade Secrets Watch 2013 Year-In-Review" |
Mondaq |
Jan 2, 2014 |
2013
|
| "2013 Security Brief: NSA Spying, Adobe Hack, Chinese Cyber Espionage, SEA" |
Softpedia |
Dec 29, 2013 |
| "Beware of counterfeit versions of top Android, iOS apps" |
PC World |
Dec 29, 2013 |
| "BGU researchers identify critical vulnerability Samsung's Galaxy S4" |
Homeland Security News Wire |
Dec 27, 2013 |
| "BGU Security Researchers discover Vulnerability in Samsung's Secure Software on the Company's Flagship Device Galaxy S4" |
Ben-Gurion University |
Dec 24, 2013 |
| "Hackers find cloud servers easy prey" |
SF Gate |
Dec 22, 2013 |
| "Hacking Back: For Now, Be Vigilant Rather Than a Vigilante" |
JD Supra |
Dec 20, 2013 |
| "Appointment & Timing of "Deputy" USPTO Director Disturbs Many" |
IP Closeup |
Dec 18, 2013 |
| "How hackers made minced meat of Department of Energy networks" |
ARS Technica |
Dec 16, 2013 |
| "Top 100 Android apps hacked in 2013" |
Net Security |
Dec 13, 2013 |
| "Secret TPP intellectual property agreement misses deadline" |
PC World |
Dec 10, 2013 |
| "Someone's Been Siphoning Data Through a Huge Internet Security Hole" |
GIZMODO |
Dec 6, 2013 |
| "Internet Firms Step Up Efforts to Stop Spying" |
New York Times |
Dec 5, 2013 |
| "Microsoft's General Counsel: N.S.A. Hacks Were an 'Earthquake' for Tech" |
New York Times |
Dec 5, 2013 |
| "Someone's Been Siphoning Data Through a Huge Security Hole in the Internet" |
Wired |
Dec 5, 2013 |
| "The Department of Energy's July 2013 Cyber Security Breach" |
U.S. Dept. of Energy |
Dec 5, 2013 |
| "Kaspersky Lab Names This Year's Top Cyber Security Threats" |
Forbes |
Dec 4, 2013 |
| "Snowden, Cyber-espionage, hacktivism and Bitcoins cause security headaches" |
ARN Net |
Dec 4, 2013 |
| "Cyber-security puzzle: Who is sending Internet traffic on long, strange trips?" |
Alaska Dispatch |
Dec 3, 2013 |
| "Global Fraud Report 2013-2014 Annual edition" |
Compliance Alert |
Dec 2, 2013 |
| "Global Fraud Report 2013-2014 Annual edition" |
Economist |
Dec 2, 2013 |
| "Israeli company starts 'Cyber Gym' school for ethical hacking" |
NDTV |
Dec 2, 2013 |
| "US Moving From Technology Leader To Laggard" |
Information Week |
Dec 2, 2013 |
| "Counterfeit Grinches Lure You With Bargains" |
NCPC |
Nov 27, 2013 |
| "Cyber Monday Means Bargains, Convenience...and Counterfeits" |
StreetInsider |
Nov 27, 2013 |
| "Symantec CEO Declares IP Theft Greater Threat Than Cyber War" |
InfoSecurity Magazine |
Nov 26, 2013 |
| "Symantec chief warns over cyber threat to intellectual property" |
Financial Times |
Nov 26, 2013 |
| "Cyberthreats on the rise, says McAfee Labs report" |
CNBC |
Nov 25, 2013 |
| "Investigators warn dangerous counterfeit items are on sale this holiday shopping season" |
ABC News |
Nov 21, 2013 |
| "The New Threat: Targeted Internet Traffic Misdirection" |
Renesys |
Nov 19, 2013 |
| "New Strategies in the Battle Against IP Theft" |
Corporate Counsel |
Nov 18, 2013 |
| "Trans-Pacific Partnership – similar to, but stronger than, SOPA and ACTA" |
InfoSecurity Magazine |
Nov 16, 2013 |
| "IP theft costs Australia $15bn" |
The Australian |
Nov 15, 2013 |
| "IT security costs countries more than gained: Report" |
ZD Net |
Nov 15, 2013 |
| "Microsoft opens a futuristic Cybercrime Center in Redmond to tackle botnets, malware and more" |
TheNextWeb |
Nov 14, 2013 |
| "Microsoft unveils state-of-the-art Cybercrime Center" |
Microsoft |
Nov 14, 2013 |
