2022 |
"The Party Group of the Municipal Intellectual Property Office studied and discussed the spirit of the 20th National Congress of the Communist Party of China to accelerate the construction of a demonstration city for a strong intellectual property country" |
Qianlong.com.cn |
Nov 5, 2022 |
"CISA Alert: APT Groups Had “Long-Term Access” to a Defense Organization, Exfiltrated Sensitive Data" |
CPO Magazine |
Oct 15, 2022 |
"Bipartisan senators urge Biden to take executive action to create additional outbound investment screen" |
Homeland Preparedness News |
Sep 29, 2022 |
"Cyberattacks by nation-states affect a majority of organizations, security pros say" |
SC Media |
Aug 24, 2022 |
"Protecting against cyber threats from nation states" |
Open Access Government |
Aug 19, 2022 |
"MARQVISION RAISES $20 MILLION SERIES A FOR FIRST-OF-ITS-KIND OPERATING SYSTEM FOR INTELLECTUAL PROPERTY" |
NFT Culture |
Aug 3, 2022 |
"‘Blended threat’: DOJ warns of China, Russia, and North Korea allying with hackers" |
Washington Examiner |
Jul 19, 2022 |
"Texas A&M’s Unreported Foreign Funding" |
Wall Street Journal |
Jun 17, 2022 |
"Alibaba, Other Chinese Stocks Brace For Uncertainty As US Looks To Monitor, Restrict Investment In China" |
Benzinga |
Jun 14, 2022 |
"Patent Poetry: Jury Awards $2 Billion in Trade Secret Theft Case" |
JD Supra |
May 31, 2022 |
"Richard C. Owens: On IP appropriation, just say no to the WHO" |
Financial Post |
May 23, 2022 |
"More than $3.65 million in illegal goods, medicine seized in 24-hour period" |
Kentucky Today |
May 19, 2022 |
"Series: Types of Industrial Espionage" |
National Law Review |
May 10, 2022 |
"Apple sues chip startup Rivos for alleged trade secret theft " |
Inferse |
May 6, 2022 |
"As Russian Cyber Threats Grow, Securing Intellectual Property Must Be an Urgent National Security, Economic Priority" |
CPO Magazine |
Apr 27, 2022 |
"State Department Launches New Cybersecurity Bureau" |
CNet |
Apr 4, 2022 |
"Samsung Electronics employee allegedly caught stealing trade secrets" |
SAM Mobile |
Mar 25, 2022 |
"The ex parte seizure order in trade secrets: then and now" |
Reuters |
Feb 1, 2022 |
2021 |
"Why It's Time to Talk About Nation-State Attacks...Again" |
Info Security |
Nov 30, 2021 |
"Intellectual Property: The New Silent Target of Cybertheft" |
Masuda |
Nov 8, 2021 |
"US Offers Reward for Info on Darkside Ransomware Gang" |
HackRead |
Nov 4, 2021 |
"Reward Offers for Information to Bring DarkSide Ransomware Variant Co-Conspirators to Justice" |
Data Breaches |
Nov 4, 2021 |
"In Other Words: Time to punish big tech's IP theft" |
Argus Observer |
Oct 24, 2021 |
"POLITICS
America must protect these 5 technologies if it wants to remain a superpower, intelligence officials warn" |
CNBC |
Oct 22, 2021 |
"Google warns of surge in activity by state-backed hackers" |
The Gaurdian |
Oct 15, 2021 |
"U.S. hosts global talks on China, Russia cyber threats" |
Nikkei Asia |
Oct 13, 2021 |
"Intellectual Property Theft/Piracy News" |
FBI |
Oct 9, 2021 |
"Tesla Amps Up Rivian Poaching Fight, Cites Battery Secrets Theft" |
Bloomberg |
Oct 3, 2021 |
"UK to build £5bn digital warfare centre to mount ‘offensive’ cyber attacks" |
The Free Press |
Oct 2, 2021 |
"Microsoft : How nation-state attackers like NOBELIUM are changing cybersecurity" |
Market Screener |
Sep 29, 2021 |
"Multiple Defendants Indicted in Alleged Intellectual Property Theft Scheme" |
Imperial Valley News |
Sep 26, 2021 |
"Lawmakers Share Huawei Concerns with US State Department" |
Data Breach Today |
Sep 23, 2021 |
"Automotive Industry Faces Severe Data Breaches and Ransomware Threats, CybelAngel Investigation Reveals" |
Businesswire |
Sep 14, 2021 |
"Acknowledging the Importance of Intellectual Property Rights on Constitution Day" |
CAGW |
Sep 14, 2021 |
"DEFEND3D INTRODUCES NEW PATENTED TECHNOLOGY TO COMBAT CYBERCRIME AND IP THEFT" |
3D Printing Industry |
Sep 3, 2021 |
"HashCash Builds a Blockchain-based Intellectual Property Protection Prototype" |
WFMZ News |
Aug 28, 2021 |
"Former Applied Materials Employee Convicted of Trade Secret Theft" |
Bertram |
Aug 26, 2021 |
"Intellectual property protection: 10 tips to keep IP safe" |
CSO Online |
Aug 26, 2021 |
"US State Department Hit By Cyber-Attack" |
InfoSecurity |
Aug 23, 2021 |
"Masimo Sues Apple, Seeks to Stop Smartwatch Imports" |
ORANGE COUNTY BUSINESS JOURNAL |
Aug 23, 2021 |
"State Department is hit by a cyber attack amid US efforts to evacuate thousands of Americans and Afghan allies from Kabul" |
Daily Mail (UK) |
Aug 21, 2021 |
"Weighing up the state of cyber security in 2021" |
Channel Asia |
Aug 2, 2021 |
"Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention" |
Datacenter Knowledge |
Jul 30, 2021 |
"The Cyber Apocalypse Never Came. Here's What We Got Instead." |
Politico |
Jul 28, 2021 |
"Pilot Sues Delta For $1 Billion Over Trade-Secrets Theft" |
One Mile at a Time |
Jul 15, 2021 |
"Couple Convicted of Theft of Biotech Trade Secrets from Genentech; JHL Biotech Founders Face Similar Charges" |
California News Times |
Jul 9, 2021 |
"JHL EXECS INDICTED FOR THEFT OF GENENTECH TRADE SECRETS" |
PharmaLive |
Jul 8, 2021 |
"Feds Convict Couple in Theft of Genentech Trade Secrets" |
NBC |
Jul 8, 2021 |
"Cyber retaliation, cyber deterrence, and cyber diplomacy." |
The Cyberwire |
Jul 7, 2021 |
"Former CEO And COO Of JHL Biotech Charged With Conspiracy To Steal Trade Secrets And Commit Wire Fraud Exceeding $101 Million" |
US DOJ |
Jul 7, 2021 |
"The future of China-US relations" |
TRT World |
Jul 6, 2021 |
"US the Only Top Tier Cyber-power" |
Info Security |
Jun 28, 2021 |
"DOD Offering Defense Industrial Base a ‘Krystal Ball’ Into Adversary Insights" |
Nextgov |
Jun 25, 2021 |
"Ocado co-founder settles with firm over information theft claim" |
The Guardian |
Jun 25, 2021 |
"Fast Track to Justice for Trade Secret Theft at the ITC: New Senate Bill Would Expand ITC Authority to Curtail Trade Secret Theft by Foreign Governments" |
JD Supra |
Jun 24, 2021 |
"Biden’s Executive Order on Protecting Americans’ Sensitive Data from Foreign Adversaries" |
JD Supra |
Jun 24, 2021 |
"EU to form united front to battle Chinese and Russian cyberthreats" |
Nikkei Asia |
Jun 24, 2021 |
"5 Trade Secret Protection Steps Employers Should Take in Response to New Corporate Espionage in Florida Act" |
JD Supra |
Jun 22, 2021 |
"Cybercriminals Increasingly Target Manufacturing, IP" |
Security Boulevard |
Jun 21, 2021 |
"CBP at JFK Seizes Counterfeit Rolex Watches" |
US CBP |
Jun 21, 2021 |
"National policy on intellectual property rights ready soon" |
The Nation |
Jun 20, 2021 |
"The Cybersecurity 202: The U.S. government is getting closer to having a national cyber czar" |
Washington Post |
Jun 10, 2021 |
"National Security Implications of the Colonial Pipeline Hack" |
Law.Com |
Jun 10, 2021 |
"Sanctions for Trade Secret Thieves Part of Senate-Passed Bill" |
Bloomberg |
Jun 9, 2021 |
"Steve Wozniak to Go to Trial: Apple Co-Founder Faces Lawsuit for Intellectual Property and Copyright Theft" |
Entrepreneur |
May 25, 2021 |
"Russia and China accuse the UK of using cyborgs to “destroy” the West." |
Decommissioning News |
May 15, 2021 |
"Moderna: A Suspension Of Intellectual Property Is A Real Threat" |
Seeking Alpha |
May 13, 2021 |
"Ransomware Attack Shuts Down Massive East Coast Gasoline Pipeline" |
Forbes |
May 8, 2021 |
"The US Needs to Impose Costs on China for Its Economic Warfare" |
Defense One |
May 8, 2021 |
"Van Hollen, Sasse Revive Bill To Protect U.S. Intellectual Property From Foreign Theft" |
Patch |
May 7, 2021 |
"Global trends will increase nation-state threats for the US in next 20 years" |
CSO Magazine |
Apr 21, 2021 |
"US Bill to pressure China on trade and rights, back Taiwan" |
CNA |
Apr 9, 2021 |
"Wisk Aero Sues Archer Aviation for Theft of Trade Secrets and Patent Infringement" |
PR Newswire |
Apr 6, 2021 |
"US Tech Dominance Rides on Securing Intellectual Property" |
Dark Reading |
Apr 2, 2021 |
"2021 Executive Leadership Predictions For A Data-Rich World" |
Forbes |
Feb 1, 2021 |
"Senate Passed New Legislation to Punish Foreign Individuals and Corporations for IP Theft" |
Trade Secrets Trends |
Jan 26, 2021 |
"Upcoming book reveals counterfeiters are lurking next door--wreaking havoc and endangering consumers" |
PR Newswire |
Jan 26, 2021 |
"ATTACKERS EYEING CLOUD PLATFORMS" |
Dou Security |
Jan 16, 2021 |
2020 |
"Who Owns Intellectual Property?" |
The Corner (EU) |
Dec 13, 2020 |
"EMA Server Breached, Hackers Steal Pfizer/BioNTech Vaccine Data" |
BioSpace |
Dec 10, 2020 |
"The Geopolitics of Cybersecurity" |
The Diplomat |
Dec 9, 2020 |
"Global losses from cybercrime skyrocketed to nearly $1 trillion in 2020, new report finds" |
Washington Post |
Dec 7, 2020 |
"McAfee report says cybercrime to cost world economy over $1 trillion" |
Business Standard |
Dec 7, 2020 |
"Cybersecurity 2021: nation-state hacking, network vulnerability and social media manipulation" |
Silicon Angle |
Dec 7, 2020 |
"Police arrest two in data theft cyberattack on Leonardo defense corp" |
Bleeping Computer |
Dec 5, 2020 |
"EU eyes tougher measures against foreign industrial espionage" |
Reuters |
Nov 25, 2020 |
"Commission charts increased data sharing in leaked IP strategy" |
EURACTIV |
Nov 23, 2020 |
"Cybercrime will total $ 10.5 trillion in 2025" |
Business Aviattion News |
Nov 23, 2020 |
"Hackers 'try to steal Covid vaccine secrets in intellectual property war'" |
The Guardian |
Nov 22, 2020 |
"Four Key Disciplines for Intellectual Property Protection" |
MedTech Intelligence |
Nov 20, 2020 |
"Cyber espionage; the unwanted growth industry" |
Innovation Australia |
Nov 18, 2020 |
"ThreatList: Pharma Mobile Phishing Attacks Turn to Malware" |
ThreatPost |
Nov 17, 2020 |
"Russia, North Korea Accused Of Hacking Vaccine Research" |
Law 360 |
Nov 13, 2020 |
"Beware Of Online Scammers" |
JD Supra |
Oct 29, 2020 |
"Price Controls Are Intellectual Property Theft by a Different Name" |
Townhall Media |
Oct 27, 2020 |
"An assessment of Donald Trump’s record on trade" |
The Economist |
Oct 24, 2020 |
"Decade-long Oracle-Google copyright case heads to top US court" |
Economic Times |
Oct 6, 2020 |
"Qualcomm Wins Antitrust Appeal, But Why?" |
ElectroPages |
Aug 18, 2020 |
"European Union hits Chinese, Russian hackers with first-ever cyberattack sanctions" |
Global News |
Jul 31, 2020 |
"America's top tech CEOs can't agree on whether China steals from them" |
CNN |
Jul 30, 2020 |
"EU sanctions Russian, Chinese hackers over alleged cyberattacks" |
Deutsche Welle |
Jul 30, 2020 |
"EU imposes sanctions on Russian, North Korean, Chinese groups and individuals for major cyberattacks" |
The Hill |
Jul 30, 2020 |
"Weaponizing Intellectual Property: the Scientist and the Spy" |
CounterPunch |
Jul 22, 2020 |
"Feds execute search warrants at two manufacturing plants in Rochester" |
WHAM |
Jul 22, 2020 |
"Trump ends preferential economic treatment for Hong Kong" |
Outlook India |
Jul 15, 2020 |
"The chance of data being stolen in a ransomware attack is greater than one in ten." |
Security Boulevard |
Jul 13, 2020 |
"Online training program focuses on intellectual property protection" |
Dayton Daily News |
Jul 10, 2020 |
"Bill Aims to Protect Intellectual Property on Campuses" |
Malaysia Sun |
Jun 20, 2020 |
"Fear of the enemy or Trump's cure all?" |
China Global Television Network |
Jun 19, 2020 |
"The US wants to kill part of an 8,000 mile-long undersea cable linking Hong Kong with LA over China spying fears" |
Yahoo News |
Jun 18, 2020 |
"University of Dayton School of Law, Air Force Research Laboratory create online intellectual property training program" |
Univ. of Dayton |
Jun 15, 2020 |
"US Intelligence Reports Warn Of Increasingly Dangerous Cyber ‘Cold War’ - OpEd" |
Eurasia Review |
Jun 14, 2020 |
"Senators introduce the Protecting American Intellectual Property Act" |
ITPro |
Jun 12, 2020 |
"Disunited Democracies Cannot Face the Challenge of China" |
Chatham House |
Jun 4, 2020 |
"The way to defeat China is to be true to ourselves" |
Washington Post |
Jun 3, 2020 |
"US trade export, import with China slumps by 45% in just 7 months" |
BusinessGhana |
Jun 3, 2020 |
"Time for smart leaders to come forward on relations with China" |
The Hill |
Jun 3, 2020 |
"To punish China, Trump begins to revoke Hong Kong trade privileges" |
Politico |
May 29, 2020 |
"Kaspersky reveals new details into series of targeted attacks on industrial companies" |
Kaspersky |
May 28, 2020 |
"Defendant sentenced to prison for stealing aircraft trade secrets now faces charges for lying" |
US DOJ |
May 21, 2020 |
"Cybersecurity: UK manufacturers most attacked industry - NTT" |
Manufacturing Global |
May 20, 2020 |
"U.S. Trade Representative Releases 2020 Special 301 Report" |
JD Supra |
May 13, 2020 |
"Comcast Loses IP Theft Case to TiVo" |
Breitbart |
Apr 30, 2020 |
"Autonomous Driving Startup Zoox Agrees to Settle Lawsuit Filed By Tesla Over Stolen IP" |
FutureCar |
Apr 15, 2020 |
"These are the countries trying to hack US critical infrastructure" |
TechRepublic |
Apr 6, 2020 |
"Defend Trade Secrets Act Goes International" |
Law.Com |
Apr 3, 2020 |
"Evolutions in the U.S. Chinese-Hacking Indictment Strategy" |
LawFare |
Apr 3, 2020 |
"Levandowski Admits to Stealing Waymo’s IP" |
Security Boulevard |
Mar 26, 2020 |
"AMD Releases Statement on Theft of Graphics IP" |
ExtremeTech |
Mar 25, 2020 |
"The Great Chinese Wall – Part 1" |
Times of India |
Mar 24, 2020 |
"Ex-Inspector General indicted for stealing data on 250k govt colleagues" |
Naked Security |
Mar 10, 2020 |
"Global Threat Report Has Key Takeaways for IP-Intensive Companies" |
IP Watchdog |
Mar 10, 2020 |
"Rebelling over Huawei would send China the wrong signal" |
The Standard (UK) |
Mar 10, 2020 |
"The Trump Administration Takes on Google’s IP Theft" |
American Greatness |
Mar 6, 2020 |
"Cracking down on theft of U.S. research" |
Richland Source |
Mar 6, 2020 |
"Trump Versus Comcast" |
NewsMax |
Mar 6, 2020 |
"Singaporean named to head intellectual property agency" |
Seattle Times |
Mar 4, 2020 |
"‘Google v. Oracle’ Could Undermine Gains With China" |
Inside Sources |
Feb 27, 2020 |
"Another global pandemic we’re not talking about: Theft of IP" |
ELETimes |
Feb 27, 2020 |
"RSA Conference: More countries willing to steal economic secrets" |
IT World Canada |
Feb 27, 2020 |
"Europe Becomes a Battleground Over Huawei and 5G" |
Courthouse News |
Feb 12, 2020 |
"Huawei, 5G and the UK: What is the real risk for enterprises?" |
CSO Online |
Feb 12, 2020 |
"Huawei takes Verizon to court for alleged patent infringement" |
ZDNet |
Feb 6, 2020 |
"Trump Wins on China Trade Deal" |
American Free Press |
Feb 5, 2020 |
"FBI: Stealing of Ideas for New Technology Increases" |
VOA |
Jan 19, 2020 |
"US-China Trade Deal Draws Praise, But Leaves Considerable Unfinished Business" |
VOA |
Jan 16, 2020 |
"SEC Sets Disclosure Expectations on IP Risks Associated with International Operations" |
Lexology |
Jan 2, 2020 |
2019 |
"Uber Suffers Setback in Defense Against Waymo’s IP Infringement Case" |
BeInCrypto |
Nov 10, 2019 |
"9 Ways Data Vampires Are Bleeding Your Sensitive Information" |
Informationweek |
Oct 31, 2019 |
"An Alphabet Employee Was Charged With Stealing Intellectual Property: Employee Monitoring Can Prevent Future Incidents" |
IT Security Central |
Aug 30, 2019 |
"Levandowski’s Fate May Turn on the Meaning of ‘Trade Secret’" |
Wired |
Aug 29, 2019 |
"Google Burned By Insider Who Actively Competed Against His Employer’s Bottom Line" |
Clearance Jobs |
Aug 29, 2019 |
"Former Seattle Tech Worker Indicted on Federal Charges for Wire Fraud and Computer Data Theft" |
US DOJ |
Aug 28, 2019 |
"Eight Defendants Charged with Running Two of the Largest Illegal Streaming Services in U.S." |
US DOJ |
Aug 27, 2019 |
"Former Star Google and Uber Engineer Charged With Theft of Trade Secrets" |
New York Times |
Aug 27, 2019 |
"New cadre of experts to overhaul DoD’s intellectual property policie" |
Federal News Network |
Aug 27, 2019 |
"Ex-Uber Engineer Levandowski Charged With Trade-Secret Theft" |
Wired |
Aug 27, 2019 |
"America's colleges and universities are aggressively addressing foreign threats" |
The Hill |
Aug 22, 2019 |
"New Warning As Hackers Use Google Drive To Bypass Corporate Security: Report" |
Forbes |
Aug 13, 2019 |
"Nation State Threats" |
Cyber Defense Magazine |
Aug 13, 2019 |
"Flamethrower row: Escobar's brother demands $100 mn from Elon Musk" |
Zee News |
Jul 12, 2019 |
"Russia’s MTS Signs 5G Deal With Chinese Telecom Giant Huawei, Reports Say" |
The Moscow Times |
Jun 6, 2019 |
"Leading fruit breeders form alliance to fight rising IP infringement" |
Fresh Fruit Portal |
Jun 6, 2019 |
"Two Louisiana Residents Indicted for Conspiracy to Steal Trade Secrets" |
US Dept. of Justice |
Jun 5, 2019 |
"Chinese Spies Stole NSA Cyber Weapons Before They Were Leaked by Shadow Brokers" |
CPO Magazine |
May 20, 2019 |
"Zillow Sues Rival Compass Alleging IP Theft And Breach Of Contract Over Its Artificial Intelligence, Machine Learning, And Cloud Computing Real Estate Technologies" |
JD Supra |
May 16, 2019 |
"A New Era of Warfare Begins as Cyberattack Leads to Airstrikes" |
Gizmodo |
May 6, 2019 |
"Chinese spies acquired NSA tools, used them to attack US allies: report" |
The Hill |
May 6, 2019 |
"Drug Lab Cyberattack Puts Spotlight on IP Theft Threat" |
Bank Info Security |
May 3, 2019 |
"Intellectual property theft by Chinese corporations take a toll, but so does homegrown poaching" |
EIN World News |
Apr 9, 2019 |
"Report: Hackers sneak into multiple networks once they get in" |
UPI |
Apr 2, 2019 |
"Weak links in the defense supply chain" |
FCW |
Mar 31, 2019 |
"NSA contractor arrested in biggest breach of U.S. secrets pleads guilty" |
Pulse (Nigreia) |
Mar 29, 2019 |
"Former NSA contractor admits stealing secrets in biggest security breach in US history" |
Washington Examiner |
Mar 28, 2019 |
"Plagiarism Policing and Profit" |
Inside Higher Ed |
Mar 8, 2019 |
"The Week in Tech: Chinese and Iranian Hackers Have Returned" |
New York Times |
Feb 22, 2019 |
"Russian hackers can breach an entire computer network in 18 minutes" |
Nine News (AU) |
Feb 22, 2019 |
"No more MOUs! USTR Lighthizer tweaks trade terminology after dispute with Trump" |
Reuters |
Feb 22, 2019 |
"Coons, Tillis to lead Senate Judiciary Subcommittee on Intellectual Property" |
Dover Post |
Feb 8, 2019 |
"Trump Tipped to Ban Chinese Equipment from U.S. Mobile Networks" |
Fortune |
Feb 8, 2019 |
"U.S. charges hackers, traders with stealing SEC filings" |
Reuters |
Jan 15, 2019 |
"SEC Charges Hackers Who Broke Into EDGAR Database And Traded On Stolen Secrets" |
Forbes |
Jan 15, 2019 |
"Huawei unveils cutting-edge ‘big data’ chip as China pushes for reduced reliance on technology imports" |
South China Morning Post |
Jan 8, 2019 |
"Game-maker turned poacher? Grand Theft Auto in legal twist" |
The Herald Scotland |
Jan 7, 2019 |
"The US Justice Department Is Just Getting Started Against State-Backed Hackers" |
The Diplomat |
Jan 3, 2019 |
2018 |
"Trump should find a trade victory with China at the G-20 — before it’s too late" |
EIN News |
Nov 23, 2018 |
"Trump’s Tightrope Trade Walk" |
Brown Political Review |
Nov 20, 2018 |
"War of words between Mike Pence, Xi Jinping at APEC summit: Here’s what they said" |
The County Weekly News |
Nov 19, 2018 |
"China calls for multilateralism, free trade system with EU" |
PressTV (IRAN) |
Oct 20, 2018 |
"California Man Sentenced For Copyright Infringement" |
U.S. Dept. of Justice |
Oct 15, 2018 |
"Apple stole Qualcomm chip secrets and gave them to Intel, Qualcomm claims" |
ARS Technica |
Sep 25, 2018 |
"Steps to Protect American IP from China" |
Industry Week |
Sep 19, 2018 |
"T-Mobile Database Breach Exposes 2 Million Customers' Data" |
Data Breach Today |
Aug 27, 2018 |
"T-Mobile Alerts 2.3 Million Customers of Data Breach Tied to Leaky API" |
Threat Post |
Aug 24, 2018 |
"GE trade secrets case raises cybersecurity questions" |
The Daily Gazette |
Aug 4, 2018 |
"Honeytrap spy stole secrets of new RAF jet" |
Daily Mail (UK) |
Aug 4, 2018 |
"Three members of notorious “FIN7” criminal ring in custody for attacking more than 100 companies" |
DataBreaches |
Aug 1, 2018 |
"Three members of notorious “FIN7” criminal ring in custody for attacking more than 100 companies" |
DataBreaches |
Aug 1, 2018 |
"2017 a ‘watershed year’ in IP theft" |
IP Pro |
Aug 1, 2018 |
"US DoD prepares software “Do Not Buy” list" |
Enterprise Times |
Jul 31, 2018 |
"One Hotel in Silicon Valley is a 'honeypot hotbed for Russian and Eastern European escorts'" |
EIN News |
Jul 29, 2018 |
"Human Longevity sues J. Craig Venter Institute, alleging theft of trade secrets" |
The Virginia Pilot |
Jul 23, 2018 |
"NSA leader creates task force to fight Russian cyberattacks" |
Engadget |
Jul 22, 2018 |
"Symantec Unveils New Technology to Counter Cyber Attacks" |
Nasdaq |
Jul 18, 2018 |
"Is this the last chance to save the WTO?" |
EIN News |
Jul 1, 2018 |
"Asian nations form united front as Donald Trump goes it alone on trade" |
South China Morning Post |
Jul 1, 2018 |
"New Types of Section 337 Investigations at the International Trade Commission" |
IP Litigation Current |
Jul 1, 2018 |
"These 7 nation-state backed hacks have put us on the brink of a global cyber war" |
Security Boulevard |
Jun 28, 2018 |
"Tesla Received Tip That Former Employee Was Going to 'Shoot the Place Up'" |
The Street |
Jun 21, 2018 |
"Tesla sues former employee for $1 million over trade secret theft" |
Techcrunch |
Jun 20, 2018 |
"Tesla′s Elon Musk Has Warned Staff About an Unnamed Employee Who Has Conducted 'Extensive and Damaging Sabotage.'
" |
EIN News |
Jun 19, 2018 |
"Ex-CIA employee charged with leaking 'Vault 7' hacking tools to Wikileaks" |
The Hacker News |
Jun 18, 2018 |
"Joshua Adam Schulte Charged with the Unauthorized Disclosure of Classified Information and Other Offenses Relating to the Theft of Classified Material from the Central Intelligence Agency" |
DOJ |
Jun 18, 2018 |
"Fitbit Employees Charged With Having Stolen Trade Secrets" |
CBS |
Jun 15, 2018 |
"EU Claims Kaspersky Lab Software 'Confirmed as Malicious'" |
Bank Info Security |
Jun 15, 2018 |
"FBI announces arrest of 74 email fraudsters" |
ZD Net |
Jun 11, 2018 |
"Senators aim to call Facebook, Google, Twitter to hearings" |
The Gazette |
Jun 8, 2018 |
"A War Against Hackers: U.S. Is Focusing To Encounter Cyberthreat" |
NewsGram |
Jun 3, 2018 |
"Homeland Security detected signs of cell phone spying in Washington DC" |
The Verge |
Jun 3, 2018 |
"Trump causing chaos" |
Princeton George Citizen |
Jun 1, 2018 |
"Education emerges as prime target of cybercriminals" |
CIO |
May 28, 2018 |
"Koreas’ market opening must accompany protection of industrial property rights" |
EIN News |
May 27, 2018 |
"USTR Releases 2018 Special 301 Report on Intellectual Property Rights" |
Global Trade Magazine |
May 4, 2018 |
"US identifies IP infringing countries" |
Advanced Television |
May 1, 2018 |
"Robert Reich: While China Picks Winners, Trump Picks Losers" |
YubaNet |
Apr 16, 2018 |
"Aviation Industry May Be Vulnerable To Cyberattack Through Its Global Supply Chain" |
Forbes |
Apr 11, 2018 |
"GOP senator rips Trump tariffs: Don't use 'real people' as collateral damage" |
The Hill |
Apr 5, 2018 |
"Co-Owner & CEO of Computer Company Sentenced for Conspiring to Steal Intellectual Property" |
US DOJ |
Apr 5, 2018 |
"Trade wars, Trump tariffs and protectionism explained" |
EIN News |
Mar 23, 2018 |
"Trump grants tariff exemptions for EU and others on steel and aluminum" |
CNN |
Mar 22, 2018 |
"What’s Intellectual Property and Does China Steal It?" |
Bloomberg |
Mar 22, 2018 |
"U.N.: China IP filings soar, hard to judge if it plays fair" |
Asahi Shimbun |
Mar 22, 2018 |
"Cyber-Enabled Economic Warfare: Assessing US Strategy" |
The Diplomat |
Mar 21, 2018 |
"U.S Startup NuCurrent Sues Samsung For Intellectual Property Theft Relating to Wireless Charging" |
Gizmo China |
Mar 17, 2018 |
"Judge eases feds' case against NSA hoarder" |
Politico |
Mar 17, 2018 |
"Amrock ordered to pay $706 million for stealing trade secrets from HouseCanary" |
Housing Wire |
Mar 15, 2018 |
"Cyber WAR: US and Russian hackers UNCOVERED after leaving EVIDENCE on a Chinese server" |
Express (UK) |
Mar 10, 2018 |
"Google's quantum computing breakthrough: Our new chip might soon outperform a supercomputer" |
ZDNet |
Mar 9, 2018 |
"What is AndroRAT? New Android malware comes with extensive spying and data-stealing abilities" |
Brinkwire |
Feb 17, 2018 |
"'Olympic Destroyer' Malware Hit Pyeongchang Ahead Of Opening Ceremony" |
Wired |
Feb 12, 2018 |
"Cyberattack Aimed to Disrupt Opening of Winter Olympics" |
Information Week |
Feb 12, 2018 |
"A raucous Google-Uber fight is finally heading to trial" |
WPXI.com |
Feb 4, 2018 |
"Rebuild Manufacturing: The Key to American Prosperity" |
Industry Week |
Feb 2, 2018 |
"Exclusive: Aspen Institute launches cybersecurity initiative" |
AXIOS |
Jan 31, 2018 |
"China goes on tech-hiring binge and wages soar, closing gap with Silicon Valley" |
Reuters |
Jan 24, 2018 |
"Did Trump just start a trade war with China?" |
CNN |
Jan 23, 2018 |
"Factbox: Trump administration prepares for raft of trade decisions" |
Reuters |
Jan 23, 2018 |
"China Sends Top Economic Adviser to Davos as Trade War Concerns Grow" |
VOA |
Jan 23, 2018 |
"Baltimore CBP seizes nearly 3,000 counterfeit stainless steel sinks" |
Homeland Preparedness News |
Jan 23, 2018 |
"Chinese Hacking Against Taiwan: A Blessing for the United States?" |
The Diplomat |
Jan 23, 2018 |
"China, South Korea Protest US Solar, Washing Machine Tariffs" |
London South East |
Jan 23, 2018 |
"China says United States is real threat to global trade" |
Times of Oman |
Jan 22, 2018 |
"Businesses Report All-Time High Levels Of Fraud, Cyber, And Security Incidents During 2017" |
Business Insider |
Jan 22, 2018 |
"Meltdown and Spectre: Here’s what Intel, Apple, Microsoft, others are doing about it" |
ARS Technica |
Jan 5, 2018 |
"What You Need to Do Because of Flaws in Computer Chips" |
New York Times |
Jan 4, 2018 |
"Understanding Those Alarming Computer Chip Security Holes: 'Meltdown' and 'Spectre'" |
Fortune |
Jan 4, 2018 |
"Ex-U.S. NSA contractor to plead guilty to massive theft of secret data" |
Reuters |
Jan 4, 2018 |
"Intel Chip Flaw" |
Information Security Buzz |
Jan 4, 2018 |
"Researchers Discover Two Major Flaws in the World’s Computers" |
New York Times |
Jan 3, 2018 |
"Ex-N.S.A. Worker Accused of Stealing Trove of Secrets Offers to Plead Guilty" |
New York Times |
Jan 3, 2018 |
2017 |
"A Cute Toy Just Brought a Hacker Into Your Home" |
New York Times |
Dec 21, 2017 |
"White House May Restrict Some Foreign Students" |
Inside Higher Ed |
Dec 19, 2017 |
"Every Single American Household Exposed in Massive Leak" |
Info Security |
Dec 19, 2017 |
"Letter From Ex-Uber Employee's Lawyer Describes Targeted Trade Secret Theft, Discovery Evasion" |
The Recorder |
Dec 15, 2017 |
"Ex-NSA Hackers Worry China And Russia Will Try to Arrest Them" |
Motherboard |
Dec 1, 2017 |
"Industrial spying helped East Germany narrow economic gap" |
Journalist's Resource |
Nov 20, 2017 |
"An Update on U.S.-China Cybersecurity Relations" |
Council on Foreign Relations |
Nov 17, 2017 |
"Exclusive: This Cybersecurity Startup Raised $25M to Expand Dark Web Intel Service" |
Fortune |
Oct 31, 2017 |
"Australian unis helping China's military surpass US" |
The Courier (AU) |
Oct 30, 2017 |
"Trump’s China Trip to Broker Billions of Dollars in Energy Deals" |
Bloomberg |
Oct 27, 2017 |
"Ottawa pushed Bombardier to partner with Airbus after Chinese merger was considered " |
CBC News |
Oct 25, 2017 |
"https://teiss.co.uk/news/battleye-purges-cheaters-hackers-pubg/" |
TEISS |
Oct 23, 2017 |
"Judge Koh Grants Samsung New Damages Trial in Apple iPhone Patent Infringement Trial" |
Mac Observer |
Oct 23, 2017 |
"Canada's Electronic Spy Agency Makes Its Malware Analysis Tool Public" |
CircleID |
Oct 20, 2017 |
"Google's efforts to highlight non-secure websites is paying off" |
TechSpot |
Oct 20, 2017 |
"What is Hacker's Door? Old sophisticated Chinese Trojan resurfaces after more than a decade" |
International Business Times |
Oct 18, 2017 |
"Mysterious cyber espionage campaign uses 'torpedo' lure to trick you into downloading malware" |
ZD Net |
Oct 18, 2017 |
"Internal Actors -- Their Growth, Their Threat" |
Forbes |
Oct 17, 2017 |
"You have almost certainly been hacked" |
The Week |
Oct 15, 2017 |
"Why it's hard to trust the U.S. on Russia's alleged Kaspersky espionage" |
Yahoo Finance |
Oct 14, 2017 |
"Trump’s Foreign Trade Policy: Opening a Pandora’s Box?" |
The Market Mogul |
Oct 14, 2017 |
"What is a fileless attack? How hackers invade systems without installing software" |
IT World |
Oct 9, 2017 |
"Hacker Hides Backdoor Inside Fake WordPress Security Plugin" |
Bleeping Computer |
Sep 29, 2017 |
"What Is a 'Supply Chain Attack?'" |
Motherboard |
Sep 29, 2017 |
"CCleaner malware might have been designed to steal trade secrets" |
Digital Journal |
Sep 22, 2017 |
"The Electoral College Is a National Security Threat" |
Politico |
Sep 20, 2017 |
"Hackers hid malware in official CCleaner app and millions are at risk" |
Mashable |
Sep 18, 2017 |
"Institutional Theft: When Stolen Intellectual Property Is Your Business Model" |
Heartland Institute |
Sep 9, 2017 |
"Hackers target research from UK universities" |
The Week |
Sep 5, 2017 |
"Donald Trump's cybersecurity advisers resign en masse, accuse US president of ignoring national security" |
FirstPost |
Aug 27, 2017 |
"Trump elevates U.S. Cyber Command, vows ‘increased resolve’ against threats" |
Matthew Aid |
Aug 18, 2017 |
"CYBERCOM: Finally A Real Command, But Still Dual Hatted" |
Breaking Defense |
Aug 18, 2017 |
"Trump lifts Cyber Command status to boost cyber defense" |
Reuters |
Aug 18, 2017 |
"China regains leverage on US as top debtholder" |
Nikkei Asina Review |
Aug 17, 2017 |
"Critical Infrastructure At Risk: Hackers Sell Network Access On Dark Web" |
International Business Times |
Aug 15, 2017 |
"Four People Arrested And Charged In India For Game Of Thrones Priracy" |
Segment Next |
Aug 15, 2017 |
"China’s Quantum Satellite Proves its Power to Transmit Unbreakable Code" |
Wall Street Pit |
Aug 13, 2017 |
"Dark web marketplace allegedly selling access to 'power plants, hospitals and airlines'" |
International Business Times |
Jul 28, 2017 |
"Two Indian Nationals Arrested on Suspicion of Attempted Theft of Sarine’s Intellectual Property" |
Internet Stones |
Jul 27, 2017 |
"Who are the Shadow Brokers? Signs point to an intelligence insider" |
TechTarget |
Jul 27, 2017 |
"Germany warns of nation-state cyber espionage threat" |
CSO Online |
Jul 27, 2017 |
"Asian business fear former employees, consultants are most likely to steal secrets" |
Networks Asia |
Jul 26, 2017 |
"Waymo Puts Uber Lawyers in Hot Seat Over Trade-Secret Theft" |
Bloomberg |
Jul 26, 2017 |
"Experts: Software theft shows threat of mercenary hackers" |
ABC News |
Jul 26, 2017 |
"U.S. treads water on cyber policy as destructive attacks mount" |
Reuters |
Jul 26, 2017 |
"US to create independent military cyber command" |
Ottawa Citizen |
Jul 17, 2017 |
"GCHQ Says Hackers Have Likely Compromised UK Energy Sector Targets" |
Vice.com |
Jul 17, 2017 |
"OmniRAT-Based Android Backdoor Emerges" |
Security Week |
Jul 17, 2017 |
"A Ukrainian Cyberattack Shows How Dangerous Software Backdoors Can Be" |
Future Tense |
Jul 12, 2017 |
"Kaspersky axed from government-wide contracts" |
FCW |
Jul 12, 2017 |
"Cybersecurity firm Kaspersky fires back at critics" |
ITBusiness (CA) |
Jul 12, 2017 |
"Trump administration limits government use of Kaspersky Lab software" |
Reuters |
Jul 11, 2017 |
"Hacker "Incursio" Gets Two Years in Prison for Hacking CIA, DHS, DOJ, and FBI" |
Information Security Newspaper |
Jul 1, 2017 |
"Time to Stand Up, Protect American Invention from So-Called ‘Trading Partners’" |
CNS News |
Jun 30, 2017 |
"Hackers breached a US nuclear power plant's network, and it could be a 'big danger'" |
Business Insider |
Jun 29, 2017 |
"Issa seems to believe patents are an entitlement, not a property right" |
IP Watchdog |
Jun 28, 2017 |
"Turns Out New Petya is Not a Ransomware, It's a Destructive Wiper Malware" |
The Hacker News |
Jun 28, 2017 |
"The mysteries of Petya: How a global ransomware outbreak unfolded from Ukraine" |
International Business Times |
Jun 28, 2017 |
"Petya Or Not? Global Ransomware Outbreak Hits Europe's Industrial Sector, Thousands More" |
Information Week |
Jun 27, 2017 |
"Hacking in Qatar Highlights a Shift Toward Espionage-for-Hire" |
New York Times |
Jun 8, 2017 |
"Inside the mind of a hacker: Culprit behind leak of 25,000 plastic surgery photos opens up" |
International Business Times |
Jun 2, 2017 |
"Shadowbrokers Put Price on Monthly Zero Day Leaks" |
Threat Post |
May 30, 2017 |
"Uber Just Fired The Engineer That Google Accused Of Theft" |
Vanity Fair |
May 30, 2017 |
"Senate judiciary committee holds nomination hearing for Vishal J. Amin to serve as IPEC" |
IP Watchdog |
May 30, 2017 |
"
NSA tools hacking group Shadow Brokers starts up monthly security subscription service" |
Computing UK |
May 30, 2017 |
"Hackers Hide Cyberattacks in Social Media Posts" |
New York Times |
May 28, 2017 |
"Congressman files new 'hack back' bill" |
FCW |
May 26, 2017 |
"AI, IoT and the end of Moore's Law add to US national security worries" |
ZD Net |
May 11, 2017 |
"Trump signs executive order on cybersecurity, White House now runs the show" |
The Register |
May 11, 2017 |
"Ten-X Wins Settlement from CREXi in Trade Secret Theft Lawsuit" |
PR Newswire |
May 10, 2017 |
"Trade Secret Cases Surge as Race for New Tech, Top Talent Heats Up" |
Bloomberg |
May 10, 2017 |
"Microsoft’s recent success in blocking zero-day attacks is eerily good" |
ARS Technica UK |
May 10, 2017 |
"Trump's cybersecurity executive order: 4 things you need to know" |
TechRepublic |
May 10, 2017 |
"China, India named and shamed on lax IP" |
Securing Industry |
May 2, 2017 |
"IBM Supply Chain Breached as Storwize USBs Ship With Malware" |
Security Week |
May 1, 2017 |
"USTR Releases 2017 Special 301 Report on Intellectual Property Rights" |
Office of United States Trade Representative |
Apr 28, 2017 |
"Malicious emails at five-year high" |
Australian Business Review |
Apr 28, 2017 |
"Report: Cyberespionage now most popular form of cybercrime in many industries" |
Tech Republic |
Apr 27, 2017 |
"Email access: cyber espionage and ransomware attacks are on the increase - Verizon" |
Information Age |
Apr 27, 2017 |
"Cyber attacks ten years on: from disruption to disinformation" |
The Conversation |
Apr 26, 2017 |
"Just Ivanka: As her fame skyrockets, Trump daughter launches legal battle to protect her first name" |
National Post |
Apr 21, 2017 |
"Hackers are after your intellectual property, not only your money" |
National Cyber Security |
Apr 20, 2017 |
"Tesla settles lawsuit with former head of its Autopilot system
Read more: http://www.nasdaq.com/article/tesla-settles-lawsuit-with-former-head-of-its-autopilot-system-20170419-01376#ixzz4fHSjkTER" |
NASDAQ |
Apr 19, 2017 |
"Where Trump Goes Next on Trade" |
IPP Review |
Apr 19, 2017 |
"Five reasons to worry about the ShadowBrokers hack" |
The Hill |
Apr 18, 2017 |
"Brexit: foreign states may have interfered in vote, report says" |
The Guardian |
Apr 12, 2017 |
"Observations on China’s New International Cyberspace Cooperation Strategy" |
Lawfare |
Apr 7, 2017 |
"IACC Welcomes Presidential Executive Order to Enhance Intellectual Property Enforcement" |
PR Newswire |
Apr 3, 2017 |
"“Hackers-For-Hire” Tried To Swipe Baidu’s Driverless Car Tech" |
PYMNTS |
Mar 23, 2017 |
"Hackers Reportedly Tried to Steal Self-Driving Car Secrets From Chinese Web Company Baidu" |
Slate |
Mar 21, 2017 |
"Hackers took down Adobe Reader, Apple Safari, Microsoft Edge, and Ubuntu Linux PWN2OWN 2017" |
Threatpost |
Mar 16, 2017 |
"Trump taps NSA hacker Rob Joyce for National Security Council cyber role" |
Matthew Aid |
Mar 15, 2017 |
"Wide Swath of Corporate America Exposed in D&B Leak" |
Info Security Magazine |
Mar 13, 2017 |
"Google has asked a judge to freeze Uber's use of self-driving-car tech" |
Business Insider |
Mar 10, 2017 |
"Pentagon: Russia, China Able to Launch Catastrophic Cyber Attacks on U.S. Infrastructure for Next 10 Years" |
Free Beacon |
Mar 10, 2017 |
"Fabricate and NOT stitch your security for today's hostile threat landscape" |
Networks Asia |
Mar 10, 2017 |
"China Slams US For ‘Stealing Secrets’ After Hacking America For Years" |
The Daily Caller |
Mar 9, 2017 |
"CIA contractors likely source of latest WikiLeaks release, say US officials" |
Christian Science Monitor |
Mar 8, 2017 |
"Wikileaks' CIA dump looks like a dud for now" |
Chicago Tribune |
Mar 8, 2017 |
"Wikileaks' CIA hacking revelations: Cyber security experts respond with a collective 'meh'" |
Mirror (UK) |
Mar 8, 2017 |
"What WikiLeaks’ massive CIA leak tells us about cybersecurity" |
Sophos |
Mar 8, 2017 |
"Connectivity
The Wikileaks CIA Stash May Prove Interesting, But Not Necessarily for the Hacks" |
Technology Review |
Mar 7, 2017 |
"Observations on China’s New International Cyberspace Cooperation Strategy" |
Lawfare Blog |
Mar 7, 2017 |
"Does the Google-Uber Lawsuit Hold the Key to Self-driving Cars?" |
Wharton |
Mar 2, 2017 |
"Intelligence community seeks answers in aftermath of Harold Martin case" |
Cyberscoop |
Feb 28, 2017 |
"Xiaomi, Huawei, Oppo turn to cutting-edge technology to take on global giants" |
LiveMint |
Feb 28, 2017 |
"Google lawsuit against Uber could mean multi-billion dollar settlement and possibly jail for some" |
NextBigFuture |
Feb 28, 2017 |
"Uber accused of 'calculated theft' of Google's self-driving car technology" |
The Guardian |
Feb 23, 2017 |
"Clash Of The Autonomous Titans: Alphabet's Waymo Sues Uber Claiming Tech Theft" |
Forbes |
Feb 23, 2017 |
"Framework and Terminology for Understanding Cyber-Enabled Economic Warfare" |
Foundation for Defense of Democracies |
Feb 22, 2017 |
"US Government Hacked With Its Own Spyware?" |
National Cyber Security Ventures |
Feb 20, 2017 |
"Roots of innovation: 45 countries ranked in global IP index" |
Next Silicon Valley |
Feb 16, 2017 |
"A Tale of Two Trading Partners" |
Global Trade Magazine |
Feb 16, 2017 |
"CyberX Discovers Operation BugDrop: A Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations" |
Yahoo Finance |
Feb 16, 2017 |