| "Hackers may have stolen data during International Atomic Energy Agency raid" |
V3.CO.UK |
Nov 13, 2013 |
| "International Atomic Energy Agency hit by unknown malware attack" |
V3.CO.UK |
Nov 12, 2013 |
| "How Corporate America fights hackers" |
CNN Money |
Nov 11, 2013 |
| "Cyber Readiness Index 1.0" |
Harvard |
Nov 1, 2013 |
| "It's Now Clear That Edward Snowden's Life Is Dictated By Russian Intelligence" |
Business Insider |
Nov 1, 2013 |
| "McAfee Labs Threats Report: Third Quarter 2013" |
McAfee |
Nov 1, 2013 |
| "How Edward Snowden Escalated Cyber War With China" |
Newsweek |
Nov 1, 2013 |
| "Intellectual Property Theft - Stealing Ideas: Manufacturers Feel the Brunt" |
Verizon |
Oct 30, 2013 |
| "Protecting Your Critical Infrastructure from Advanced Threats Using Big Data Answers" |
HackSurfer |
Oct 30, 2013 |
| "Snowden's Legacy Weighs On Obama Cybersecurity Meeting" |
Wall Street Journal |
Oct 29, 2013 |
| "The Staggering Cost of Economic Espionage Against the US" |
Epoch Times |
Oct 22, 2013 |
| "Keeping your endpoint data safe: some simple precautions" |
The Register |
Oct 21, 2013 |
| "Snowden says he kept NSA documents from Russian, Chinese Intellegence" |
RT America |
Oct 18, 2013 |
| "Hackers Compromise PR Newswire Customer Database" |
Security Week |
Oct 17, 2013 |
| "Report outlines characteristics of nation-state driven cyber attacks" |
The Guardian |
Oct 16, 2013 |
| "Report: Addressing cyber theft requires clarity, not hype" |
CREATE.org |
Oct 16, 2013 |
| "Government Procurement Challenges: Fakes, IP theft and Corruption [PDF]" |
Create.org |
Oct 15, 2013 |
| "Government Procurement Challenges: Fakes, IP theft and Corruption" |
Create.org |
Oct 15, 2013 |
| "Hackers Target Web Apps as a Bridgehead to the Datacenter" |
Security Week |
Oct 15, 2013 |
| "World War C: Understanding Nation-State Motives Behind Today's Advanced Cyber Attacks" |
FireEye |
Oct 15, 2013 |
| "Cyber warrior shortage hits anti-hacker fightback" |
Reuters |
Oct 13, 2013 |
| "HP Reveals Cost of Cybercrime Escalates 78 Percent, Time to Resolve Attacks More Than Doubles" |
HP |
Oct 8, 2013 |
| "Security compromised at security companies -- during Cyber Security Month" |
Fox News |
Oct 8, 2013 |
| "Hackers Purloin 2.9M Adobe Customers' Data" |
TechNewsWorld |
Oct 4, 2013 |
| "The Adobe Breach This Week Should Get Your Attention" |
Nextgov |
Oct 4, 2013 |
| "Adobe Announces Security Breach" |
New York Times |
Oct 3, 2013 |
| "EU report findings: ICC says now is time for leaders to step up IP protection" |
International Chamber of Commerce |
Oct 3, 2013 |
| "Illegal Access to Adobe Source Code" |
Adobe |
Oct 2, 2013 |
| "National Cyber Security Awareness Month 2013" |
FBI |
Oct 1, 2013 |
| "The State of the Internet: Q1, 2013" |
TechCrunch |
Oct 1, 2013 |
| "Cybersecurity Legislation Asked for by NSA Director" |
WebProNews |
Sep 27, 2013 |
| "National Cyber Security Awareness Month starts 1 October" |
Homeland Security News Wire |
Sep 26, 2013 |
| "Security Staff Feel Largely Unprepared for Cyber-Espionage and APTs" |
InfoSecurity Magazine |
Sep 26, 2013 |
| "Cyber Theft of Competitive Data: Asking the Right Questions" |
Brookings Institute |
Sep 25, 2013 |
| "U.S. officials woo tech companies in new push for cybersecurity law" |
Reuters |
Sep 25, 2013 |
| "America's hypocritical approach to economic espionage" |
CNN Money |
Sep 24, 2013 |
| "Senate working on counterpart to CISPA cybersecurity bill" |
The Hill |
Sep 24, 2013 |