"‘No doubt’ Russians tried to undermine US election" |
Irish Times |
Feb 14, 2017 |
"Ex-NSA contractor pleads not guilty to spying charges in federal court" |
Matthew Aid |
Feb 14, 2017 |
"Cyber Spies: In-House Legal Fights Back Against Cyberespionage" |
Legaltech News |
Feb 9, 2017 |
"Former NSA contractor may have stolen 75% of TAO’s elite hacking tools" |
ARS Technica |
Feb 6, 2017 |
"Trump Delays Signing Cyber Order to Focus on Immigration Suit" |
Singapore Hardware Zone |
Feb 2, 2017 |
"Shocking details as Russian spies charged with treason" |
CBS NEWS |
Feb 1, 2017 |
"Tesla News This Week Includes Theft, Intrigue, and Politics" |
TorqueNews |
Jan 31, 2017 |
"Trump hits control-Z on cybersecurity order: No reason given for delay" |
The Register |
Jan 31, 2017 |
"Twist Bioscience Files Response to Agilent Technologies Lawsuit" |
Genomeweb |
Jan 30, 2017 |
"Trump trade war with China - the implications" |
The Financial Express |
Jan 28, 2017 |
"Trump talks tough on China’s hacking. Why not Russia’s?" |
Politico |
Jan 28, 2017 |
"Global IP Protection Group Names New CEO" |
Market Wired |
Jan 25, 2017 |
"NY Appeals Court Decision Signals that Cybersecurity Whistleblowing Implicates Corporate Theft" |
National Law Review |
Jan 25, 2017 |
"Ex-Goldman Sachs programmer found guilty, again, of source code theft" |
ARS Technica |
Jan 24, 2017 |
"What Donald Trump’s appointments reveal about his incoming administration" |
The Economist |
Jan 21, 2017 |
"Alibaba's Ma makes star turn as Davos pivots to China" |
Channel News Asia |
Jan 20, 2017 |
"Where Will The Cards Fall When Trump Reshuffles The Deck On IP Policy?" |
Forbes |
Jan 20, 2017 |
"Trump team challenge: Hardening critical infrastructure" |
Asia Times |
Jan 20, 2017 |
"Jack Ma says the US wasted all the money it made on globalization in fighting costly wars" |
Shanghaiist |
Jan 19, 2017 |
"Thomas Wright: The dangerous side to the art of the deal" |
Nikkei Asian Review |
Jan 19, 2017 |
"Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace" |
The Diplomat |
Jan 19, 2017 |
"Just Discovered Fruitfly Malware Uses Pre-OS X Code" |
Mac Observer |
Jan 18, 2017 |
"Four Cyber Trends To Watch in 2017" |
Gov Tech Works |
Jan 18, 2017 |
"Zuckerberg takes the stand in Oculus trade secrets trial" |
The Verge |
Jan 17, 2017 |
"
Office of United States Trade Representative : USTR Releases 2016 Report to Congress on China’s WTO Compliance" |
USTR |
Jan 17, 2017 |
"Top 5 State-Sponsored Hacking Collectives" |
The Merkle |
Jan 10, 2017 |
"US losing dominance in cyber war" |
Centre Daily Times |
Jan 10, 2017 |
"Massive cyber attack affecting 500 industrial companies in 50 countries, says Kaspersky" |
Roborics & Automation News |
Jan 5, 2017 |
"How Will Criminal Trade Secret Prosecutions Fare Under President Trump?" |
JD Supra |
Jan 5, 2017 |
"Cyberwar for Sale" |
New York Times |
Jan 4, 2017 |
"Wilbur Ross’ Chinese love affair" |
Politico |
Jan 2, 2017 |
2016 |
"Yahoo under scrutiny after latest hack, Verizon seeks new deal terms" |
4-Traders |
Dec 15, 2016 |
"Industry welcomes US's 'robust' plan on IP infringement" |
Securing Industry |
Dec 14, 2016 |
"U.S. files first charges in generic drug price-fixing probe" |
Reuters |
Dec 14, 2016 |
"France launches first cyber-warfare unit" |
LangueDocLiving |
Dec 13, 2016 |
"How A Single Typo Led To The Unraveling Of Hillary Clinton’s Campaign" |
Huffington Post |
Dec 13, 2016 |
"The Failed Trans-Pacific Partnership: What It Might Have Meant To Biotech and Pharma" |
JD Supra |
Dec 12, 2016 |
"Executive report lays blueprint for IP enforcement" |
US DHS ICE |
Dec 12, 2016 |
"Real deal: Hackers steal steelmaker trade secrets" |
The Register |
Dec 8, 2016 |
"ThyssenKrupp’s Trade Secrets Targeted in ‘Massive’ Cyber Attack" |
Insurance Journal |
Dec 8, 2016 |
"Data Theft At ThyssenKrupp Highlights Industrial Espionage Threat" |
InformationWeek |
Dec 8, 2016 |
"China-championed Asia trade pact should wrap up fast, ADB says" |
Malaymail Online |
Dec 6, 2016 |
"Cyber Attacks on U.S. Companies in 2016" |
Heritage Foundation |
Dec 2, 2016 |
"Cyber Attacks on U.S. Companies in 2016" |
Heritage Foundation |
Dec 2, 2016 |
"About 15,000 illegal websites seized and 48,000 erroneous ecommerce links removed over the past year" |
Voice Online |
Nov 28, 2016 |
"How a Grad Student Found Spyware that Could Control Anybody's iPhone From Anywhere in the World" |
Vanity Fair |
Nov 28, 2016 |
"Fake goods pose real threat" |
The Monitor |
Nov 25, 2016 |
"Symantec: Hackers Are Becoming Expert IP Hunting Professionals" |
Silicon (UK) |
Nov 15, 2016 |
"Two Men Charged With Stealing Defense Contractor's Trade Secrets" |
Hartford Courant |
Nov 14, 2016 |
"Happenstance and enemy action" |
The Economist |
Nov 12, 2016 |
"Russian 'Dukes' of Hackers Pounce on Trump Win" |
Krebs on Security |
Nov 10, 2016 |
"7 Shocking Statistics on Small Business Data Theft" |
Business 2 Community |
Nov 9, 2016 |
"'It's heart-wrenching': Independent designers face a flood of knock-off products" |
Globe and Mail (UK) |
Nov 7, 2016 |
"The Government's "Jaws" & the Threat to Intellectual Property & Trade Secrets" |
Fox News |
Nov 4, 2016 |
"Windows computers vulnerable to attack tied to DNC hackers, Microsoft warns" |
Washington Post |
Nov 2, 2016 |
"SPECIAL REPORT-John Brennan's attempt to lead the CIA into the age of cyberwar" |
Reuters |
Nov 2, 2016 |
"UK Government launches new National Cyber Security Strategy today" |
SC Magazine |
Nov 1, 2016 |
"NSA security gaps revealed after suspect arrested in breach" |
Seattle Times |
Oct 28, 2016 |
"Strengthening our cyber defences: A person, a bank, a country - it's a free-for-all" |
Straits Times |
Oct 23, 2016 |
"Check out the Maps of the DDos Attacks! See Right Where the Hackers Hit!" |
OSINT |
Oct 22, 2016 |
"How Podesta became a cybersecurity poster child" |
Politico |
Oct 21, 2016 |
"Hacking vendetta seen in attack on East Coast web host" |
Chicago Tribune |
Oct 21, 2016 |
"Pakistan Government Officials Targeted with RATs in Cyber-Espionage Campaign" |
Cyber Security Review |
Oct 21, 2016 |
"Former Secretary of Defense: 'I have wasted more money on IT than anyone in history'" |
ZD Net |
Oct 19, 2016 |
"Which country has the best hackers: Russia or China?" |
InfoWorld |
Oct 18, 2016 |
"Nation-State Hackers Hit Japanese Nuclear Facility" |
Info Security Magazine |
Oct 18, 2016 |
"A New Spy Scandal Exposes the Corruption of Privatized Intelligence" |
The Nation |
Oct 14, 2016 |
"6 US Soldiers, 2 Civilians Charged in Theft of Sensitive Army Gear" |
VOA News |
Oct 8, 2016 |
"NSA contractor arrested in alleged theft of classified material" |
The Hill |
Oct 8, 2016 |
"NSA contractor charged with stealing secret data" |
Reuters |
Oct 6, 2016 |
"FBI Searching for Suspect in Theft of Intellectual Property" |
Houston Patch |
Oct 4, 2016 |
"Houston Energy Company Targeted in Unique Theft" |
ABC 13 |
Oct 4, 2016 |
"Breaking News: Yahoo Secretly Copied Customers Emails for US Intelligence Community" |
Matthew Aid |
Oct 4, 2016 |
"Quadsys Five walk free after hacking rival company" |
The Register |
Sep 30, 2016 |
"The Internet of Things Goes Rogue" |
Technology Review |
Sep 30, 2016 |
"Yahoo Says Hackers Stole Data on 500 Million Users in 2014" |
New York Times |
Sep 23, 2016 |
"In Yahoo Breach, Hackers May Seek Intelligence, Not Riches" |
ABC News |
Sep 23, 2016 |
"Yahoo's future in doubt as BT and Sky users are hauled into biggest ever hack" |
The Guardian |
Sep 23, 2016 |
"Weapon systems will remain vulnerable to hackers for decades, Air Forces Cyber Commander says" |
FedScoop |
Sep 23, 2016 |
"It's strange Yahoo took 2 years to discover a data breach, security experts say" |
LA Times |
Sep 23, 2016 |
"Big Security Bug Affects Hundreds Of Thousands Of Cisco Devices" |
Fortune |
Sep 22, 2016 |
"Trade Secrets: Changes In The Law On Protection Of Trade Secrets In The United States And European Union" |
JD Supra |
Sep 22, 2016 |
"Yahoo is expected to confirm massive data breach, impacting hundreds of millions of users" |
CNBC |
Sep 22, 2016 |
"Malware Evades Detection With Novel Technique" |
Threatpost |
Sep 22, 2016 |
"The Cyber Cold War: the Newest Front in Political & Corporate Espionage" |
Info Security Magazine |
Sep 21, 2016 |
"GCHQ plans to protect the country with a national firewall" |
Security Affairs |
Sep 18, 2016 |
"Congressional Report Slams OPM on Data Breach" |
Krebs on Security |
Sep 16, 2016 |
"The Threat Landscape as Seen Through FireEye's Eyes" |
Cyberwire |
Sep 14, 2016 |
"Nation's first CISO brings vision, strategy to cybersecurity mission" |
Federal Times |
Sep 14, 2016 |
"Data is the currency of the cyber world" |
Tech Central |
Sep 13, 2016 |
"Russians and Chinese Hacking U.S. “All The Time,” Spy Director Claims" |
District Sentinel |
Sep 7, 2016 |
"Cyber commander: U.S. not drawing 'red lines' in cyberspace" |
Fed Scoop |
Sep 7, 2016 |
"Congressional Probe Says OPM Hackers Arrived in 2012 and We Will Never Know What They Took" |
Nextgov |
Sep 7, 2016 |
"Fact Sheet: The 2016 G-20 Summit in Hangzhou, China" |
4 Traders |
Sep 5, 2016 |
"Huawei tries again in Australia" |
Telecom Asia |
Sep 5, 2016 |
"Former electronic spy chief urges Ottawa to prepare for ‘cyber war’" |
Cyber Attacks Squad News |
Sep 1, 2016 |
"Annual Cybercrime Costs to Double to $6 Trillion by 2021" |
Info Security |
Sep 1, 2016 |
"'Guccifer' Hacker Gets 52 Months in US Prison" |
VOA |
Sep 1, 2016 |
"Clinton: Treat cyberattacks 'like any other attack'" |
The Hill |
Aug 31, 2016 |
"Microsoft joining China's cybersecurity council paves the way for better relations between the two largest internet markets" |
Business Insider |
Aug 29, 2016 |
"FBI: Election Systems Hacked in 2 States" |
Newser |
Aug 29, 2016 |
"Will The Election Be Hacked: FBI Finds "Foreigners" Breached Two State Election Databases" |
Zero Hedge |
Aug 29, 2016 |
"India and the Scorpene Leak: Untangling the Knots" |
The Diplomat |
Aug 27, 2016 |
"China Is Fueling a Submarine Arms Race in the Asia-Pacific" |
Foreign Policy |
Aug 26, 2016 |
"Patchwork cyberespionage group expands targets from governments to wide range of industries" |
Symantec |
Aug 25, 2016 |
"This Government Agency’s Cover-Up May Have Hindered US Cybersecurity" |
Daily Signal |
Aug 25, 2016 |
"Fear or greed: what drives the response to Chinese investment in Australia?" |
WA Today (AU) |
Aug 19, 2016 |
"Here's why the NSA won't release a 'smoking gun' implicating Russia in these major hacks" |
Business Insider |
Aug 19, 2016 |
"Evidence mounts that NSA computer code was stolen" |
National Cybersecurity |
Aug 18, 2016 |
"Clinton Foundation announces it will stop accepting foreign and corporate donations if Hillary Clinton is elected President" |
NY Daily News |
Aug 18, 2016 |
"Sage Employee Arrested At Heathrow Airport" |
Tech Week Europe |
Aug 18, 2016 |
"Opinion: Why political campaigns need chief information security officers" |
Christian Science Monitor |
Aug 17, 2016 |
"China's Launch of Quantum Satellite Major Step in Space Race" |
Popular Mechanics |
Aug 17, 2016 |
"Organizations in 30 Countries Targeted in "Operation Ghoul"" |
Security Week |
Aug 17, 2016 |
"Did NSA Get Hacked?" |
Nextgov |
Aug 16, 2016 |
"No One Wants To Buy Those Stolen NSA-Linked 'Cyberweapons'" |
Wired |
Aug 16, 2016 |
"Confirmed: hacking tool leak came from “omnipotent” NSA-tied group" |
ARS Technica |
Aug 16, 2016 |
"Did 'Shadow Brokers' steal NSA cyberweapons?" |
Christian Science Monitor |
Aug 16, 2016 |
"New Information Stealing Trojan Steals and Uploads Corporate Files" |
Bleeping Computer |
Aug 12, 2016 |
"U.S. Intelligence to Help Companies Avert Supply-Chain Hacking" |
Bloomberg |
Aug 10, 2016 |
"America Finally Takes on an IP Criminal" |
Economics21 |
Aug 9, 2016 |
"U.S. cyber arsenal is smaller than imagined — on purpose" |
The Hill |
Aug 9, 2016 |
"The Hacking Teams: who they are, what they want, and how they hack" |
Tech Republic |
Aug 9, 2016 |
"ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms" |
SecureList |
Aug 8, 2016 |
"Cybergate: 5 major political cyber attacks" |
Computer Business Review |
Aug 8, 2016 |
"Symantec Discovers Strider, A New CyberEspionage Group" |
Information Week |
Aug 8, 2016 |
"Guarding The Grid" |
Information Week |
Aug 8, 2016 |
"Precision Discovery, Inc. Announces ERA, a Tool to Protect Valuable Intellectual Property" |
PR Newswire |
Aug 3, 2016 |
"Russian hackers keep business booming for Irvine cybersecurity firm" |
LA Times |
Aug 2, 2016 |
"DIA cyber officer profiles global threat actors" |
C4ISRNET |
Aug 1, 2016 |
"Analyzing Clinton's Positions on Cybersecurity, Privacy" |
Bank Info Security |
Jul 25, 2016 |
"Top Republican lawmaker resigns suddenly citing "cyber security issues"" |
Daily Herald |
Jul 24, 2016 |
"These are the most feared hacker groups in the world" |
Business Insider |
Jul 22, 2016 |
"Majority Of Companies Say Trade Secrets Likely Compromised" |
Information Week |
Jul 21, 2016 |
"Predicting heightened malicious cyber activity, the old fashioned way" |
The Hill |
Jul 20, 2016 |
"IP3C Launched from Europe to Stop Online Intellectual Property Abuse" |
Spam Fighter |
Jul 20, 2016 |
"Notorious Hacker ‘Phineas Fisher’ Says He Hacked The Turkish Government" |
Motherboard |
Jul 20, 2016 |
"GE, Huawei to partner on Internet of Things
" |
USA Today |
Jul 20, 2016 |
"Hacker Selling Entire US Voters’ Registration Records on Dark Net" |
Hack Read |
Jul 18, 2016 |
"The EU GDPR: The clock is ticking for UK businesses" |
IT Pro Portal |
Jul 17, 2016 |
"Canadian Man Behind Popular 'Orcus RAT'" |
Krebs on Security |
Jul 16, 2016 |
"Nation-backed malware that infected energy firm is 1 of 2016’s sneakiest" |
ARS Technica |
Jul 12, 2016 |
"Stealthy cyberespionage malware targets energy companies" |
CSO Online |
Jul 12, 2016 |
"USAF Wants Cyber-Hard Supply Chain For B-21" |
Aviation Week |
Jul 12, 2016 |
"U.S. officials seize $6.5m in counterfeit goods in Puerto Rico" |
Retail Dive |
Jul 8, 2016 |
"Hacker Group DROPPING ELEPHANT Targets China and Asian Regional Entities" |
Matthew Aid |
Jul 8, 2016 |
"Huawei proves Samsung is infringing its patents" |
China Daily |
Jul 7, 2016 |
"APT Group 'Patchwork' Cuts-and-Pastes a Potent Attack" |
ThreatPost |
Jul 7, 2016 |
"Why rogue employees may pose bigger threat to corporate data than hackers" |
Christian Science Monitor |
Jul 7, 2016 |
"‘Zero Days’ details U.S. vulnerability to cyberattacks" |
Seattle Times |
Jul 7, 2016 |
"Opinion: The U.S. doesn’t even enforce trade rules, never mind enact favorable deals" |
Market Watch |
Jul 7, 2016 |
"How the Trade Secrets Act Will Benefit Manufacturers" |
Industry Week |
Jul 7, 2016 |
"Attention, small biz using Symantec AV: Smash up your PCs, it's the safest thing to do" |
The Register |
Jul 6, 2016 |
"UK Employee Theft Statistics Report More Thefts by Senior Management" |
LPM Insider |
Jul 5, 2016 |
"Hackers use 'cyber weapons' rather than malware to evade detection when deploying attacks, study finds" |
International Business Times |
Jul 1, 2016 |
"The US Really Does Want to Constrain Commercial Espionage: Why Does Nobody Believe It?" |
Lawfare |
Jul 1, 2016 |
"Alibaba Group Hosts Inaugural Summit for International IP Rights Holders" |
Market Watch |
Jun 30, 2016 |
"Qualcomm files 17 new complaints in China courts against smartphone maker Meizu" |
Reuters |
Jun 30, 2016 |
"Terror-suspect database used by banks, governments, has been leaked" |
CSO Online |
Jun 29, 2016 |
"New Balance ordered to pay 5 million RMB for infringing on Chinese company's trademark" |
Shanghai List |
Jun 28, 2016 |
"Putting the Brakes on Intellectual Property Crime
Trio Pirated Mercedes-Benz Diagnostic Software" |
FBI |
Jun 24, 2016 |
"U.S. lottery firm says its 'most-prized' secrets have been taken" |
Brantford Expositor |
Jun 24, 2016 |
"From Articulation to Implementation:Enabling progress on cybersecurity norms" |
Microsoft |
Jun 23, 2016 |
"Intel Security: Connecting with strangers on LinkedIn puts firms at risk of phishing attacks" |
The Inquirer |
Jun 23, 2016 |
"Apple’s Loss in Chinese Patent Fight Seen Emboldening Rivals" |
Bloomberg |
Jun 21, 2016 |
"Kaspersky battles hackers in internet’s ‘dark ages’" |
Seattle Times |
Jun 21, 2016 |
"Someone Got Into 45 Million Accounts From Hundreds Of Car, Tech, Sports Forums" |
Nextgov |
Jun 20, 2016 |
"Russia, China to Sign Intellectual Property Deal on Rocket Tech" |
Sputnik News |
Jun 20, 2016 |
"US Deputy Homeland Security Secretary: US-Israel to sign automated cyber information sharing agreement" |
Jerusalem Post |
Jun 20, 2016 |
"U.S. Cyber Command Chief on What Threats to Fear the Most" |
Wall Street Journal |
Jun 19, 2016 |
"Apple IPhones Found to Have Violated Chinese Rival’s Patent" |
Bloomberg |
Jun 17, 2016 |
"Trade Secrets Now Federally Protected Intellectual Property" |
JDSupra |
Jun 16, 2016 |