| "Why Antivirus Software Isn't Enough To Fend Off Attacks" |
Forbes |
Sep 23, 2013 |
| "Close the N.S.A.'s Back Doors" |
New York Times |
Sep 21, 2013 |
| "FireEye's debut signals red hot interest in cybersecurity" |
Yahoo News |
Sep 21, 2013 |
| "Hacking U.S. Secrets, China Pushes for Drones" |
New York Times |
Sep 20, 2013 |
| "Cyber security: The new arms race for a new front line" |
Christian Science Monitor |
Sep 15, 2013 |
| "Congress appears in no rush on cyber legislation" |
Inside Cybersecurity |
Sep 13, 2013 |
| "G-20 Urged to Treat Cyber-Attacks as Threat to Global Economy" |
Bloomberg |
Sep 13, 2013 |
| "NIST seeks early adopters of draft cybersecurity framework" |
Inside Cybersecurity |
Sep 13, 2013 |
| "White House cybersecurity official says 'no new regulations'" |
Inside Cybersecurity |
Sep 13, 2013 |
| "4 ways to stop a cyber 9/11" |
The Business Journals |
Sep 11, 2013 |
| "Group-IB Threat Intelligence Report 2012–2013 H1" |
Security Affairs |
Sep 11, 2013 |
| "Proposed NIST cyber framework nearly complete, faces major implementation questions" |
Inside Cybersecurity |
Sep 11, 2013 |
| "Protecting Intellectual Property is Critical to our Economy" |
Trade Reform |
Sep 11, 2013 |
| "Threat Intelligence Report" |
Group IB |
Sep 11, 2013 |
| "Government Announces Steps to Restore Confidence on Encryption Standards" |
New York Times |
Sep 10, 2013 |
| "Uncle Sam's Economic Espionage – Not Looking for Your Trade Secrets" |
National Law Review |
Sep 10, 2013 |
| "Internet experts want security revamp after NSA revelations" |
Reuters |
Sep 7, 2013 |
| "N.S.A. Able to Foil Basic Safeguards of Privacy on Web" |
New York Times |
Sep 6, 2013 |
| "Trade Secret Law in a Nutshell" |
UNH Law |
Sep 6, 2013 |
| "Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security" |
ProPublica |
Sep 5, 2013 |
| "Why We Published the Decryption Story" |
ProPublica |
Sep 5, 2013 |
| "U.S. Chamber of Commerce has unveiled a proposal aimed at creating tough rules for the theft of trade secrets within the context of the Trans-Pacific Partnership, including the installation of criminal sanctions, which many TPP countries currently lack" |
UNH Law |
Sep 4, 2013 |
| "G20: All Access - Local companies highlight need to combat IP theft" |
ABC News |
Sep 3, 2013 |
| "Global conditions pose challenges, incentives for cybersecurity standards" |
Inside Cybersecurity |
Sep 3, 2013 |
| "IP Contribution Report" |
OHIM |
Sep 1, 2013 |
| "When Theft Trumps Innovation" |
KPLU/NPR |
Aug 27, 2013 |
| "Cyber Security Ranked Third on Lloyd's Of London Risk Index" |
Tripwire |
Aug 22, 2013 |
| "The Pentagon as Silicon Valley's Incubator" |
New York Times |
Aug 22, 2013 |
| "Pro-Patent Momentum on the Rise?" |
IP CloseUp |
Aug 20, 2013 |
| "Is cyber the new gunpowder and corruption the spark?" |
Reuters |
Aug 14, 2013 |
| "Japan Battery Maker Makes Case For Intellectual Property Paranoia" |
Wall Street Journal |
Aug 13, 2013 |
| "Printing Hard Copies of Stolen Source Code: The Difference Between Freedom and Incarceration in the Second Circuit" |
Trade Secrets Watch |
Aug 13, 2013 |
| "Administration Issues Latest Road Map to Combat Trade Secret Theft" |
JD Supra |
Aug 12, 2013 |
| "Stop the Grandstanding on Patent Trolls" |
IP CloseUp |
Aug 11, 2013 |
| "The Big Shift: The End Of The Era Of Great Invention" |
Forbes |
Aug 11, 2013 |
| "Jon Kyl: Don't weaken intellectual property rights" |
USA Today |
Aug 9, 2013 |
| "Cybersecurity and the board of directors: avoiding personal liability - Part II of III" |
Reuters |
Aug 6, 2013 |
| "FBI's new iGuardian portal aims to ease cyber crime reporting" |
CSO Online |
Aug 5, 2013 |
| "The Emerging Risks of Unauthorized IP in Your Supply Chain and How You Should Respond" |
JD Supra |
Aug 3, 2013 |
| "Is IP Theft the Leading Cause of Tech Decline in the US?" |
Chip Design |
Aug 1, 2013 |
| "Poison Ivy: Assessing Damage and Extracting Intelligence" |
FireEye |
Aug 1, 2013 |
| "Address the patent trolls, but don't ignore the patent evaders" |
The Hill |
Jul 31, 2013 |
| "Computer scientists achieve 'iron wall' software obfuscation to protect IP" |
Wired |
Jul 31, 2013 |
| "Long story short: Fair use is theft by any other name" |
Brisbane Times |
Jul 31, 2013 |
| "U.S. IP Commission Explores Foreign Theft; Ignores Domestic" |
IPCloseUp |
Jul 31, 2013 |
| "Former Wash. AG named president of alliance aimed at stopping IP theft" |
Legal Newsline |
Jul 30, 2013 |
| "Protect your small business from cybercrime" |
USA Today |
Jul 30, 2013 |
| "Senators take aim at foreign cybercriminals" |
Politico |
Jul 30, 2013 |
| "A Fractured Fairy Tale: Separating Fact & Fiction on Patent Trolls" |
IPWatchDog |
Jul 29, 2013 |
| "Cyber espionage costs 508,000 jobs in the US" |
V3.CO.UK |
Jul 23, 2013 |
| "Cybersecurity and the board of directors: avoiding personal liability - Part I of III" |
Reuters Complinet |
Jul 23, 2013 |
| "N.S.A. Imposes Rules to Protect Secret Data Stored on Its Networks" |
New York Times |
Jul 18, 2013 |
| "One big threat to cybersecurity: IT geeks can't talk to management" |
Quartz |
Jul 13, 2013 |
| "Senate signals piecemeal approach on cybersecurity" |
FCW |
Jul 12, 2013 |
| "A list of significant cyber events since 2006" |
Center for Strategic & International Studies |
Jul 11, 2013 |
| "Defence partnership tackles cyber security risks" |
GOV.UK |
Jul 5, 2013 |
| "Fear of IP theft a "growing concern" for emerging economies" |
WIPR |
Jun 27, 2013 |
| "State AGs Developing Groundbreaking Solutions to Battle IT Theft and Unfair Competition" |
Yahoo |
Jun 26, 2013 |
| "Troubled waters: the risks of international commercial disputes" |
Reed Smith |
Jun 24, 2013 |
| "UK Home Office invests £4m to raise SMBs' cyber threat awareness" |
V3.CO.UK |
Jun 21, 2013 |
| "G-20 Urged to Treat Cyber-Attacks as Threat to Global Economy" |
Washington Post |
Jun 13, 2013 |
| "Stop thief! Time to limit US IP theft" |
TheHill |
Jun 10, 2013 |
| "Bipartisan Effort to Punish Nation-State Cyber Hackers" |
Homeland Security & Government Affairs |
Jun 6, 2013 |
| "Spooks nicking your tech? What you need is THE CLOUD - NSA boss" |
The Register |
Jun 5, 2013 |
| "Policy Feature Issue: Global Intellectual Property Theft" |
GOP.gov |
Jun 4, 2013 |
| "Attacking the attackers: Can active cyber defense stay within the rules?" |
GCN |
May 28, 2013 |
| "IP theft commission wants to use rootkits and malware to attack piracy" |
Tech2 |
May 28, 2013 |
| "Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies" |
Washington Post |
May 27, 2013 |
| "Slowed by Debate and Uncertainty, New Rules Green Light Response to Cyber Attacks" |
Defense News |
May 27, 2013 |
| "Protecting Know-How In China: Process Is Simple And Complex" |
Forbes India |
May 20, 2013 |
| "Top U.S. admiral puts cyber security on the Navy's radar" |
News Daily |
May 13, 2013 |
| "Inside a Cyber War Room: The Fight Against Hacking" |
CNBC |
May 7, 2013 |
| "Combating IP Theft Using Unfair Competition Law" |