"A Chaotic Whodunnit Follows The DNC’s Trump Research Hack" |
Wired |
Jun 15, 2016 |
"White House Cyber Commission May Endorse Security Ratings System for Software" |
OSINT |
Jun 15, 2016 |
"Unit 8200: Israel’s cyber spy agency" |
Veterans Today |
Jun 10, 2016 |
"A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet" |
New York Times |
Jun 10, 2016 |
"U.S.-India cyber agreement puts more pressure on China" |
FedScoop |
Jun 10, 2016 |
"Researchers Demo How To Build Nearly Invisible Backdoor In Computer Chips" |
Information Week |
Jun 6, 2016 |
"The Long and Winding Road to US-India Cyber Cooperation" |
The Wire |
Jun 6, 2016 |
"Chinese tech giant Huawei under U.S. investigation for North Korea ties" |
UPI |
Jun 3, 2016 |
"There's a Stuxnet Copycat, and We Have No Idea Where It Came From" |
Motherboard |
Jun 2, 2016 |
"China Gains Stealth Access to World's Hotels" |
EIN Newsdesk |
Jun 2, 2016 |
"Federal Reserve was hacked more than 50 times in the past five years" |
The Guardian |
Jun 1, 2016 |
"Critical flaws on HP, Dell, Acer, Asus and Lenovo laptops let hackers take over in 10 minutes" |
International Business Times |
May 31, 2016 |
"Oil’s collapse puts secrets at risk" |
San Antonio Express-News |
May 31, 2016 |
"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes" |
McAfee |
May 31, 2016 |
"Hackers offering Microsoft Windows zero-day exploit for $90,000" |
SC Magazine |
May 31, 2016 |
"This Map Locates Where Governments Hack Activists and Reporters" |
TechWorm |
May 27, 2016 |
"List of data breaches and cyber attacks in May 2016" |
IT Governance |
May 27, 2016 |
"A First Look at America’s Supergun" |
Wall Street Journal |
May 26, 2016 |
"Samsung Electronics Hints at Counter-Suit Against China's Huawei" |
KBS World Radio |
May 25, 2016 |
"China's Huawei files patent suits against Samsung Elec" |
Reuters |
May 24, 2016 |
"Here's how the US military is beating hackers at their own game" |
Tech Insider |
May 24, 2016 |
"U.S. targets spying threat on campus with proposed research clampdown" |
Reuters |
May 20, 2016 |
"House defense bill elevates cyber force, defying White House" |
The Hill |
May 19, 2016 |
"Foreign Hackers May Be Targeting US Presidential Candidates" |
NextGov |
May 19, 2016 |
"Cyber's Hot, but Low-Tech Spies Are Still a Threat" |
The National Interest |
May 18, 2016 |
"Here's How to End the Fog of Cyber War" |
Scientific American |
May 18, 2016 |
"Hackers Target Think Tanks to Get a Peek at U.S. Government Strategy" |
Bloomberg |
May 12, 2016 |
"Protecting America's Secret Sauce: The Defend Trade Secrets Act Signed Into Law" |
Huffington Post |
May 11, 2016 |
"Obama signs trade secrets bill, allowing companies to sue
" |
USA Today |
May 11, 2016 |
"Data-hungry cyber hackers turn gaze to connected autos" |
Financial Times |
May 11, 2016 |
"Shared Interests and Responsibility: The US and China Must Join to Promote a Rules-based Cyberspace" |
World Post |
May 11, 2016 |
"US’s DARPA developing technology to identify and track hackers worldwide" |
Techworm |
May 7, 2016 |
"World War Web: Are nation state attacks really on the rise?" |
IT Pro |
May 6, 2016 |
"U.S. tech firms urge presidential candidates to embrace trade, high-tech visas" |
Reuters |
May 5, 2016 |
"Romanian hacker Guccifer: I breached Clinton server, 'it was easy'" |
Fox News |
May 4, 2016 |
"‘Guccifer’ claims he hacked Hillary Clinton’s ‘completely unsecured’ server" |
Washington Times |
May 4, 2016 |
"Hacker 'Guccifer': I Got Inside Hillary Clinton's Server" |
NBC News |
May 4, 2016 |
"Spy malware has been delivered through Office macros for a decade: Report" |
IT World Canada |
May 4, 2016 |
"The Pentagon Wants to ‘Fingerprint’ the World’s Hackers" |
Defense One |
May 4, 2016 |
"Election fraud feared as hackers target voter records" |
The Hill |
May 2, 2016 |
"Sneak attack on bank-message system led to global breach" |
Seattle Times |
Apr 30, 2016 |
"Tick Cyber-Espionage Group Targets Japanese Companies with Daserf Backdoors" |
Softpedia |
Apr 29, 2016 |
"Analysis: Are US, Israel winning or losing newest cyber battles" |
The Jerusalem Post |
Apr 28, 2016 |
"Analysis: Are US, Israel winning or losing newest cyber battles" |
Jerusalem Post |
Apr 28, 2016 |
"US keeps China, India on intellectual property priority watch list" |
Live Mint |
Apr 27, 2016 |
"U.S. Congress passes legislation to protect firms' trade secrets" |
Reuters |
Apr 27, 2016 |
"MIT builds Artificial Intelligence system that can detect 85% of Cyber Attacks" |
The Hacker News |
Apr 19, 2016 |
"Phineas Fisher's Account of How He Broke Into Hacking Team Servers" |
Softpedia |
Apr 17, 2016 |
"German spy chiefs on Snowden: Leaks were Russian op to drive ‘wedge’ between US & Europe" |
Russia Today |
Apr 16, 2016 |
"PowerShell Increasingly Being Used To Hide Malicious Activity" |
InformationWeek |
Apr 15, 2016 |
"Shape-shifting and supremely tough malware is targeting the public sector" |
PC Authority |
Apr 14, 2016 |
"Qbot Malware Morphs Quickly to Evade Detection" |
Threatpost |
Apr 13, 2016 |
"Symantec Speaks on Latest Threat Trends" |
Security Week |
Apr 12, 2016 |
"Be afraid, very afraid : New cybersecurity report" |
are you hacker proof? |
Apr 12, 2016 |
"Nuclear employee sentenced for cyber attack" |
IOL |
Apr 12, 2016 |
"Federal Defend Trade Secrets Act Clears the Senate: Is the Uniform Act on Life Support?" |
Lexology |
Apr 11, 2016 |
"Prosecutors raid Panama Papers law firm Mossack Fonseca" |
Financial Times |
Apr 11, 2016 |
"Researchers help shut down spam botnet that enslaved 4,000 Linux machines" |
ARS Technica |
Apr 9, 2016 |
"Huawei, LeEco to commence local manufacturing in India" |
International Business Times |
Apr 9, 2016 |
"Caught in the Matrix: Hillary, meet Marcel “Guccifer” Lazar" |
Communities Digital News |
Apr 8, 2016 |
"US Serves up Cyber Justice Against Foreign Hackers" |
Daily Signal |
Apr 8, 2016 |
"The next Cold War has already begun – in cyberspace" |
Phys.Org |
Apr 7, 2016 |
"#Panamapapers: Mossack Fonseca was a Hack Waiting to Happen" |
htxt.africa |
Apr 7, 2016 |
"Why the Panama Papers are a good thing for hackers – and the rest of us" |
TNW |
Apr 6, 2016 |
"How a Federal Trade Secrets Law Would Impact Silicon Valley" |
eWeek |
Apr 6, 2016 |
"Trustwave Case Highlights Cyber-Risk to Professional Service Providers" |
JD Supra |
Apr 5, 2016 |
"U.S. Cyber Command should be combatant command, DoD's top cyber warrior says" |
Military Times |
Apr 5, 2016 |
"Senate Passes Trade-Secrets Bill" |
Wall Street Journal |
Apr 4, 2016 |
"How to Hack an Election" |
Bloomberg |
Mar 31, 2016 |
"UK cops tell suspect to hand over crypto keys in US hacking case" |
ARS Technica |
Mar 31, 2016 |
"Alexander Mining : Shares Soar After Being Awarded Patent In China" |
4-Traders |
Mar 31, 2016 |
"The anatomy of a nation-state hack attack" |
BBC News |
Mar 30, 2016 |
"Contra Costa Times editorial: U.S. right to use courts to pursue security threats" |
Contra Costa Times |
Mar 25, 2016 |
"Justice Department indicts seven Iranians for campaign of cyberattacks " |
Christian Science Monitor |
Mar 24, 2016 |
"New U.S. Customs Law Combats Counterfeiting" |
TTI |
Mar 24, 2016 |
"White House Says Agencies Reported 77,200 Cyber Incidents In 2015" |
Nextgov |
Mar 21, 2016 |
"Apple’s FBI Battle is Complicated. Here’s What’s Really Going On" |
WIRED |
Mar 18, 2016 |
"Cyber war - bigger than ever - is here to stay" |
Wahington Post |
Mar 18, 2016 |
"Business suffering 'industrial scale' cyber theft, warns GCHQ head" |
The Telegraph |
Mar 18, 2016 |
"Stealing America's trade secrets" |
Press Reader |
Mar 18, 2016 |
"Senate to Vote on Trade Secrets Bill" |
Bloomberg |
Mar 17, 2016 |
"UK universities 'losing cyber security battle'" |
Times Higher Education |
Mar 16, 2016 |
"The tech industry, according to Trump" |
Venture Beat |
Mar 13, 2016 |
"Security Researchers Challenge Claims Data Breaches Increasing" |
Cyber Parse |
Mar 13, 2016 |
"Going’s good in US-Asean relations... but Trump?" |
The Star Online |
Mar 12, 2016 |
"Ofcom investigates former employee after data breach" |
SC Magazine |
Mar 11, 2016 |
"Who Took The Cookies From The Cookie Jar?" |
Information Week |
Mar 11, 2016 |
"RSA 2016: Future of cyber-espionage" |
SC Magazine |
Mar 4, 2016 |
"Hackers targeting internet-connected systems to steal oil, expert warns" |
The Guardian |
Mar 4, 2016 |
"Sea pirates ditch guns for computer hacking to plunder booty from cargo ships" |
International Business Times |
Mar 3, 2016 |
"Intellectual Property Office : UK attachés export intellectual property expertise across the globe" |
4 Traders |
Mar 2, 2016 |
"Windows 10 is Adding APT Protection. Here's Why That's A Big Deal" |
Nextgov |
Mar 2, 2016 |
"Gentle Reminder at RSA: Hacking Back is a Bad Idea" |
ThreatPost |
Mar 2, 2016 |
"What’s the Deal With Cyberwar?" |
Slate |
Mar 1, 2016 |
"The 2016 Presidential Candidates' Views on Cyber Warfare" |
Gizmodo |
Mar 1, 2016 |
"Pentagon unleashes Fort Meade cyberwarriors on Islamic State" |
Baltimore Sun |
Mar 1, 2016 |
"SSL 'DROWNs' In Yet Another Serious Security Flaw" |
InformationWeek |
Mar 1, 2016 |
"Cyber War Against ISIL Hones Weapons Vs. Russia, China" |
Breaking Defense |
Feb 29, 2016 |
"UC Berkeley breach: Universities increasingly targeted in cyberattacks" |
Christian Science Monitor |
Feb 29, 2016 |
"Commanders urge Pentagon to counter growing threat of cyber attacks on industrial controllers" |
Flash Critic |
Feb 28, 2016 |
"Exclusive Inside Story on China’s Database of Americans" |
China Watch Canada |
Feb 26, 2016 |
"Destructive Hacking Attacks Spread in Wake of Breaches at Sony: FireEye" |
Gadgets 360 |
Feb 26, 2016 |
"Waging war in zeros and ones" |
American Enterprise Institute |
Feb 26, 2016 |
"Treasury Fails To Name Any Cyber Worst Actors For Economic Sanctions" |
The Daily Caller |
Feb 26, 2016 |
"Companies quicker to detect breaches, hackers more aggressive" |
SC Magazine |
Feb 26, 2016 |
"Feds advise utilities to pull plug on Internet after Ukraine attack" |
Washington Examiner |
Feb 25, 2016 |
"Cyber-crime set to hit most British companies in the next two years" |
The Telegraph |
Feb 25, 2016 |
"The making of America's cyberweapons" |
Christian Science Monitor |
Feb 24, 2016 |
"Interview: Eugene Kaspersky on saving the world from cyber attacks" |
Gulf Business |
Feb 24, 2016 |
"Patent bills: too broad, too soon, too heavy-handed" |
Washington Times |
Feb 23, 2016 |
"Embattled OPM CIO Steps Down" |
Nextgov |
Feb 22, 2016 |
"Navy Wants to Unplug From Some Networks to Stay Ahead of Cyberattacks" |
Military.com |
Feb 19, 2016 |
"CNN, ABC: Arrest in hacking case of high-ranking Obama admin officials" |
HotAir |
Feb 12, 2016 |
"Sony attackers thought to be behind multiple large attacks" |
InfoWorld |
Feb 12, 2016 |
"Ukraine Railway, Mining Company Attacked With BlackEnergy" |
InformationWeek |
Feb 12, 2016 |
"US Industry IP Index Rates Nations" |
IP Watch |
Feb 11, 2016 |
"Poseidon APT Group Identified as First Portuguese-Speaking Campaign" |
ThreatPost |
Feb 9, 2016 |
"DNI: China Continues Cyber Espionage" |
Washington Free Beacon |
Feb 9, 2016 |
"Extend NATO Cybersecurity To Asian-Pacific Allies" |
Forbes |
Feb 9, 2016 |
"Small Websites Compromised by the Thousands, Scatter Angler and CryptoWall" |
Heimdal Security |
Feb 9, 2016 |
"Hacking by China, Iran and North Korea set to increase dramatically over next 12 months" |
International Business Times |
Feb 8, 2016 |
"The Former Federal Employee Who Tried To Launch A Cyberattack On Nuclear Scientists" |
Nextgov |
Feb 6, 2016 |
"Global Threat Report 2016" |
Crowdstrike |
Feb 5, 2016 |
"Agilent Files Intellectual Property Theft Lawsuit Against Twist Bioscience" |
GenomeWeb |
Feb 5, 2016 |
"Operation Team Player' nets $39 million in fake sports merchandise" |
ICE |
Feb 4, 2016 |
"Government software may have let in foreign spies" |
The Hill |
Feb 2, 2016 |
"Former Nuclear Regulatory Commission Worker Pleads Guilty Over Attempted Hack" |
Security Week |
Feb 2, 2016 |
"Federal Government Confirms That It Still Sucks at Cyber Security" |
Re/Code |
Feb 2, 2016 |
"The Geography of a Hack: Where Are Your Cyber Villains Located?" |
The Street |
Feb 1, 2016 |
"Hacking attacks on businesses up 38% in 2015, study shows" |
Irish Times |
Feb 1, 2016 |
"DHS Chief Defends $6 Billion Federal Firewall After Stinging Audit" |
Nextgov |
Feb 1, 2016 |
"The myth of ‘backdoor’ data access" |
The Depaulia |
Jan 31, 2016 |
"UCOP Ordered Spyware Installed On UC Data Networks" |
Remaking the University |
Jan 30, 2016 |
"NSA Hacker-In-Chief: No Need For Zero-Days To Hack You, Just Persistence And Focus" |
Tech Times |
Jan 30, 2016 |
"Israel's Cyber Sector Blooms in the Desert" |
Security Week |
Jan 30, 2016 |
"The first man charged of cyber terrorism has been extradited to the US" |
Security Affairs |
Jan 30, 2016 |
"1st computer virus is written, January 30, 1982" |
EDN Network |
Jan 30, 2016 |
"DHS $6 Billion Firewall May Not Be Effective In Keeping Hackers Out Of Government, Audit Says" |
Nextgov |
Jan 28, 2016 |
"China has cyber capability to take down U.S. power grid, warns NSA" |
Natural News |
Jan 27, 2016 |
"The Pentagon's plan to defend the power grid against hackers" |
Christian Science Monitor |
Jan 25, 2016 |
"Here's How the Pentagon Plans to Protect Security Clearance Data" |
Nextgov |
Jan 25, 2016 |
"Cybercriminals Making Computer Malware at a Record Rate: Researchers" |
NBC |
Jan 25, 2016 |
"US faces technological 'peer competitors' in cyberspace, says USCYBERCOM" |
Fierce Government IT |
Jan 25, 2016 |
"Canada Discovers It's Under Attack by Dozens of State-Sponsored Hackers" |
Vice News |
Jan 25, 2016 |
"Countries starting to use non-state middlemen for cyber ops" |
Jane's |
Jan 20, 2016 |
"The Industrial Internet of Things under attack" |
IT Portal |
Jan 15, 2016 |
"Global Risk Report, how we are thinking about cyber dependence, cyber attack, data theft, cyber terrorism, cyber war, dark web, state sponsored attacks…" |
Computer Business Review |
Jan 15, 2016 |
"The man on a mission to 'save the world' from cyber attacks" |
ZAWYA |
Jan 15, 2016 |
"Cyber Security for the Power Grid-- Why We Should Fear Hackers" |
CyberWire |
Jan 14, 2016 |
"NSA is world's best hacker thief, says former director" |
CNN Money |
Jan 12, 2016 |
"FAC Publishes Cyber-Related Sanctions Regulations" |
JD Supra |
Jan 11, 2016 |
"Fearful of Hacks, Pentagon Considers More Classified Programs" |
Defense News |
Jan 9, 2016 |
"5 Reasons Why The Government Can’t Get a Grip on Cybersecurity" |
Hurricane Labs |
Jan 7, 2016 |
"Project 'Gridstrike' Finds Substations To Hit For A US Power Grid Blackout" |
InformationWeek |
Jan 7, 2016 |
"Lawmakers notch win in fight for global cyber laws" |
The Hill |
Jan 3, 2016 |
"Cyber Crime" |
The Cipher Brief |
Jan 3, 2016 |
2015 |
"White House finally acquiesces to Congress on cyber deterrence policy" |
Federal News Radio |
Dec 29, 2015 |
"Former Boston Scientific engineer to be sentenced for stealing trade secrets" |
Star Tribune |
Dec 29, 2015 |
"Largest U.S. electrical company battles to keep cyber attacks at bay" |
Glitch News |
Dec 28, 2015 |
"The Highs and Lows of U.S. National Security in 2015: A Year-End Review" |
Observer News |
Dec 28, 2015 |
"Tolkachev, Cold War Spycraft, and Modern Risks for China" |
The Diplomat |
Dec 28, 2015 |
"Honeypot Trap Suggests NSA Monitoring Associated With Juniper Breach" |
EMQ Tech |
Dec 23, 2015 |
"Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out." |
Security Affairs |
Dec 22, 2015 |
"Juniper mysteries" |
Politico |
Dec 22, 2015 |
"Cisco Starts Company-Wide Code Audit to Search for Hidden Backdoors" |
Softpedia |
Dec 22, 2015 |
"Attackers are hunting for tampered Juniper firewalls" |
IT World |
Dec 21, 2015 |
"AEP guarding the grid against online attacks" |
Columbus Dispatch |
Dec 21, 2015 |
"Juniper faces questions about spying code planted in software" |
ComputerWorld |
Dec 21, 2015 |
"Latest Hack May Open Doors For Hackers To Spy on US Government" |
HackRead |
Dec 19, 2015 |
"Sneaky US Government Passes CISA Bill, Hidden Inside Generic Budget Bill" |
Softpedia |
Dec 19, 2015 |
""Unauthorized code" in Juniper firewalls decrypts encrypted VPN traffic" |
ARS Technica |
Dec 17, 2015 |
"China Tries to Sell its Views on Internet Controls" |
VOA |
Dec 16, 2015 |
"Cyberespionage IP Theft May Soon Lead to Court" |
Bloomberg |
Dec 16, 2015 |
"Enhancing Legal Defense of Trade Secrets" |
Townhall.com |
Dec 16, 2015 |
"Pentagon Memo: U.S. Weapons Open to Cyberattacks" |
Daily Beast |
Dec 16, 2015 |
"Cybersecurity Researchers Are Hunted from All Sides" |
Motherboard |
Dec 14, 2015 |
"Cyber Espionage Is Reaching Crisis Levels" |
Fortune |
Dec 12, 2015 |
"Microsoft, US senators want to grease wheels of trade secret theft cases" |
The Register |
Dec 3, 2015 |
"Gates sparks multinational plan to spend billions on clean energy tech" |