New York Law Journal |
May 6, 2013 |
| "Global Piracy, SAP, Takeda, Goldman: Intellectual Property (1)" |
Bloomberg |
May 2, 2013 |
| "Ukraine named as piracy Priority Foreign Country" |
Advanced Television |
May 2, 2013 |
| "2013 Special 301 Report" |
USTR |
May 1, 2013 |
| "Intellectual Property (IP) Theft Enforcement Program" |
U.S. Dept. of Justice |
Apr 26, 2013 |
| "Organised crime linked to IP theft" |
News 24 |
Apr 26, 2013 |
| "State of Intellectual Property" |
U.S. Chamber of Commerce |
Apr 26, 2013 |
| "US embassies worldwide take to Facebook in bizarre promotion of 'World IP Day'" |
ARS Technica |
Apr 26, 2013 |
| "Latest U.S. Efforts to Prosecute Trade Secret Theft Hit a Few Snags" |
Crime in the Suites |
Apr 23, 2013 |
| "New IPC Certification Program Helps Electronics Manufacturers Protect Intellectual Property" |
IPC |
Apr 19, 2013 |
| "U.S. House OKs bill to protect businesses against cyberattacks" |
Detroit News |
Apr 19, 2013 |
| "Cyber Security and Cyber Espionage: A CCCA Panel" |
Slaw |
Apr 16, 2013 |
| "Cyberattacks, corporate espionage now targeting smaller companies" |
CBC News |
Apr 16, 2013 |
| "Q&A: Why cyberspies are targeting small businesses" |
USA Today |
Apr 16, 2013 |
| "Government pledge to make UK one of the safest places to do business in cyberspace" |
The Daily Telegraph (UK) |
Apr 14, 2013 |
| "Cybersecurity Responding to the Threat of Cyber Crime and Terrorism" |
FBI |
Apr 12, 2013 |
| "New cybersecurity bill: Privacy threat or crucial band-aid?" |
Christian Science Monitor |
Apr 10, 2013 |
| "A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace" |
Heritage Foundation |
Apr 1, 2013 |
| "Concerns about cybersecurity" |
Ernst & Young |
Apr 1, 2013 |
| "Spies and Big Business Fight Cyberattacks" |
International Herald Tribune |
Mar 27, 2013 |
| "UK Government Establishes 'Fusion Cell' to Combat Cyber Attacks" |
International Business Times |
Mar 27, 2013 |
| "Government to protect UK's £82bn digital economy with cyber crime task force" |
V3.CO.UK |
Mar 21, 2013 |
| "The Looming Threats of Cyber War and Cyber Espionage" |
The Crime Report |
Mar 21, 2013 |
| "White House Shares Plan to Mitigate Trade Secret Theft" |
IP Watchdog |
Mar 10, 2013 |
| "Investing Opportunity: Prepping For Cyber Pearl Harbor" |
Forbes |
Mar 7, 2013 |
| "Stopping Rampant Intellectual Property Theft With NAJI" |
Manufactoring.net |
Mar 7, 2013 |
| "DHS Notifies Companies, Offers Intel about Ongoing Hacks" |
NextGov |
Feb 25, 2013 |
| "Analysis: The near impossible battle against hackers everywhere" |
Reuters |
Feb 24, 2013 |
| "Disclosure Plays Into Hackers' Hands" |
New York Times |
Feb 22, 2013 |
| "A National Priority and a Business Priority" |
New York Times |
Feb 21, 2013 |
| "Average computer users need to be on their guard for hackers, too" |
Washington Times |
Feb 20, 2013 |
| "Nuclear Lab Remains Vulnerable to Cyberstrikes, Energy IG Say" |
NextGov |
Feb 15, 2013 |
| "Cybersecurity research gets boost in 2013 budget request" |
GCN |
Feb 14, 2013 |
| "Executive Order -- Improving Critical Infrastructure Cybersecurity" |
White House Executive Order |
Feb 12, 2013 |
| "Employee IP Theft is Common" |
Symantec |
Feb 11, 2013 |
| "Symantec raises the alarm over employee IP theft" |
IT Pro |
Feb 7, 2013 |
| "Administraion Strategy on Mitigating the Theft of U.S. Trade Secrets" |
Scribd |
Feb 1, 2013 |
| "Administration Strategy on Mitigating the Theft of U.S. Trade Secrets" |