Stockhouse |
Nov 30, 2015 |
"Cyberspace squadrons and ops group bringing almost 300 jobs to ScottAFB" |
Belleville News |
Nov 30, 2015 |
"DARPA wants early warning system for power-grid cyberattacks" |
NetworkWorld |
Nov 24, 2015 |
"Canberra physicists working on 'unbreakable' cyber security systems" |
ABC News (AU) |
Nov 24, 2015 |
"Presidential Hopeful John McAfee Talks Cybersecurity" |
NBC News |
Nov 23, 2015 |
"Researchers Say the Juniper Hack Could be the Work of Government: But Which One?" |
Fast Company |
Nov 23, 2015 |
"Pendulum swings to security" |
The Hill |
Nov 22, 2015 |
"New Two Billion Dollar Strategic Intellectual Property Entertainment Fund Formed" |
Music Industry News Network |
Nov 22, 2015 |
"Does Anyone Really Care about a Data Breach?" |
PR Week |
Nov 20, 2015 |
"Chinese Firms’ U.S. Advantage" |
PoliZette |
Nov 20, 2015 |
"A Decade of Data Breaches: Facts and Myths" |
Baseline |
Nov 19, 2015 |
"The Second Mouse Gets the Cheese – The Innovator’s IP Dilemma" |
IP Watchdog |
Nov 19, 2015 |
"And Now, A Cyber Arms Race Towards Critical Infrastructure Attacks
" |
InformationWeek |
Nov 19, 2015 |
"Cyber Attacks On US Companies Since November 2014 – Analysis" |
Eurasia Review |
Nov 19, 2015 |
"Hackers a threat to defence: Xenophon" |
MSN |
Nov 19, 2015 |
"Hacking group Strontium dogs NATO and government targets" |
The Register |
Nov 18, 2015 |
"Microsoft Security Intelligence Report: Strontium" |
Microsoft |
Nov 18, 2015 |
"Fighting talk from Great Britain as it says it will hit back against internet attacks" |
We Live Security |
Nov 18, 2015 |
"The ‘other’ hacking groups working to bring down Islamic State" |
News.Com (AU) |
Nov 18, 2015 |
"Security in 2016: The death of advanced persistent threats" |
ZDNet |
Nov 17, 2015 |
"Opinion: Poisoning the Internet won't stop more Paris attacks" |
Christian Science Monitor |
Nov 17, 2015 |
"Britain to build cyber attack forces to tackle IS, hackers" |
Reuters |
Nov 17, 2015 |
"Restricting Encryption Would Not Have Prevented the Paris Attacks" |
Defense One |
Nov 17, 2015 |
"What Donald Trump Wrote About Chinese-Sponsored Hackers Who Launched Cyber Attacks On U.S. Companies" |
Forbes |
Nov 17, 2015 |
"$21mn contract to protect Chinese hacking victims broke gov’t rules, IG memo finds" |
Russia Today |
Nov 17, 2015 |
"Cyber Warfare: How The UK Could Come To A Halt In Three Days" |
Forces TV |
Nov 17, 2015 |
"The world’s richest countries agree that hacking industrial targets for profit isn’t right
" |
The Verge |
Nov 17, 2015 |
"U.S. federal agencies refuse to testify about OPM hack" |
Reuters |
Nov 17, 2015 |
"China Is Actually a Majority Shareholder of 33 Radio Stations Across the World" |
The Liberty Web |
Nov 17, 2015 |
"Cyber Sections of the Latest G20 Leaders' Communiqué" |
Lawfare |
Nov 17, 2015 |
"75% of Companies Are Insider Threat Victims" |
InfoSecurity |
Nov 16, 2015 |
"Anonymous Declares Cyber War on ISIS. Why It Matters" |
Fortune |
Nov 16, 2015 |
"How Islamic State Teaches Tech Savvy to Evade Detection" |
Wall Street Journal |
Nov 16, 2015 |
"Cyber Attacks on U.S. Companies Since November 2014" |
Heritage Foundation |
Nov 16, 2015 |
"World’s richest nations agree hacking for commercial benefit is off-limits" |
Washington Post |
Nov 16, 2015 |
"Lawmakers Demand US Military Carry Out Pretend Cyber War Against China, Russia" |
Defense One |
Nov 14, 2015 |
"Cyber and real war come together in the Ukraine" |
SC Magazine |
Nov 11, 2015 |
"No surprise here: Adobe's Flash is a hacker's favorite target" |
CSO Online |
Nov 9, 2015 |
"A third of employees would sell their firms’ intellectual property ‘for the right price’" |
Business Reporter |
Nov 9, 2015 |
"10 reasons why phishing attacks are nastier than ever" |
CSO Online |
Nov 9, 2015 |
"Opinion: Will TPP undermine the global Internet? Read this before you decide" |
Christian Science Monitor |
Nov 5, 2015 |
"Pacific trade deal takes aim at Chinese hacking" |
Financial Times |
Nov 4, 2015 |
"December date set for first China-US cyber meetings" |
The Hill |
Nov 4, 2015 |
"U.S. grapples with controlling 'cyber-munitions' while recruiting 6,000 new cyber-warriors" |
TechRepublic |
Nov 3, 2015 |
"Constructing a Cyber Superpower" |
BizMonthly |
Nov 3, 2015 |
"U.S. firms to pay $13 million to settle claim they paid Russians for security work" |
Washington Post |
Nov 2, 2015 |
"White House unveils plan to fight hackers" |
The Hill |
Nov 2, 2015 |
"Where Is America’s Cyber Defense Plan?" |
Matthew Aid |
Oct 31, 2015 |
"Modernizing Federal Cybersecurity" |
U.S. Chief Information Officer |
Oct 30, 2015 |
"Cybersecurity Strategy and Implementation Plan (CSIP) for the Federal Civilian Government" |
Executive Office of the President, Office of Management and Budget |
Oct 30, 2015 |
"A 'Cyber Party' with John McAfee and the White House Cybersecurity Czar" |
Cybersecurity Podcast |
Oct 30, 2015 |
"Invincea CEO on CISA" |
Invincea |
Oct 30, 2015 |
"Cybersecurity Deal Between China And Germany In The Works: Report" |
International Business Times |
Oct 30, 2015 |
"John McAfee: CISA will not stop a single important hack, let alone cyberterrorism" |
International Business Times |
Oct 29, 2015 |
"Will AI Be Smart Enough To Protect Us From Online Threats?" |
TechCrunch |
Oct 29, 2015 |
"Cybercrime has replaced nuclear war as the global threat" |
Irish Examiner |
Oct 29, 2015 |
"On Cyberdefense, China and North Korea Are Said to Be Poorly Prepared" |
Wall Street Journal |
Oct 28, 2015 |
"How Hackers Can Hack The Oil & Gas Industry Via ERP Systems" |
InformationWeek |
Oct 28, 2015 |
"South Korean manufacturing industry targeted with new backdoor program" |
ComputerWorld |
Oct 27, 2015 |
"Senate passes first major cyber bill in years" |
The Hill |
Oct 27, 2015 |
"Duuzer back door Trojan targets South Korea to take over computers" |
Symantec |
Oct 26, 2015 |
"Washington Post: Time to move on cybersecurity" |
Salt Lake Tribune |
Oct 26, 2015 |
"Chattering Wi-Fi devices are a short hop away from the crown jewels of your network" |
Graham Cluley |
Oct 23, 2015 |
"Space age perils: hackers find a new battleground on the final frontier" |
Reuters |
Oct 22, 2015 |
"America Isn't Cyber Superior -- We Need A Strategy To Stop Playing Catch-Up" |
Forbes |
Oct 19, 2015 |
"America Isn't Cyber Superior -- We Need A Strategy To Stop Playing Catch-Up" |
Forbes |
Oct 19, 2015 |
"Why news organizations are such a juicy target for hackers" |
The Washington Post |
Oct 16, 2015 |
"Cybersecurity Expert: Be Afraid, America. Be Very Afraid." |
Daily Beast |
Oct 14, 2015 |
"Big issues facing the Internet: Economic espionage" |
Brookings Institute |
Oct 14, 2015 |
"Online Attacks on Infrastructure Are Increasing at a Worrying Pace" |
New York Times |
Oct 14, 2015 |
"Lawmakers push to protect trade secrets from Chinese hackers" |
The Hill |
Oct 9, 2015 |
"Pentagon: Human-thinking machines are the answer to cyberthreats" |
Washington Examiner |
Oct 9, 2015 |
"Economic Espionage: The Myth That 'We Have Nothing of Interest'" |
Security Intelligence |
Oct 9, 2015 |
"U.S. Justice Department Creates Office to Combat Cyberattacks" |
Government Technology |
Oct 7, 2015 |
"Drone phone poses as printer to hack from the air" |
SC Magazine |
Oct 6, 2015 |
"Trade deal could curb cyber theft, advocates say" |
The Hill |
Oct 5, 2015 |
"Pull Up Your Socks – The TPP Is Done" |
IP Watch |
Oct 5, 2015 |
"Department of Justice plans to crack down on counterfeits sold online" |
Engadget |
Oct 5, 2015 |
"Justice Dept. Announces New Strategy to Combat Intellectual Property Crimes" |
Sky Valley Chronicle |
Oct 3, 2015 |
"The Evolution Of Malware" |
InformationWeek |
Oct 2, 2015 |
"Corebot cleverly written botnet malware with growth potential" |
CSO |
Sep 16, 2015 |
"Hackers seize control of Cisco routers in four countries" |
Consumer Affairs |
Sep 15, 2015 |
"Report: Secret Service, ICE vulnerable to 'clickjacking'" |
Washington Examiner |
Sep 15, 2015 |
"The new art of war: How trolls, hackers and spies are rewriting the rules of conflict" |
Tech Republic |
Sep 15, 2015 |
"Cisco router break-ins bypass cyber defences" |
The Express Tribune |
Sep 15, 2015 |
"Jihadist cyber-attack on Cabinet was entirely avoidable, say experts" |
SC Magazine |
Sep 15, 2015 |
"Kremlin says hackers attacked Putin website" |
Reuters |
Sep 14, 2015 |
"USA, China find common cyber-enemy within" |
The Register |
Sep 14, 2015 |
"New cyber threat center to hit initial stride in October" |
Federal News Radio |
Sep 14, 2015 |
"Bangladesh launches drive against pirated software of Microsoft" |
Dhaka Tribune |
Sep 13, 2015 |
"Intel chiefs draw distinction between digital espionage and malicious hacks" |
Christian Science Monitor |
Sep 11, 2015 |
"Chinese and Russian Cyber Espionage: The Kaiser Would Be Jealous" |
War on the Rocks |
Sep 11, 2015 |
"Russia, China, North Korea and Iran remain top US cyber concerns" |
V3.CO.UK |
Sep 11, 2015 |
"U.S. urged to tighten cyber security to counter Chinese hacking" |
Reuters |
Sep 10, 2015 |
"Spy Chief Warns About Hackers Disrupting Financial Markets" |
Bloomberg |
Sep 10, 2015 |
"MIT, Cambridge, Other Universities Get D's In Internet Security" |
Information Week |
Sep 10, 2015 |
"Moscow, Beijing to Increase Cooperation in Counterfeit Fight" |
EIN News |
Sep 9, 2015 |
"Cyber Espionage to Splinter Internet Governance" |
Stratfor |
Sep 9, 2015 |
"Energy Dept. hacked 150 times in 4 years" |
The Hill |
Sep 9, 2015 |
"Cyber War: a guide to state-sponsored digital assaults" |
Catch News |
Sep 7, 2015 |
"Apple and Other Tech Companies Tangle With U.S. Over Data Access" |
New York Times |
Sep 7, 2015 |
"Lincoln, labor and intellectual property rights" |
Washington Examiner |
Sep 7, 2015 |
"How The Rules Of Cyber Engagement Have Changed" |
TechCrunch |
Sep 6, 2015 |
"Crime and Espionage Becoming Tangled Online" |
Voice of America |
Sep 5, 2015 |
"Cyber security: A thorn in US-China relations" |
GB Times |
Sep 4, 2015 |
"Cyber Sanctions and Breach Impacts
" |
National Cybersecurity Institute |
Sep 3, 2015 |
"Singapore: Asia’s new intellectual property hub?" |
Blouin beat Business |
Sep 2, 2015 |
"Why Israel dominates in cyber security" |
Fortune |
Sep 1, 2015 |
"We're At Cyberwar: A Global Guide To Nation-State Digital Attacks" |
Wired |
Sep 1, 2015 |
"Russia and China Use Data Received From Hackers to ID U.S. Spies" |
New American |
Sep 1, 2015 |
"Russia, China Pounce on U.S. Hacked Data" |
WorldNetDaily |
Sep 1, 2015 |
"Exclusive: U.S. weighs sanctioning Russia as well as China in cyber attacks" |
Reuters |
Sep 1, 2015 |
"The 20 Most Infamous Cyberattacks of the 21st Century (Part II)" |
MIT Technology Review |
Aug 27, 2015 |
"Latest Update on Federal Trade Secrets Legislation" |
JD Supra |
Aug 27, 2015 |
"Kaspersky catches the phishes" |
IT Wire |
Aug 27, 2015 |
"Phishing is a $3.7-million annual cost for average large company" |
CSO Magazine |
Aug 26, 2015 |
"Opinion: How digital voyeurism is destroying privacy" |
Christian Science Monitor |
Aug 26, 2015 |
"Anatomy of an attack: deploying military tactics against a retailer" |
Third Certainty |
Aug 26, 2015 |
"Latest Update on Federal Trade Secrets Legislation" |
Trading Secrets |
Aug 26, 2015 |
"The 20 Most Infamous Cyberattacks of the 21st Century (Part I)" |
MIT Technology Review |
Aug 25, 2015 |
"Wyndham Must Face Hacker Suit as Court Upholds FTC Power" |
Bloomberg |
Aug 24, 2015 |
"Money, bureaucracy and weed: Why the feds are failing at cyber" |
The Hill |
Aug 24, 2015 |
"Court Says The FTC Can Slap Companies For Getting Hacked" |
Wired |
Aug 24, 2015 |
"Fiorina: Make cyber warfare 'very painful' for China" |
The Hill |
Aug 24, 2015 |
"Impact of Economically Weaker China on Cyber Spying" |
Data Breach |
Aug 24, 2015 |
"Developing a Proportionate Response to a Cyber Incident" |
Council on Foreign Relations |
Aug 23, 2015 |
"No Blood Shed but the War is Dangerous: US and China in Cyber Conflict" |
IndraStra |
Aug 23, 2015 |
"How to Combat the Global Cybercrime Wave" |
Brink |
Aug 18, 2015 |
"Adobe settles hacking case that affected 38 million people and pays $1.2m legal bill" |
V3.CO.UK |
Aug 17, 2015 |
"Michigan's battalion of digital defenders raises bar for states' cybersecurity" |
Christian Science Monitor |
Aug 17, 2015 |
"64% of Organizations are Potential Targets for Nation-State Cyberattacks, says Survey" |
Tripwire |
Aug 17, 2015 |
"IRS says cyberattacks more extensive than previously thought" |
Reuters |
Aug 17, 2015 |
"A Veil of Secrecy Aids Surge in Cyber-Attacks in Asia" |
Slinking Toward Retirement |
Aug 16, 2015 |
"How China has cyber-stumped the US and why Israel could be next" |
The Jerusalem Post |
Aug 14, 2015 |
"Department of Homeland Security reveals top sector at risk for cyber attacks" |
Insurance Business America |
Aug 14, 2015 |
"Russian, Chinese hackers use nearly identical tactics on US" |
The Hill |
Aug 13, 2015 |
"CAUGHT: Lenovo crams unremovable crapware into Windows laptops – by hiding it in the BIOS" |
The Register |
Aug 12, 2015 |
"Here’s Why People Are Furious About Lenovo Laptops Right Now" |
Time Magazine |
Aug 12, 2015 |
"Kerry Says China and Russia 'Very Likely' Reading His Emails" |
Security Week |
Aug 12, 2015 |
"The Most Hacker-Active Countries – Part 2" |
InfoSec Institute |
Aug 12, 2015 |
"Hackers stole secrets for up to $100 million insider-trading profit: U.S" |
Reuters |
Aug 11, 2015 |
"Yes, YOU will be Hacked" |
AirInsight |
Aug 11, 2015 |
"Hacker Cracks Satellite Communications Network" |
Defense One |
Aug 6, 2015 |
"Symantec exposes Butterfly hacking group for corporate espionage" |
Tech Republic |
Aug 6, 2015 |
"Filer Beware! E-Filing Error Can Destroy Trade Secret Status" |
Mondaq |
Aug 5, 2015 |
"Pentagon Hack ‘Most Sophisticated’ Ever" |
The Daily Beast |
Aug 5, 2015 |
"Is CISA gift-wrapped for hackers and nation-state actors?" |
The Hill |
Aug 3, 2015 |
"Beware of UAE markets: Hackers target companies to fib stock prices" |
Albawaba |
Aug 2, 2015 |
"Super spy 'Edward Snowden wannabe' sentenced to federal prison" |
Examiner |
Aug 1, 2015 |
"Watch out: A dangerous Windows 10 scam is being circulated online" |
Giz Burn |
Aug 1, 2015 |
"Pentagon seeks cyberweapons strong enough to deter attacks" |
Chicago Tribune |
Jul 31, 2015 |
"Chris Hadnagy on the Def Con hackers posing as your coworkers" |
Christian Science Monitor |
Jul 31, 2015 |
"Former national security officials: The fear over ubiquitous data encryption is overblown" |
Business Insider |
Jul 30, 2015 |
"Cyber criminals targeting unwary businesses - report" |
Startup Smart |
Jul 30, 2015 |
"Australia is facing a barrage of daily cyber espionage activity" |
Rapid News Network |
Jul 30, 2015 |
"Cyber insecurity: Hacking back" |
Financial Times |
Jul 30, 2015 |
"Washington: Pentagon takes computer system offline" |
IBN Live |
Jul 29, 2015 |
"How hackers can take over nuclear power plants" |
The Daily Dot |
Jul 29, 2015 |
"Phishing Attacks Drive Spike In DNS Threat" |
InformationWeek |
Jul 27, 2015 |
"A data security guy's musings on the OPM data breach train wreck" |
Help Net Security |
Jul 27, 2015 |
"Flash back, Flash forward" |
Christian Science Monitor |
Jul 24, 2015 |
"Opinion: Why the US government must lose cryptowars 2.0" |
Christian Science Monitor |
Jul 23, 2015 |
"Catch Me If You Can: How APT Actors Are Moving Through Your Environment Unnoticed" |
Trend Micro |
Jul 23, 2015 |
"How the US Is Trying to Shape Norms in Cyberspace" |
The Diplomat |
Jul 23, 2015 |
"After hack, U.S. lawmakers look to protect 'dot-gov' domain" |
Reuters |
Jul 22, 2015 |
"Is the Ashley Madison data breach worse than other data breaches?" |
AVAST |
Jul 21, 2015 |
"As Nations Hack Each Other, Protecting Personal Information Must Become National Security Priority" |
Forbes |
Jul 21, 2015 |
"U.S. vs. Hackers: Still Lopsided Despite Years of Warnings and a Recent Push" |
New York Times |
Jul 18, 2015 |
"Just get rid of Java finally" |
CSO Online |
Jul 17, 2015 |
"Ex-employees probed in attack on Italian cybersecurity firm" |
Reuters |
Jul 17, 2015 |
"Google expanding security feature that prevents malware installs" |
ZDNet |
Jul 16, 2015 |
"The Weakest Link in the Supply Chain: Beware of Third Party Hacks" |
Comilion |
Jul 16, 2015 |
"Welcome to the Electronic Age of the Spy: Internet is Making it Easier to Steal and Trade information." |
Matthew Waid |
Jul 15, 2015 |
"“International Cyber Stability” and the UN Group of Governmental Experts" |
Critical Infrastructure Daily |
Jul 15, 2015 |
"US probe of Darkode reached into Canada" |
Cambridge Times |
Jul 15, 2015 |
"Hacking Forum Darkode Dismantled in Multi-Nation Operation" |
Security Week |
Jul 15, 2015 |
"U.S. says computer hacking forum Darkode dismantled, 12 charged" |
Reuters |
Jul 15, 2015 |
"4 Lasting Impacts Of The Hacking Team Leaks" |
Information Week |
Jul 15, 2015 |
"NYSE Outage May Have Been A Cyber Attack: John McAfee" |
Value Walk |
Jul 14, 2015 |
"Pay attention to cyber security" |
Daily Record |
Jul 14, 2015 |
"Three UK politicians hacked while using open WiFi networks" |
Digital Munition |
Jul 12, 2015 |
"The Great Wall St. hack mystery" |
Silicon Angle |
Jul 9, 2015 |
"These Are The Hacker Groups Everyone’s Watching Right Now" |
The Daily Caller |
Jul 9, 2015 |
"Hackers of Apple, Facebook seen as independent group seeking money: Report" |
FirstPost |
Jul 9, 2015 |
"U.S. and China Collaborate on Global Supply Chain Security" |
Amber Road |
Jul 9, 2015 |
"Morpho, the financially motivated espionage target giant firms" |
Security Affairs |
Jul 9, 2015 |
"To Prevent Cyberattacks, Share the Threat Data" |
Wall Street Journal |
Jul 9, 2015 |
"Creepy cyber coincidence? Probably not" |
PBS News |
Jul 9, 2015 |
"Day of ‘technical’ glitches puts lawmakers on edge" |
The Hill |
Jul 8, 2015 |
"Hackers Could Be Probing Stock Exchange Network, Says Cybersecurity Firm" |
Epoch Times |
Jul 8, 2015 |
"Symantec Report Suggests Hackers’ Motives Are Blurring" |
New York Times |
Jul 8, 2015 |
"Hackers of Apple, Facebook seen as independent group seeking money" |
GMA News |
Jul 8, 2015 |
"Meet the hackers who break into Microsoft and Apple to steal insider info" |
ARS Technica |
Jul 8, 2015 |
"Duqu 2.0: New, menacing programming concept" |
Homeland Security News Wire |
Jul 2, 2015 |
"Harvard Reveals It Had An IT Breach In June Impacting 8 Colleges And Administrations" |
TechCrunch |
Jul 2, 2015 |
"Team GhostShell hacktivists dump data from US universities and hundreds of sites" |
Computerworld |
Jul 1, 2015 |
"A Critical Threat" |
SC Magazine |
Jul 1, 2015 |
"Defense cyber strategy: We can and will hit back" |
C4ISR & Networks |
Jul 1, 2015 |
"Spies Warned Feds About OPM Mega-Hack Danger" |
The Daily Beast |
Jun 30, 2015 |
"America's cyber sentinel asleep on guard duty" |
CNN |
Jun 30, 2015 |
"Constructing a Cyber Superpower" |
Defense News |
Jun 29, 2015 |
"6 reasons why there will be another OPM-style hack" |
Computerworld |
Jun 29, 2015 |
"The OPM Breach: Timeline of a Hack" |
Tripwire |
Jun 29, 2015 |
"Top Secret Anti-Hacking Unit Foiled Attack On Nato Summit" |
Sun Nation |
Jun 27, 2015 |
"Anesthetized by Data Breaches" |
Invincea |
Jun 26, 2015 |
"The high cost of cyber-espionage" |
Washington Times |
Jun 25, 2015 |
"How Fortune got inside the Sony hack" |
Fortune |
Jun 25, 2015 |
"The new Cold War: how Russia and China are hacking British companies and spying on their employees" |
The Telegraph (UK) |
Jun 25, 2015 |
"GEOINT 2015: Intel chief wants decisive cyber response" |
C4ISR & Network |
Jun 25, 2015 |
"Why Cyber War Is Dangerous for Democracies" |
The Atlantic |
Jun 25, 2015 |
"China, US agree to establish cyber code of conduct" |
ZD Net |
Jun 25, 2015 |
"FIN4 hacking group English speakers with banking sector ties" |
V3.CO.UK |
Jun 25, 2015 |
"Exclusive: SEC hunts hackers who stole corporate emails to trade stocks" |
Reuters |
Jun 24, 2015 |
"Hackers target Polish airline LOT, ground 1,400 passengers" |
Business Insider |
Jun 21, 2015 |
"Hunt for Deep Panda intensifies in trenches of U.S.-China cyberwar" |
Reuters |
Jun 21, 2015 |
"EMC Is Caught in the Crosshairs of a Cyberwar That Never Ends" |
Bloomberg |
Jun 19, 2015 |
"The US defense industry is reeling after the latest massive cyber attack" |
Business Iinsider |
Jun 18, 2015 |
"MI6 Agents Have Been Identified From Snowden Files, Report" |
Mathew Aid |
Jun 14, 2015 |
"Britain moves spies as Russia cracks Snowden files" |
Raidió Teilifís Éireann |
Jun 14, 2015 |
"Cyber expert: People are missing the real question we should ask about Israel spying on Iran talks" |
Business Insider |
Jun 11, 2015 |
"RAND study: Cyber-defense must change course, or else" |
ZD Net |
Jun 10, 2015 |
"The Defender's Dilemma
Charting a Course Toward Cybersecurity [PDF]" |
RAND Corp. |
Jun 10, 2015 |
"Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border" |
New York Times |
Jun 4, 2015 |
"NSA's secret hunt for hackers: How widespread? (+video)" |
Christian Science Monitor |
Jun 4, 2015 |
"America’s Passive-Aggressive Cyber Stance" |
The CyberSecurity Place |
Jun 4, 2015 |
"US-Japan cyber cooperation comes to life" |
Asian Review |
Jun 4, 2015 |
"A quarter of small businesses had their IP infringed in last five years" |
Elite Business |
Jun 3, 2015 |
"Protecting ideas and inventions 'too costly' and 'complex' for small firms" |
The Telegraph |
Jun 3, 2015 |
"The ‘Innovation Act’ exposes American companies to foreign spies" |
The Hill |
Jun 2, 2015 |
"Businesses See 106 Unknown Malware Attacks Per Hour" |
Info Security Magazine |
Jun 2, 2015 |
"Getting the Word Out About Fake Tech Support Scams" |
Blue Coat Labs |
Jun 1, 2015 |
"Cyber Attacks rising from the ashes of Communism" |
CSO Magazine |
Jun 1, 2015 |
"Recent Intellectual Property Lawsuit Reveals the Serious Nature of Insider Threats" |
IT Business Edge |
Jun 1, 2015 |
"Net of Insecurity: The Long Like of a Quick 'Fix'" |
Washington Post |
May 31, 2015 |
"Net of Insecurity: A flaw in the design" |
Washington Post |
May 30, 2015 |
"State-Sponsored Cybercrime: A Growing Business Threat" |
InformationWeek |
May 26, 2015 |
"Cyber Threat Analysis: A Call for Clarity" |
InformationWeek |
May 22, 2015 |
"More bad news: The bad guys are getting better" |
GCN |
May 22, 2015 |
"Unknown Hackers Hit Systems at Bundestag" |
Cyber Defense Magazine |
May 21, 2015 |
"'Black Cloud' darkens the enterprise to all but authorized devices" |
GCN |
May 20, 2015 |
"FireEye has become go-to company for breaches" |
USA Today |
May 20, 2015 |
"Hackers cause major data breach for Telstra's Pacnet" |
Mashable |
May 20, 2015 |
"Hackers Exposed Government Data in Breach of Telstra's Pacnet" |
Bloomberg |
May 20, 2015 |
"Cyber attacks against govt expose fatal cracks in Pakistan's digital fence" |
Dawn |
May 19, 2015 |
"Hackers just did something VERY scary" |
Komando |
May 19, 2015 |
"Login system supplies fake passwords to hackers" |
PC World |
May 19, 2015 |
"Why The Cybersecurity Domino Effect Matters" |
Forbes |
May 18, 2015 |
"Venom, Chinese attacks and DeputyDog: What we learned in security this week" |
V3.co.uk |
May 15, 2015 |
"Report warns ports, maritime industry at high risk for cyber attacks" |
MyNorthwest |
May 13, 2015 |
"The State Department's Weary Soldier in America's Cyber War" |
Foreign Policy |
May 13, 2015 |
"Russia - China Put Up United Front Against US With Cyber Treaty" |
Russia Insider |
May 12, 2015 |
"Russia and China Pledge to Fight Together for Cyber Security" |
Cloudtweaks |
May 12, 2015 |
"Fortune 500 businesses could collapse under cybercrime threat, security firm warns" |
Australian Financial Review |
May 11, 2015 |
"Russia, China May Sign Information Security Cooperation Deal on May 8" |
Sputnik International |
May 7, 2015 |
"Shamed Germany severs US spy links after they were accused of jointly spying on European governments and companies" |
Daily Mail (UK) |
May 7, 2015 |
"How Airbus Built a Security System to Protect Itself from IP Theft - that German and US Intelligence Undermined" |
DCL Search |
May 6, 2015 |
"Rombertik is a Bizarre, Scary Brilliant Piece of Self-Destructing Malware" |
Daily Tech |
May 6, 2015 |
"The impossible task of counting up the world's cyber armies" |
ZD Net |
May 6, 2015 |
"Breaches prompt lobbying surge behind cyber bill" |
The Hill |
May 5, 2015 |
"Executive Order Authorizes Sanctions against Cybercriminals" |
WeComply |
May 4, 2015 |
"Rombertik Malware Can Overwrite MBR If Audited" |
ThreatPost |
May 4, 2015 |
"Super secretive malware wipes hard drive to prevent analysis" |
ArsTechnica |
May 4, 2015 |
"India, Japan vow to crack down on cyber crimes" |
Times of India |
May 3, 2015 |
"The cyber gold rush" |
Christian Science Monitor |
May 3, 2015 |
"Air traffic system replaced amid hacking worries" |
The Hill |
May 2, 2015 |
"Why hackers target background investigation databases" |
Security Affairs |
May 1, 2015 |
"VA reaching breaking point as malware attacks rise" |
Federal Times |
Apr 30, 2015 |
"Colleges in a cyber war with hackers; open networks vulnerable to attacks" |
NorthJersey |
Apr 29, 2015 |
"6 Ways to Protect U.S. Grid from Cyber Attacks" |
Wall Street Journal |
Apr 28, 2015 |
"No monkeys for CozyDuke" |
Kaspersky Lab |
Apr 28, 2015 |
"Thin Clients & Persistent Threats: Coping With The New Cyber Dangers" |
Breaking Defense |
Apr 28, 2015 |
"CozyDuke's rampaging 'funny monkeys' prove no one is immune to phishing" |
V3.CO.UK |
Apr 27, 2015 |
"Hacker Implants NFC Chip In His Hand To Bypass Security Scans And Exploit Android Phones" |
Forbes |
Apr 27, 2015 |
"We are not prepared for a cyber attack on Western energy infrastructure" |
Security Affairs |
Apr 27, 2015 |
"Will Xbox Hacker Sentence Deter Others?" |
Data Breach |
Apr 27, 2015 |
"NSA veteran chief fears crippling cyber-attack on Western energy infrastructure" |
The Telegraph (UK) |
Apr 26, 2015 |
"Official: US Readying Hacking-Related Sanctions" |
ABC News |
Apr 25, 2015 |
"Apple wins patent appeal in China" |
NMFMP Blog |
Apr 24, 2015 |
"At cybersecurity gathering, the White House steps up charm offensive" |
Christian Science Monitor |
Apr 24, 2015 |
"Here's why the Pentagon is publishing its cyber-warfare rulebook" |
The Register |
Apr 24, 2015 |
"Men in black – NATO's cybermen" |
NATO |
Apr 24, 2015 |
"What's new in the U.S. cyber strategy" |
Washington Post |
Apr 24, 2015 |
"Foreign hacker sentenced for first time ever in US" |
Delaware Online |
Apr 23, 2015 |
"Official: State Department Hit By Hackers 'Thousands of Times a Day'" |
Washington Free Beacon |
Apr 23, 2015 |
"Pentagon Announces New Strategy for Cyberwarfare" |
New York Times |
Apr 23, 2015 |
"Pentagon cybersecurity strategy comes with olive branch to Silicon Valley" |
Christian Science Monitor |
Apr 23, 2015 |
"Pentagon Responds to Russian Hacker Breach by 'Showing a Little Leg'" |
VICE |
Apr 23, 2015 |
"Pentagon: Cyberwarfare a viable option in conflicts with enemies" |
CBS News |
Apr 23, 2015 |
"RSA 2015: Panelists debate a way forward for matters of cyber conflict" |
SC Magazine |
Apr 23, 2015 |
"The new German spying scandal is a big deal" |
Washington Post |
Apr 23, 2015 |
"Why U.S. Grid Still Vulnerable to Cyber Attack" |
Deloitte CIO Journal |
Apr 22, 2015 |
"Feds Warn Airlines To Look Out For Passengers Hacking Jets" |
Wired |
Apr 21, 2015 |
"Hacker's Tweet Reignites Ugly Battle Over Security Holes" |
Wired |
Apr 21, 2015 |
"RSA President Amit Yoran offers up a five-point plan to deal with the new security environment" |
NetworkWorld |
Apr 21, 2015 |
"Smart City Technology May Be Vulnerable to Hackers" |
New York Times |
Apr 21, 2015 |
"Snowden revelations just gave China more ammunition against US hacking" |
Democratic Underground |
Apr 21, 2015 |
"Internet Security Threat Report" |
Symantec |
Apr 20, 2015 |
"Snowden revelations just gave China more ammunition against US hacking" |
Business Insider |
Apr 20, 2015 |
"Future of U.S. Cybersecurity In the Hands of U.S. Congress, Many of Whose Members Don't Know How to Use Email" |
Matthew Aid |
Apr 19, 2015 |
"The Pentagon's new cyber attack plan: 'Blunt force trauma'" |
POLITICO |
Apr 18, 2015 |
"Hackers have 'begun targeting nuclear power plants,' cyber warfare expert warns" |
Jerusalem Post |
Apr 16, 2015 |
"ICE, CBP hosts intellectual property rights training in Kuwait" |
U.S. ICE |
Apr 16, 2015 |
"2015 Data Breach Investigation Report" |
Verizon |
Apr 15, 2015 |
"Disneyland IP to be protected" |
Shanghai.Gov |
Apr 15, 2015 |
"Verizon Releases 2015 Data Breach Investigation Report" |
SurfWatch |
Apr 15, 2015 |
"Why Standardized Threat Data Will Help Stop the Next Big Breach" |
Information Week |
Apr 15, 2015 |
"'APT-On-APT' Action" |
Information Week |
Apr 14, 2015 |
"Caught in the Crossfire: The Business Impact of Cyberwar and High Tech Espionage" |
Tripwire |
Apr 14, 2015 |
"The Wolves of Vuln Street - The First System Dynamics Model of the 0day Market" |
HackerOne |
Apr 14, 2015 |
"Japan - Record-Breaking Trade Secret Cases" |
Conventus Law |
Apr 13, 2015 |
"LETTER: It's time to 'get serious' about theft of intellectual property" |
Sioux City Journal |
Apr 12, 2015 |
"Thousands could launch Sony-style cyberattack, says ex-hacker" |
CNet |
Apr 12, 2015 |
"Will China and America Clash in Cyberspace?" |
The National Interest |
Apr 12, 2015 |
"Hacking Critical Infrastructure is Accelerating and More Destructive" |
Gov Tech |
Apr 11, 2015 |
"Another Reason For Ubiquitous Web Encryption: To Neuter China's 'Great Cannon'" |
Forbes |
Apr 10, 2015 |
"Cyber Security of Critical Infrastructures in the Americas" |
Trend Micro |
Apr 10, 2015 |
"Qubits Haven: Quantum Broadband Breakthrough to Give Hackers Many a Sleepless Night" |
World Industrial Reporter |
Apr 10, 2015 |
"The 'Great Cannon' is Chinas Powerful New Hacking Weapon" |
Motherboard |
Apr 10, 2015 |
"Global Tensions Increase Cyber Threat" |
Financial Times |
Apr 9, 2015 |
"'Digital Oilfield' Vulnerable to Cyber Threats" |
Brink News |
Apr 7, 2015 |
"Many big companies are still vulnerable to the biggest computer bug ever discovered, report says" |
InstaMun |
Apr 7, 2015 |
"Former Cyber-Security Czar Says Network Perimeter Defenses Don't Work" |
eWeek |
Apr 6, 2015 |
"National Security Council Advisor Urges US-China Cybersecurity Cooperation" |
Dark Matters |
Apr 6, 2015 |
"Promoting Norms for Cyberspace" |
Council on Foreign Relations |
Apr 6, 2015 |
"Trade secrets and national security" |
CSTV Univ. Waterloo |
Apr 6, 2015 |
"U.S. Seizure of Jewelry, Watches by Value Drops 25% to $375M" |
Rapaport |
Apr 6, 2015 |
"Why it's so hard to create norms in cyberspace" |
Washington Post |
Apr 6, 2015 |
"Arrested hacker pleads guilty to $100 million theft of Microsoft, Valve, U.S. Army data" |
Digital Munition |
Apr 2, 2015 |
"Google, Firefox will pop up warnings to indicate exposure to hackers if users visit the Chinese sites" |
Techworm |
Apr 2, 2015 |
"Obama Draws Cyber Line in Sand" |
TechNewsWorld |
Apr 2, 2015 |
"Watch Out Would-Be Hackers! The United States Is Playing Cyber Hard Ball" |
The Diplomat |
Apr 2, 2015 |
"Are Hackers Threatening to Punch America's Lights Out?" |
Investment U |
Apr 1, 2015 |
"Influencers: Companies should not be allowed to hack back" |
Christian Science Monitor |
Apr 1, 2015 |
"New Obama Order Allows Sanctions Against Foreign Hackers" |
Wired |
Apr 1, 2015 |
"New Obama Order Allows Sanctions Against Foreign Hackers" |
Wired |
Apr 1, 2015 |
"Obama Declares Hacking a 'National Emergency'" |
Motherboard |
Apr 1, 2015 |
"Obama Emergency Cyber Sanctions 'Another Salvo In War On Legitimate Hackers'" |
Forbes |
Apr 1, 2015 |
"Obama targets foreign hackers and state-owned companies over cyber-attacks" |
The Guardian |
Apr 1, 2015 |
"Opinion: Sanctions may be Obama's best idea yet to battle cyberattacks" |
Christian Science Monitor |
Apr 1, 2015 |
"The Obama administration just opened a new 'weaponization of finance' front" |
Business Insider |
Apr 1, 2015 |
"U.S. establishes sanctions program to combat cyberattacks, cyberspying" |
Washington Post |
Apr 1, 2015 |
"U.S. targets overseas cyber attackers with sanctions program" |
Reuters |
Apr 1, 2015 |
"War on Hackers: a Clear and Present Danger" |
Errata Security |
Apr 1, 2015 |
"Hackers attack the energy industry with malware designed for snooping" |
Fortune |
Mar 31, 2015 |
"Taiwan: A Useful Ally Against China's Cyber Warriors?" |
The Diplomat |
Mar 31, 2015 |
"DARPA Launches 'Plan X' to Defeat Chinese and Russian Hackers" |
China Topix |
Mar 29, 2015 |
"The Pentagon is building an app store for cyberoperations" |
Christian Science Monitor |
Mar 29, 2015 |
"Cyber War and Cyber Profits" |
Money & Markets |
Mar 23, 2015 |
"Defence Ministry Warns of Espionage Attempts by China, Pakistan; Sounds Red Alert" |
International business Times |
Mar 23, 2015 |
"Hackers Have Found a Way to Get into Nearly Every Computer" |
BullFax |
Mar 23, 2015 |
"Many computers vulnerable to BIOS leak (HP and DELL are included)" |
CyberWarZone |
Mar 23, 2015 |
"The US has started to put bounties on the heads of hackers" |
Business insider |
Mar 23, 2015 |
"Everything is insecure and will be forever says Cisco CTO" |
The Register |
Mar 22, 2015 |
"Gone in 60 seconds: Chinese hackers shut down Adobe Flash, Internet Explorer ... but only for top hackathon" |
South China Morning Post |
Mar 21, 2015 |
"Future Crimes -- A Guide To Tech Threats From Hackers, China, Google And Facebook" |
Forbes |
Mar 20, 2015 |
"No Browser is safe : Chrome, Firefox, Internet Explorer, Safari all hacked at Pwn2Own contest" |
TechWorm |
Mar 20, 2015 |
"Major US health insurer hacked, affecting 11 million" |
Business Standard |
Mar 18, 2015 |
"Authorities Closing In on Hackers Who Stole Data From JPMorgan Chase" |