OMB |
Feb 1, 2013 |
| "Pentagon Expanding Cybersecurity Force to Protect Networks Against Attacks" |
New York Times |
Jan 27, 2013 |
| "Brocade Awarded Permanent Injunction in Intellectual Property Theft Case Against A10 Networks" |
MarketWire |
Jan 11, 2013 |
| "European agencies at center of cyberspying campaign" |
Pitssburgh Post Gazette |
Jan 5, 2013 |
2012
|
| "Report: US government plans legal assault on foreign hackers" |
The Register |
Dec 20, 2012 |
| "The Conference Board Launches New Report Highlighting Risks of Intellectual Property Theft and Corruption in Supply Chains" |
CNBC |
Dec 19, 2012 |
| "Hype and fear" |
The Economist |
Dec 8, 2012 |
| "Time Line: Fighting Intellectual Property Theft" |
Risk Management |
Dec 6, 2012 |
| "2012: The year in cybersecurity" |
FCW |
Dec 5, 2012 |
| "Experts develop protections for product piracy, intellectual property theft" |
Search Security |
Dec 5, 2012 |
| "The Conference Board Launches New Report Highlighting Risks of Intellectual Property Theft and Corruption in Supply Chains" |
PR Newswire |
Dec 3, 2012 |
| "Global Intellectual Property Center (GIPC) International IP Index" |
U.S. Chamber of Commerce |
Dec 1, 2012 |
| "Safeguarding Intellectual Property and Addressing Corruption in the Global Supply Chain" |
The Conference Board |
Dec 1, 2012 |
| "Step Into the Arena and Be Prepared to Get Dirty: Apple vs. Samsung" |
IP Made Simple |
Nov 29, 2012 |
| "The Curious Case of Samsung's Missing TVs" |
Bloomberg |
Nov 29, 2012 |
| "Attacks targeting government info, intellectual property grow more complex" |
GCN |
Nov 15, 2012 |
| "A Need for Clearer Disclosure Rules after Cyberattacks" |
New York Times |
Nov 9, 2012 |
| "Welcome to the era of drive-by hacking" |
BBC |
Nov 6, 2012 |
| "Intellectual Property Theft Hurts Small Businesses" |
Hispanic Business |
Nov 4, 2012 |
| "Intangible Theft" |
Intellectual Property Office (UK) |
Nov 1, 2012 |
| "The bloody patent battle over a healing machine" |
CNN |
Oct 30, 2012 |
| "IP Theft, Supply Chain Security Major Worries for Government, Former Cybersecurity Czar Says" |
Threat Post |
Oct 26, 2012 |
| "IP Theft: Dyson Accuses Bosch Of Industrial Spying" |
Manufacturing Executive |
Oct 25, 2012 |
| "Cyberwarfare" |
New York Times |
Oct 24, 2012 |
| "Report sheds light on intellectual property theft" |
Security Info Watch |
Oct 24, 2012 |
| "Verizon Releases Industry-by-Industry Snapshots of Cybercrime, Based on the Data Breach Investigations Report Series" |
Wall Street Journal |
Oct 24, 2012 |
| "IP Theft Emerges as an Inside Job" |
Point 2 Security |
Oct 23, 2012 |
| "Kroll Global Fraud Report Annual Edition 2012/13" |
Kroll Advisory Solutions |
Oct 16, 2012 |
| "Ready Player One: Did the Pentagon just take over America's cybersecurity?" |
FP National Security |
Oct 12, 2012 |
| "School settles laptop spying case to 'protect taxpayers'" |
ARS Technica |
Oct 12, 2012 |
| "Panetta divulges secrets to make cyber-security come alive" |
FP National Security |
Oct 11, 2012 |
| "Panetta Warns of Dire Threat of Cyberattack on U.S." |
New York Times |
Oct 11, 2012 |
| "Pentagon Chief Reveals 'Classified' Cyber Threats" |
Wired" |
Oct 11, 2012 |
| "Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City" |
U.S. Department of Defense |
Oct 11, 2012 |
| "Automated Toolkits Named in Massive DDoS Attacks Against U.S. Banks" |
Threat Post |
Oct 2, 2012 |
| "The Battle to Protect Confidential Data" |
Bloomberg |
Oct 2, 2012 |
| "'Historic' DDoS Attacks Against Major U.S. Banks Continue" |
Threat Post |
Sep 27, 2012 |
| "Smart Grid Cybersecurity Alert: Telvent Reports Hack" |
Green Tech Media |
Sep 27, 2012 |
| "Maker of Smart-Grid Control Software Hacked" |
Wired |
Sep 26, 2012 |
| "Microsoft Carries out Nitol Botnet Takedown" |
Threat Post |
Sep 12, 2012 |
| "Shamoon The Wiper: further details" |
SecureList |
Sep 11, 2012 |
| "Cyber attacks grow increasingly 'reckless', official says" |
Reuters |
Sep 7, 2012 |
| "The Elderwood Project" |
Symantec |
Sep 7, 2012 |
| "Guarding the Grid Against the New Breed of Cybercrime" |
Green Tech Media |
Sep 5, 2012 |
| "Espionage Hackers Target 'Watering Hole' Sites" |
Krebs on Security |
Sep 1, 2012 |
| "Tagging and Tracking Espionage Botnets" |
Krebs on Security |
Sep 1, 2012 |
| "Bungling Cyber Spy Stalks Iran" |
Technology Review |
Aug 31, 2012 |
| "Connecting the Dots After Cyberattack on Saudi Aramco" |
New York Times |
Aug 27, 2012 |
| "Saudi Aramco Confirms Scope of Malware Attack" |
Threat Post |
Aug 27, 2012 |
| "Smart Grid Cybersecurity: DHS Reports Vulnerability in RuggedCom's Software" |
Green Tech Media |
Aug 23, 2012 |
| "Siemens 'flaw' claim sparks US power plant security probe" |
BBC |
Aug 22, 2012 |
| "'Degrade, Disrupt, Deceive': U.S. Talks Openly About Hacking Foes" |
Wired |
Aug 11, 2012 |
| "Darpa Looks to Make Cyberwar Routine With Secret 'Plan X'" |
Wired |
Aug 11, 2012 |
| "Qatari Gas Company Hit With Virus in Wave of Attacks on Energy Companies" |
Wired |
Aug 3, 2012 |
| "The Impact of Intellectual Property Theft on the Economy" |
Report by the US Congress Joint Economic Committee Chairman's Staff - Senator Bob Casey - Chairman |
Aug 1, 2012 |
| "Rise Is Seen in Cyberattacks Targeting U.S. Infrastructure" |
New York Times |
Jul 26, 2012 |
| "Foreign intelligence agencies are biggest online threat, ex-Fed warns" |
The Register |
Jul 25, 2012 |
| "White Paper: Chasing APT" |
DELL SecureWorks |
Jul 23, 2012 |
| "Research on Hardware Security" |
Sergei Skorobogatov |
May 31, 2012 |
| "Anonymous Launches Cyberattack Salvo on China" |
TechNewsWorld |
May 28, 2012 |
| "Massive targeted cyber-attack in Middle East uncovered" |
CNET Network |
May 28, 2012 |
| "Chinese official's downfall tied to wiretapping spree" |
The New York Times |
Apr 26, 2012 |
| "Cyber Theft of Corporate Intellectual Property" |
The Economist |
Apr 24, 2012 |
| "2012 Data Breach Investigations Report" |
Verizon |
Apr 5, 2012 |
| "10 Steps for Early Incident Detection" |
Tripwire |
Apr 1, 2012 |
| "Japan joins worry list after losing the electronics plot" |
The Australian |
Mar 29, 2012 |
| "Labor Takes Brave, True Path on Huawei and Tibet" |
The Australian |
Mar 29, 2012 |
| "Taiwan giant buys into Sharp" |
The Australian Financial Review |
Mar 29, 2012 |
| "McAfee: Corporate Espionage Is the Currency of Cybercrime" |
PCWorld |
Mar 28, 2012 |
| "Hacktivism Is The Rising Cause of Data Breaches, Verizon Finds" |
Security Week |
Mar 22, 2012 |
| "Cyber Theft of Corporate Intellectual Property" |
Economist Intelligence Unit and Booz Allen Hamilton |
Mar 12, 2012 |
| "NSF: US losing ground as more R&D jobs head overseas" |
EE Times |
Jan 20, 2012 |
| "'Red October' Cyberattack Ring Is Uncovered" |
Wall Street Journal |
Jan 14, 2012 |
| "Oil above $110 on Iran, China data" |
Reuters |
Jan 3, 2012 |
2011
|
| "Intellectual property theft fuels underground cyber economy" |
Venture Beat |
Mar 27, 2011 |