New York Times |
Mar 15, 2015 |
"Cybersecurity firms hunt foreign spies" |
ABS-CBN News |
Mar 15, 2015 |
"Website Hackers Slip Under The Radar With Impersonator Bots" |
TechCrunch |
Mar 14, 2015 |
"Equation Group is NSA in Disguise New evidence by Kaspersky researchers suggests" |
TechWorm |
Mar 12, 2015 |
"Politics intrude as cybersecurity firms hunt foreign spies" |
Reuters |
Mar 12, 2015 |
"Banks warned to stay out of politics as state-sponsored cyber-attacks get personal" |
OTC Space |
Mar 11, 2015 |
"Justice Dept. vows to strike harder against hackers, nations behind cyberattacks" |
Christian Science Monitor |
Mar 9, 2015 |
"Pentagon to hire 3000 hackers" |
IT News |
Mar 9, 2015 |
"Millions at risk from 'Freak' encryption bug" |
ITP |
Mar 8, 2015 |
"Animals in the APT Farm" |
SecureList |
Mar 6, 2015 |
"Efforts To Team Up And Fight Off Hackers Intensify" |
Information Week |
Mar 5, 2015 |
"Georgia: Giving Up the Pirate Life?" |
Eurasianet |
Mar 5, 2015 |
"One Way to Counter Chinese Hacking: Poison the Well" |
Real Clear Defense |
Mar 5, 2015 |
"4 Top Hacker Groups And What They Want" |
Make Use Of |
Mar 4, 2015 |
"A New Economic Threat: State-Sponsored Hacking" |
Investopedia |
Mar 4, 2015 |
"Who's Really Spreading through the Bright Star?" |
Secure List |
Mar 4, 2015 |
"'FREAK' - New SSL/TLS Vulnerability Explained" |
The Hacker News |
Mar 3, 2015 |
"Lockheed sees shift in focus on infrastructure cyber security" |
Reuters |
Mar 2, 2015 |
"North Korean Cyber Attack on Sony Poses Tough Security Questions" |
National Defense Magazine |
Mar 2, 2015 |
"The Democratization of Cyberattack" |
Schneier on Security |
Mar 2, 2015 |
"What You Need To Know About Nation-State Hacked Hard Drives" |
Information Week |
Mar 2, 2015 |
"What's Next in Government Surveillance" |
The Atlantic |
Mar 2, 2015 |
"Wall Street Journal CIO Network Event: Old Thinking Won't Fix New Problems" |
Bromium |
Feb 27, 2015 |
"'Cyber Armageddon' not likely to wipe out US, intelligence director says" |
Ars Technica |
Feb 26, 2015 |
"Hackers Steal Trading Algorithms" |
Data Breach Today |
Feb 26, 2015 |
"Lenovo Website Hijacked" |
Data Breach Today |
Feb 26, 2015 |
"Part III: Solving the mystery of shadow hacking organization The Equation Group" |
RedOrbit |
Feb 26, 2015 |
"Part II: Solving the mystery of shadow hacker organization The Equation Group" |
RedOrbit |
Feb 25, 2015 |
"Cybercrime, Cyber Espionage Tactics Converge" |
Information Week |
Feb 24, 2015 |
"Despite Increased Awareness, Hackers Can Still Breach Your Network in Under 30 Minutes" |
Whir |
Feb 24, 2015 |
"From Hacking Systems To Hacking People" |
Information Week |
Feb 24, 2015 |
"Mandiant Report: Beyond the Breach" |
FireEye |
Feb 24, 2015 |
"Part I: Solving the mystery of shadow hacker organization The Equation Group" |
RedOrbit |
Feb 24, 2015 |
"What NSA Director Mike Rogers Doesn't Get About Encryption" |
Cato Institute |
Feb 24, 2015 |
"Three hacking groups you need to know" |
The Hill |
Feb 23, 2015 |
"A Russian cyber-security company is impressing the skeptics" |
Business Insider |
Feb 22, 2015 |
"Ars: SSL-Busting Code That Threatened Lenovo Users Found In a Dozen More Apps" |
Slashdot |
Feb 22, 2015 |
"Cyberspying Targets Energy Secrets Intruders seek data on oil deposits, cutting-edge technology" |
CyberArmyBD |
Feb 22, 2015 |
"Why are we still constantly surprised that Intelligence (espionage) Agencies do exactly what they're supposed to do?" |
Cytegic |
Feb 22, 2015 |
"NSA helped British steal cell phone codes" |
South China Morning Post |
Feb 20, 2015 |
"Visual Hacking Is Highly Successful at Getting Sensitive Information" |
SoftPedia |
Feb 20, 2015 |
"Equation Group: from Houston with love" |
SecureList |
Feb 19, 2015 |
"Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections" |
ArsTechnica |
Feb 19, 2015 |
"Lenovo to stop pre-installing controversial software" |
Reuters |
Feb 19, 2015 |
"The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle" |
The Intercept |
Feb 19, 2015 |
"The Secret's Out: NSA Personnel are Out-Hacking the Chinese and Russians" |
To Inform is to Influence |
Feb 19, 2015 |
"New Report Highlights China's Cybersecurity Nightmare" |
The Diplomat |
Feb 18, 2015 |
"Hacked Hardware Could Cause The Next Big Security Breach" |
Popular Science |
Feb 17, 2015 |
"Examining the Risks and Advantages of Biohacking" |
ThreatPost |
Feb 16, 2015 |
"Newly Discovered 'Master' Cyber Espionage Group Trumps Stuxnet" |
Information Week |
Feb 16, 2015 |
"Russian researchers expose breakthrough U.S. spying program" |
Reuters |
Feb 16, 2015 |
"Google's Project Zero gets tough on companies with lax security patch policies" |
TechWorm |
Feb 15, 2015 |
"Best hacker defense? Let them in, experts say." |
Christian Science Monitor |
Feb 11, 2015 |
"Daniels: CTIIC will take pressure off White House" |
FCW |
Feb 11, 2015 |
"Let hackers in - experts say traps might be better than walls" |
National Cyber Security |
Feb 11, 2015 |
"Possible Cyber-Attack at Defense Agency" |
Data Breach Today |
Feb 11, 2015 |
"US Creates Cyber-CIA to Fight Hackers" |
Space War |
Feb 11, 2015 |
"Business, the Feds and Cybersecurity" |
Wall Street Journal |
Feb 9, 2015 |
"Canadian agencies use data stolen by foreign hackers, memo reveals" |
Globe and Mail |
Feb 6, 2015 |
"China frees Canadian held on spying charge" |
Global News (Canada) |
Feb 5, 2015 |
"iOS Devices Targeted by Cyber-Espionage Campaign" |
SoftPedia |
Feb 5, 2015 |
"Army readies for digital battlefield" |
Times of India |
Feb 4, 2015 |
"Guest Post: Two Years Later, The EU's Cybersecurity Strategy Stumbles Forward" |
Council on Foreign Relations |
Feb 3, 2015 |
"New Technology Detects Hacks in Milliseconds" |
Bloomberg |
Feb 3, 2015 |
"Another Unpatched Adobe Flash Zero-Day vulnerability Exploited in the Wild" |
The Hacker News |
Feb 2, 2015 |
"Malware: Software with malice" |
Northbay Business Journal |
Feb 2, 2015 |
"Target Malware Kingpins" |
Brookings Institute |
Feb 2, 2015 |
"US ups stakes in cyberwarfare" |
Aljazeera |
Jan 29, 2015 |
"What every utility should know about the new physical security standard" |
Intelligent Utility |
Jan 29, 2015 |
""Game of Threats" PwC's new game to create awareness against hacking" |
TechWorm |
Jan 27, 2015 |
"Digital Jihad: Isis, Al Qaeda Seek a Cyber Caliphate to Launch Attacks on US" |
Unity Coalition for Israel |
Jan 27, 2015 |
"We Are On Notice: Terrorists Target Grids" |
Breibart |
Jan 27, 2015 |
"The Threat of International Cyber Hacking" |
Economy Watch |
Jan 24, 2015 |
"Unregulated cyberspace a cause for concern" |
East Asia Forum |
Jan 24, 2015 |
"Companies Will Increasingly Be in the Cross-Hairs of Nation-State Cyber-Attacks" |
EMC |
Jan 23, 2015 |
"Why the Sony Hack Matters" |
Elsevier |
Jan 23, 2015 |
"Cisco 2015 Annual Security Report" |
CiscoZine |
Jan 21, 2015 |
"Senate: Homeland Security Totally Screwed Up Cyber Defense" |
Sputnik News |
Jan 17, 2015 |
"CISP Report: Sony Pictures Entertainment hacked" |
CERT-UK |
Jan 16, 2015 |
"Governments Struggle to Respond to Hackers" |
Defense News |
Jan 16, 2015 |
"Hackers Managing Infiltration Almost 'At Will,' Says FireEye" |
spam News |
Jan 16, 2015 |
"Need Some Espionage Done? Hackers Are for Hire Online" |
To Inform Is To Influence |
Jan 16, 2015 |
"Needed: an international cyber treaty" |
Asia Times |
Jan 16, 2015 |
"US and UK declare red-team CYBER WAR – on EACH OTHER" |
The Register |
Jan 16, 2015 |
"Spear-Fishing Website Hosts Outlook Web App Phishing Page" |
Softpedia |
Jan 15, 2015 |
"The modern hacker takes on a new role" |
A Breaking News |
Jan 15, 2015 |
"UK and US spies to carry out fake hacking attacks on banks, airlines and nuclear plants" |
Daily Mail |
Jan 15, 2015 |
"Malicious hackers use simple email scam to WRECK German steel mill" |
Mirror |
Jan 14, 2015 |
"New report: DHS is a mess of cybersecurity incompetence" |
ZDNet |
Jan 14, 2015 |
"Why CENTCOM Was Cyber Stupid" |
The National Interest |
Jan 14, 2015 |
"British Hacker Linked To Attack On Pentagon Twitter Feed" |
Huffington Post |
Jan 13, 2015 |
"Exploits: The Next Generation" |
Public Technology |
Jan 13, 2015 |
"How Should The US Respond To Cyber Attacks?" |
Task & Purpose |
Jan 13, 2015 |
"Maginot Revisited: More Real-World Results from Real-World Tests" |
FireEye |
Jan 13, 2015 |
"Security Experts React to President's Cybersecurity Proposals" |
IT News |
Jan 13, 2015 |
"US probes military account hack" |
Technology Spectator |
Jan 13, 2015 |
"'Skeleton Key' Malware Bypasses Active Directory" |
Information Week |
Jan 12, 2015 |
"Malware Statistics" |
AV-Test |
Jan 12, 2015 |
"Mutually Assured Destruction? Nation States on the Cyber Offensive" |
Veracode |
Jan 12, 2015 |
"Skeleton Key Malware Analysis" |
Dell |
Jan 12, 2015 |
"Study: Majority of enterprises breached in first half of 2014, regardless of vertical" |
SC Magazine |
Jan 12, 2015 |
"Wrong message sent in the Sony hack debate" |
The Hill |
Jan 12, 2015 |
"Ireland on frontline in cyber war as hackers box clever" |
Independent |
Jan 11, 2015 |
"Stuxnet-like cyberattack on German steel plant deepens security concerns" |
Homeland Security News Wire |
Jan 9, 2015 |
"Today's computers face more attacks than ever" |
CNet |
Jan 9, 2015 |
"10 Ominous State-Sponsored Hacker Groups" |
ListVerse |
Jan 8, 2015 |
"Hacking Attack Causes Physical Damage at German Steel Mill" |
Schneier on Security |
Jan 8, 2015 |
"How NOT To Be The Next Sony: Defending Against Destructive Attacks" |
Information Week |
Jan 8, 2015 |
"As cyber attacks swell, a move toward improved industry collaboration" |
Fortune |
Jan 7, 2015 |
"Sony Cyber Hacking Fallout: Lawful Cowboys Versus Elizabethan Pirates" |
Cold War Daily |
Jan 5, 2015 |
"The Sony Hackers and the Blame Game" |
Bloomberg |
Jan 5, 2015 |
"We Still Don't Know Who Hacked Sony" |
The Atlantic |
Jan 5, 2015 |
"Hunting the hackers: Tough and getting tougher, but more important than ever" |
ZDNet |
Jan 4, 2015 |
"Is Kim Jong Un innocent?" |
The Economist |
Jan 3, 2015 |
2014 |
"China Begins Investigating Hacking on S. Korea's Nuclear Manager" |
KBS World |
Dec 31, 2014 |
"IT Security Year in Review: Start-Stop-Stay 2015" |
Anitian |
Dec 31, 2014 |
"Sony hackers threaten attack on US news organization" |
New York Post |
Dec 31, 2014 |
"Who infiltrated GOV.AF? - Chinese Hackers or US Hackers?" |
Bashir |
Dec 31, 2014 |
"FBI Investigating Whether Companies Are Engaged in Revenge Hacking" |
Bloomberg |
Dec 30, 2014 |
"The Year of the Breach: 10 Federal Agency Data Breaches in 2014" |
Nextgov |
Dec 30, 2014 |
"Hacker fakes German minister's fingerprints using photos of her hands" |
The Guardian |
Dec 30, 2014 |
"A number of private security researchers are increasingly voicing doubts that the hack of Sony's computer systems was the work of North Korea" |
Boston Globe |
Dec 24, 2014 |
"Deadline Looms as Hackers Threaten to Destroy Control Systems of Nuclear Facilities" |
Alternative News |
Dec 24, 2014 |
"These Cybersecurity Experts Still Don't Think North Korea Hacked Sony" |
WRC |
Dec 24, 2014 |
"Attributing Cyber Attacks" |
Journal of Strategic Studies |
Dec 23, 2014 |
"South Korean nuclear operator hacked amid cyber-attack fears" |
The Guardian |
Dec 23, 2014 |
"North Korea Loses Its Link to the Internet" |
New York Times |
Dec 22, 2014 |
"Cyberattack on German Iron Plant Causes 'Widespread Damage': Report" |
Wall Street Journal |
Dec 18, 2014 |
"ICANN Spear Phishing Attack Strikes at the Heart of the Internet" |
Info Security Magazine |
Dec 18, 2014 |
"What Did Federal CIOs Learn About Cybersecurity in 2014?" |
Nextgov |
Dec 18, 2014 |
"5 lessons from the Sony hack" |
CNN |
Dec 17, 2014 |
"Report: North Korea May Be Behind Sony Pictures Hack After All (Update)" |
Gizmodo |
Dec 17, 2014 |
"Sony Pictures Breach: Saga Yields Insight On Basic Security Lapses" |
CRN |
Dec 17, 2014 |
"Top 10 information security bloggers in 2014" |
27001 Academy |
Dec 17, 2014 |
"India remains a laggard in innovation, China overtakes US" |
Live Mint |
Dec 16, 2014 |
"Cyber attack: Waiting to strike" |
Khaleej Times |
Dec 15, 2014 |
"Sony hacked in February, knew about security flaws before data leak" |
Network World |
Dec 14, 2014 |
"Sony ignored security evaluation before GOP hack, more data coming" |
Electronista |
Dec 14, 2014 |
"The Sony Pictures hack: Everything we know so far" |
TheNextWeb |
Dec 13, 2014 |
"Here's How Cyber-Warfare Started And Where It's Going" |
Business Insider |
Dec 12, 2014 |
"No Respite for Sony" |
TechNewsWorld |
Dec 12, 2014 |
"SONY INSIDER: 'The Security Team Has No F---ing Clue'" |
Business Insider |
Dec 12, 2014 |
"Digital Spies Target Diplomats' iPhones, Androids And PCs With 'Inception' Malware" |
Forbes |
Dec 10, 2014 |
"Stealthy 'Inception' attack framework detailed; possible return of 'Red October' group" |
SC Magazine |
Dec 10, 2014 |
"The Year of Hacking Dangerously" |
Bloomberg |
Dec 10, 2014 |
"Blue Coat Exposes 'The Inception Framework'; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Business Execs" |
Blue Coat |
Dec 9, 2014 |
"Cyber attack could cost Sony studio as much as $100 million" |
Reuters |
Dec 9, 2014 |
"A huge intelligence screw-up turned the government and private companies into cyberwarfare partners" |
PRI |
Dec 8, 2014 |
"Kaspersky: That 2 years we took to warn you about Regin? We had GOOD REASON" |
The Register |
Dec 5, 2014 |
"Russia and China have the best hackers" |
BetaNews |
Dec 4, 2014 |
"Sony Hack: 'Destover' Malware Identified" |
Data Breach Today |
Dec 4, 2014 |
"Sony Hackers Knew Details Of Sony's Entire IT Infrastructure" |
Information Week |
Dec 4, 2014 |
"Why 'Regin' Malware Changes Threatscape Economics" |
Information Week |
Dec 4, 2014 |
"Did North Korea really hack Sony Pictures? Some experts aren't so sure" |
Mashable |
Dec 3, 2014 |
"Inside the "wiper" malware that brought Sony Pictures to its knees [Update]" |
Ars Technica |
Dec 3, 2014 |
"Sony Blames North Korea for Hacking, but Washington Left Them Completely Vulnerable" |
Daily Beast |
Dec 3, 2014 |
"Sony Pictures denounces 'brazen' cyberattack but downplays North Korea role" |
The Guardian |
Dec 3, 2014 |
"UPDATED: Top 18 Most Important Internet Security Events & Threats of 2014" |
Heimdal Security |
Dec 3, 2014 |
"Cyber Ring Corporate Secrets Heist Uncovered: Cyber-Espionage Ring Threatens US Stock Market" |
Jobs & Hire |
Dec 2, 2014 |
"Cyber Round Up: Hacking Wall Street; FBI Warning Post Sony Malware; Hacking E-Cigs, Parking Lots, and Issues with Cryptography" |
Cyber Security Law and Policy |
Dec 2, 2014 |
"Exclusive: FBI warns of 'destructive' malware in wake of Sony attack" |
MSN |
Dec 2, 2014 |
"FBI warns of major malware-based attacks following the Sony Pictures hack" |
Security Affairs |
Dec 2, 2014 |
"400 Hackers Are Defending NATO in a Massive Cyberwar Game" |
Indian Defense |
Dec 1, 2014 |
"Did Hackers Gain an Edge on Wall Street?" |
Wall Street Journal |
Dec 1, 2014 |
"Hackers gave Sony Pictures Entertainment a major headache Thanksgiving week" |
Washington Post |
Dec 1, 2014 |
"Hackers target biotech firms in bid to rig insider trades: FireEye" |
The Globe and Mail |
Dec 1, 2014 |
"Law Firms Are a Weak Link For Hackers: Finch" |
Bloomberg |
Dec 1, 2014 |
"Q&A: Shaun Rein, China expert, on why the nation has traded copying for innovation" |
EIN News |
Nov 28, 2014 |
"The Five Ws of REGIN" |
Cyber Security Law and Policy |
Nov 27, 2014 |
"Cyber Hackers Could Cause An Economic Collapse, President Obama Warns" |
Survival Based |
Nov 26, 2014 |
"Government is the #1 Cyber-Criminal!" |
Venitism |
Nov 25, 2014 |
"Obama Sends a C-17 to a Chinese Air Show Despite Concerns Inside the Pentagon" |
YourNewsWire |
Nov 25, 2014 |
"'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described" |
The Register |
Nov 24, 2014 |
"Cyber Round Up: REGIN Malware; Egyptian Cyber Army; Potential Iran Cyber Attacks; State-Sponsored Hackers VS Human Rights Groups" |
Cyber Security Law and Policy |
Nov 24, 2014 |
"Cybersecurity was missing in action on Election Day" |
EIN News |
Nov 24, 2014 |
"Regin: Top-tier espionage tool enables stealthy surveillance" |
Symantec |
Nov 24, 2014 |
"Super Sophisticated Malware "Regin" has been Spying on Users for Years" |
LiquidThink |
Nov 24, 2014 |
"World's most advanced hacking spyware uncovered" |
Mail Online (UK) |
Nov 24, 2014 |
"Computer spying malware uncovered with 'stealth' features: Symantec" |
The Boston Journal |
Nov 23, 2014 |
"Computer spying malware uncovered with 'stealth' features: Symantec" |
The Boston Journal |
Nov 23, 2014 |
"Fury as China unveils £14,000 copy of Range Rover" |
Mail Online (UK) |
Nov 23, 2014 |
"Here's What Chinese Hackers Can Actually Do To The US Power Grid" |
Business Insider |
Nov 23, 2014 |
"Here's What Chinese Hackers Can Actually Do To The US Power Grid" |
Business Insider |
Nov 23, 2014 |
"Intel boss' warning on cyber attacks no joke, say experts" |
Fox News |
Nov 23, 2014 |
"JPMorgan Hacking Raises Alarm About Banks' Cyber Defences" |
Bloomberg |
Nov 23, 2014 |
"JPMorgan Hacking Raises Alarm About Banks' Cyber Defences" |
Bloomberg |
Nov 23, 2014 |
"Hacked: When Cyber Spies Attack" |
Top Documentary Films |
Nov 22, 2014 |
"Extensive Network of Secret Chinese Military Units Attack US on Daily Basis" |
EIN News |
Nov 21, 2014 |
"NATO Conducts Seventh Annual Cyber Coalition Exercise" |
Cyber Security Law and Policy |
Nov 21, 2014 |
"NSA: China thefts could lead to attack" |
Trib Live |
Nov 21, 2014 |
"Foreign Governments Have Hacked U.S. Grid, NSA Head Says" |
Bloomberg |
Nov 20, 2014 |
"NSA Director Says Chinese Cyber Hackers Can Shut Down U.S. Power Grid" |
Inquisitor |
Nov 20, 2014 |
"NSA Director: Yes, China Can Shut Down Our Power Grids" |
Business Insider |
Nov 20, 2014 |
"NSA Worries Hackers May Shut Down American Utilities" |
ABC News |
Nov 20, 2014 |
"U.S. Congress urged to consider sanctions on Chinese cyber-spies" |
Reuters |
Nov 20, 2014 |
"U.S. Electrical, Financial Networks Mapped for Future Cyber Attacks" |
Washington Free Beacon |
Nov 20, 2014 |
"US Control Systems Have Been Hacked By Nation States - NSA Director Warns 'This Is Not Theoretical'" |
Cyber Security Law and Policy |
Nov 20, 2014 |
"10 top security threats of 2014 (so far)" |
ZD Net |
Nov 19, 2014 |
"Cyber War - US State Department Hacked" |
Check & Secure |
Nov 19, 2014 |
"Hewlett Foundation lays out MEELLIONS on security" |
The Register |
Nov 19, 2014 |
"Stronger Locks and Taller Fences Won't Stop Cybercrime" |
1776 |
Nov 19, 2014 |
"Three suspects arrested in china for spreading WireLurker malware" |
E Hacking News |
Nov 19, 2014 |
"Chinese authorities arrest three over iOS malware" |
BBC |
Nov 18, 2014 |
"Chinese Hackers? Russian Hackers? Hacktivists? Uncertainty Behind the Source of the Recent Breaches of Government Agencies" |
Cyber Security Law & Policy |
Nov 18, 2014 |
"FBI Probes Agency Computer Breaches Said to Bear Signs of Spying" |
Bloomberg |
Nov 18, 2014 |
"Hackers attacked the U.S. energy grid 79 times this year" |
CNN |
Nov 18, 2014 |
"Half of U.K. Firms Would Hire Hackers, Ex-Convicts to Secure Their Networks" |
Wall Street Journal |
Nov 17, 2014 |
"Intellectual Property: Making It Personal" |
CAGW |
Nov 17, 2014 |
"Internet Hack Shutters Some State Department Computers" |
VOA News |
Nov 17, 2014 |
"New CAGW Report on Intellectual Property" |
CAGW |
Nov 17, 2014 |
"Spate of cyber attacks target U.S. government systems" |
CBS News |
Nov 17, 2014 |
"Google's secret NSA alliance: The terrifying deals between Silicon Valley and the security state" |
Salon |
Nov 16, 2014 |
"State Department email system hacked, shut down" |
CBS News |
Nov 16, 2014 |
"State Department Targeted by Hackers in 4th Agency Computer Breach" |
New York Times |
Nov 16, 2014 |
"Ex-NSA Chief Urges Congress to Step Up Fight Against Cyberattacks" |
GovTech |
Nov 12, 2014 |
"Chinese hackers target human rights groups, Citizen Lab says" |
CBC News |
Nov 11, 2014 |
"Darkhotel malware targets travelling executives: report" |
Syndey Morning Herald |
Nov 11, 2014 |
"Can a cyber arms race with China be stopped?" |
CBS News |
Nov 10, 2014 |
"Executive Cyber Intelligence Report: November 1" |
Tripwire |
Nov 10, 2014 |
"Feds hacked: Is cybersecurity a bigger threat than terrorism?" |
Christian Science Monitor |
Nov 10, 2014 |
"Half of US cybersecurity breaches caused by staffers' misconduct" |
Russian Times |
Nov 10, 2014 |
"Information Warfare: Russia Strikes Back" |
Strategy Page |
Nov 10, 2014 |
"Line dividing hacker cyber crime, state-sponsored terror attacks is murky" |
Stars and Stripes |
Nov 7, 2014 |
"State-sponsored Hackers Gear Up for G20" |
Info Security Magazine |
Nov 7, 2014 |
"The G20 and the New Reality of Cyber Espionage" |
FireEye |
Nov 4, 2014 |
"US banks unite to identify hacking threats to global money pipelines" |
The Guardian |
Nov 4, 2014 |
"16-31 October 2014 Cyber Attacks Timeline" |
Hackmageddon |
Nov 3, 2014 |
"JPMorgan found breach through Corporate Challenge site" |
IT News (AUS) |
Nov 3, 2014 |
"Justice Department seeks massive expansion of FBI hacking powers" |
WSWS |
Nov 3, 2014 |
"Consensus sought with US on governance of Internet" |
TMC News |
Nov 2, 2014 |
"How Did Russians Hack The White House?" |
KnowBe4 |
Nov 1, 2014 |
"Trade Law As A Tool Against Chinese Hackers" |
Whitcomb Law |
Nov 1, 2014 |
"Cybersecurity Not Just about Hackers" |
DFI News |
Oct 31, 2014 |
"Hackers Infiltrate White House Network" |
security Week |
Oct 31, 2014 |
"White House cyber breach - Is Anything Safe?" |
National Cybersecurity Institute |
Oct 31, 2014 |
"GE and Siemens targeted by hackers" |
PEI |
Oct 30, 2014 |
"Nato frontline in life-or-death war on cyber-terrorists" |
The Guardian |
Oct 30, 2014 |
"White House hack just the beginning: experts say major cyberattack coming soon" |
Sydney Morning Herald |
Oct 30, 2014 |
"Cyber Attacks Likely to Increase" |
Pew Research |
Oct 29, 2014 |
"The link you just clicked may not be real" |
iPolitics |
Oct 29, 2014 |
"Unwitting Workers Give Hackers Keys to Fortune 500 Firms' Networks: Study" |
NBC News |
Oct 29, 2014 |
"These Are The Hacker Groups That Should Be Keeping You Up At Night" |
Business Insider |
Oct 28, 2014 |
"US eyes cyber 'deterrence' to stop hackers" |
Phys.org |
Oct 28, 2014 |
"Chinese-Russian Relations Enter Cyberspace" |
Indian Strategic Studies |
Oct 27, 2014 |
"Continuing Federal Cyber Breaches Warn Against Cybersecurity Regulation" |
Heritage Foundation |
Oct 27, 2014 |
"Researchers uncover sophisticated cyber espionage campaign" |
Computer Weekly |
Oct 27, 2014 |
"Russia and China to sign cyber-security treaty in November" |
Computing (UK) |
Oct 26, 2014 |
"The Sorry State of Cybersecurity" |
CIO Insight |
Oct 26, 2014 |
"Micro-Targeting Malvertising Via Real-Time Ad Bidding" |
Invincea |
Oct 25, 2014 |
"NIST finalizes cloud computing roadmap" |
SC Magazine |
Oct 23, 2014 |
"Apple update on iCloud.com security" |
Apple |
Oct 22, 2014 |
"Chinese NOAA employee caught stealing dam info" |
SurvivalMonkey |
Oct 22, 2014 |
"The 'Cloud' is DEFINITELY a Huge and Tempting Target for Hackers" |
MPG |
Oct 22, 2014 |
"US focus on naming foreign hackers gets criticized" |
The Hill |
Oct 22, 2014 |
"US security prosecutors focus on cyber" |
IT Web |
Oct 22, 2014 |
"Malvertising Campaigns Hit Us Military Industry to Steal Secrets and Intellectual Property" |
Cyber Defense Magazine |
Oct 20, 2014 |
"UK companies at 'higher cyber risk' than rest of world" |
The Press & Journal |
Oct 20, 2014 |
"There's a Silver Lining in the Fight Against Cyber Espionage" |
SoftPedia |
Oct 19, 2014 |
"Hackers rip into heart of open-source software" |
Trib Live |
Oct 17, 2014 |
"Sophisticated Malvertising Campaign Targets US Defense Industry" |
Information Week |
Oct 17, 2014 |
"'Malvertising' targets U.S. military firms in new twist on old web threat" |
Yahoo News |
Oct 16, 2014 |
"Cyber attacks an increasing threat for Mideast oil and gas" |
Gulf News |
Oct 16, 2014 |
"Hacking Back and the Cyber Balance of Power" |
Huffington Post |
Oct 14, 2014 |
"I Know It's A Shock, But Law Firms Are Jeopardizing Client Information" |
Above the Law |
Oct 14, 2014 |
"Techno-nationalism in China's rise: the next gunpowder moment" |
The Strategist (AUS) |
Oct 14, 2014 |
"Fighting in the cyber trenches" |
EIN News |
Oct 13, 2014 |
"The Coming of Global Cyber War?" |
Intervid |
Oct 11, 2014 |
"China Makes Efforts for Better Cyber Security" |
SoftPedia |
Oct 10, 2014 |
"China angered after FBI head says Chinese hacking costs billions" |
Reuters |
Oct 9, 2014 |
"SingTel and FireEye partner to launch first Managed Defense Solution Powered By FireEye in APAC to help enterprises contain rising cyber-attacks" |
InfoTech |
Oct 9, 2014 |
"White House Cyber Chief: JP Morgan Underscores Critical Infrastructure Risk" |
Security Ledger |
Oct 9, 2014 |
"White House Shifts Its Cyber Legislative Strategy" |
Gov Info Security |
Oct 9, 2014 |
"Groups Named For First Federally Funded Cybersecurity Research Center" |
Defense News |
Oct 8, 2014 |
"Obama Had Security Fears on JPMorgan Data Breach" |
New York Times |
Oct 8, 2014 |
"Cyber attacks on critical infrastructure: Too much to C.H.E.W?" |
IT Pro Portal |
Oct 7, 2014 |
"Hackers phishing for source code from Microsoft, Apple and Oracle" |
V3.co.uk |
Oct 7, 2014 |
"Bored hackers flick Shellshock button to OFF as payloads shrink" |
The Register |
Oct 3, 2014 |
"Hackers using Shellshock to sneak into NAS systems" |
V3.co.uk |
Oct 2, 2014 |
"Shellshock: Attackers Laying Groundwork for "Massive Attacks"?" |
HackSurfer |
Oct 2, 2014 |
"State-sponsored attacks expected to get worse" |
SC Magazine |
Oct 2, 2014 |
"State-Sponsored Attacks Increasing" |
HackSurfer |
Oct 2, 2014 |
"Hackers charged in software theft from US army, others" |
Yahoo News |
Oct 1, 2014 |
"Insider incidents and high-profile crimes increasing" |
Help Net Security |
Oct 1, 2014 |
"Four Members of International Computer Hacking Ring Indicted for Stealing Gaming Technology, Apache Helicopter Training Software" |
FBI |
Sep 30, 2014 |
"Hackers charged with stealing military training software, data" |
New York Post` |
Sep 30, 2014 |
"Hackers charged with stealing over $100m in US army and Xbox technology" |
The Guardian |
Sep 30, 2014 |
"Three Steps to Protect US Intellectual Property" |
Forbes |
Sep 30, 2014 |
"U.S. Charges 4 Hackers Over Theft Of Games From Microsoft, Army" |
NPR |
Sep 30, 2014 |
"Fewer Cyber Pros, More Cyber Problems" |
NextGov |
Sep 29, 2014 |
"General counsel need to be aware of risk from hackers involving even military-related computers" |
Inside Counsel |
Sep 29, 2014 |
"UCSD fights cyber attacks targeting research" |
U-T San Diego |
Sep 28, 2014 |
"Apple 'Bash bug' could cripple millions" |
Bangkok Post |
Sep 26, 2014 |
"What We Know About Shellshock So Far, and Why the Bash Bug Matters" |
Security Week |
Sep 26, 2014 |
"'Bash' may pose bigger threat than 'Heartbleed'" |
CNBC |
Sep 25, 2014 |
"Google and Amazon Respond to Shellshock Security Flaw" |
Wall Street Journal |
Sep 25, 2014 |
"Hackers exploit 'Shellshock' bug with worms in early attacks" |
CNBC |
Sep 25, 2014 |
"Hackers exploit Shellshock bug as fixes prove ineffective" |
The Globe and Mail |
Sep 25, 2014 |
"Hackers launch attacks exploiting 'Shellshock' bug in Bash software" |
Reuters |
Sep 25, 2014 |
"Hackers steal crucial info from India’s biggest airport operator- AAI" |
Trans Asia News Srvice |
Sep 25, 2014 |
"Security Experts Expect ‘Shellshock’ Software Bug in Bash to Be Significant" |
New York Times |
Sep 25, 2014 |
"Airports Authority of India (AAI) hacked, critical data compromised" |
Tech Worm |
Sep 24, 2014 |
"A Decoy Computer Was Set Up Online. See Which Countries Attacked It the Most" |
Bloomberg |
Sep 23, 2014 |
"Unhappy Workers Hacking Employers on the Rise, FBI Says" |
Bloomberg |
Sep 23, 2014 |
"Israel to Create Cyber Security Authority after Alleged Iranian Hacker Attack" |
National Cyber Security |
Sep 22, 2014 |
"US House Approves New Law to Discourage Trade Secrets Theft" |
Info Security Magazine |
Sep 19, 2014 |
"Here Are The Traits Of Americans That The CIA Feared Could Make The Country Vulnerable To Economic Espionage" |
Business Insider |
Sep 18, 2014 |
"US Bolstering Cyber-Defence With New Corps: NSA Chief" |
NDTV |
Sep 16, 2014 |
"Belden Research Reveals Dragonfly Malware Likely Targets Pharmaceutical Companies" |
Business Wire |
Sep 15, 2014 |
"Defending Against the Dragonfly Cyber Security Attacks" |
Belden |
Sep 15, 2014 |
"Dragonfly malware targeting pharmaceutical companies" |
Help Net Security |
Sep 15, 2014 |
"Middle Eastern Petrochemical Plants Are Targets of Hackers" |
New York Times |
Sep 15, 2014 |
"If Russian and Chinese hackers operate with impunity, why don't we cut these nations off from the internet?" |
Quora |
Sep 12, 2014 |
"Civilian Casualties in a Cyber War?" |
ThreatGeek |
Sep 11, 2014 |
"A New Threat Grows Amid Shades of 9/11" |
Wall Street Journal |
Sep 10, 2014 |
"Every Part of the US Government Has Probably Already Been Hacked" |
Defense One |
Sep 10, 2014 |
"Studies in Intelligence: Analyzing Economic Espionage" |
CIA |
Sep 10, 2014 |
"AFP Letter to the House Republican Study Committee on Intellectual Property" |
Americans for Prosperity |
Sep 9, 2014 |
"Let's pass cybersecurity legislation" |
The Hill |
Sep 9, 2014 |
"'Undetectable' Peter Pan computer virus threatens UK businesses" |
The Telegraph |
Sep 8, 2014 |
"McAfee and Symantec join Cyber Threat Alliance" |
Help Net Security |
Sep 8, 2014 |
"The Enemy of My Enemy is My Cyber-Lessee" |
American Consumer Institute |
Sep 8, 2014 |
"The Sad Truth About Breaches: We’re All Target" |
NoVa Infosec |
Sep 6, 2014 |
"Cyber attacks: Perpetual state of siege for US companies" |
Canberra Times (AU) |
Sep 1, 2014 |
"Nato set to clarify stance on cyber attack" |
Computer Weekly |
Sep 1, 2014 |
"Reconnaissance code on industrial software site points to watering hole attack" |
PC Advisor (UK) |
Sep 1, 2014 |
"Cyberwars: The Month of Cyberattacks" |
Stories by Williams |
Aug 30, 2014 |
"Oil and energy industry in Norway is under attack" |
Security Affairs |
Aug 30, 2014 |
"What Are Hackers Thinking?" |
PC Mag |
Aug 30, 2014 |
"Banks lose $US23 million on average from cybercrime: survey" |
Canberra Times (AU) |
Aug 29, 2014 |
"Caught in the crossfire of a cyber Cold War" |
EIN News |
Aug 29, 2014 |
"JP Morgan’s security breach points to broader issues in cyber security" |
Venture Beat |
Aug 29, 2014 |
"JPMorgan Hackers Came In the Front Door -- in June. Two Months of Mayhem" |
EIN News |
Aug 29, 2014 |
"Defending Against Hackers of the Future" |
Bloomberg |
Aug 28, 2014 |
"Hackers break into Huntington’s wellness program" |
Columbus Dispatch |
Aug 27, 2014 |
"List of data breaches and cyber attacks in August" |
IT Governance |
Aug 27, 2014 |
"Alabamians file lawsuit against hospital chain after cyber-attack by Chinese hackers" |
Alabama Today |
Aug 26, 2014 |
"Cybersecurity Is A Severe And Growing Challenge For Government Contractors" |
Forbes |
Aug 26, 2014 |
"Shipping and supply chain 'next playground for hackers'" |
Supply Management |
Aug 26, 2014 |
"Software vulnerability patching is far too slow and leaves users at risk" |
BetaNews |
Aug 26, 2014 |
"Top 5 Reasons Your Small Business Website is Under Attack" |
Dark Reading |
Aug 26, 2014 |
"It Does Matter That The White House Cybersecurity Czar Lacks Technical Chops" |
Forbes |
Aug 25, 2014 |
"Predicting the future' to stay one step ahead of hackers" |
The Telegraph |
Aug 25, 2014 |
"Gov't Warns U.S. Retailers About Hacking Software" |
Epoch Times |
Aug 23, 2014 |
"Hacking Gmail App with 92 Percent Success Rate" |
Hacker News |
Aug 23, 2014 |
"Official says hackers hit up to 25,000 Homeland Security employees" |
Washington Post |
Aug 23, 2014 |
"White House cybersecurity leader proudly claims he knows nothing about cybersecurity" |
TechTimes |
Aug 23, 2014 |
"As security breach reports mount, experts fear alert fatigue" |
CNet |
Aug 22, 2014 |
"Constant Hacking Leads to Making Fakes in China in Just One Day" |
Business Korea |
Aug 22, 2014 |
"DHS Cybersecurity Program Finds Few Takers" |
GovTech |
Aug 22, 2014 |
"Healthcare Industry, Feds Talk Information Sharing" |
Dark Reading |
Aug 22, 2014 |
"U.S. undercover investigators among those exposed in data breach" |
Reuters |
Aug 22, 2014 |
"UPS, Target, Supervalu and 1,000 American Businesses Affected By Cash Register Cyberattacks" |
International Business Times |
Aug 22, 2014 |
"Worldwide Spending On Information Security To Surpass $70B By End Of 2014: Report" |
International Business Times |
Aug 22, 2014 |
"China's Hack of 4.5 Million U.S. Medical Records? This Chart Will Make You Sick" |
Bloomberg |
Aug 21, 2014 |
"Data Breaches in the U.S." |
Bloomberg |
Aug 21, 2014 |
"Hacker Or Military? Best Of Both In Cyber Security" |
Dark Reading |
Aug 21, 2014 |
"Hackers' Paradise: The rise of soft options and the demise of hard choices" |
The Register |
Aug 15, 2014 |
"Brit infosec firm lets hackers think they've stolen something" |
The Register |
Aug 14, 2014 |
"Majority of Hackers Do it for the Thrill, Believe They Won't Be Caught: Survey" |
SiteProNews |
Aug 14, 2014 |
"Doomsday scenarios to keep you up at night: Mikko Hypponen talks cyberthreats" |
Venture Beat |
Aug 13, 2014 |
"Survey: manufacturing businesses' intellectual property gets lost to security breaches" |
Kaspersky Lab |
Aug 13, 2014 |
"Why the U.S. Can't Automatically Retaliate in Cyberspace, Yet" |
Wall Street Journal |
Aug 13, 2014 |
"APAC seeing more APT attacks than other regions" |
ZDNet |
Aug 12, 2014 |
"Fifteen countries KO'd in malware one-two punch" |
The Register |
Aug 12, 2014 |
"House passes three bills to protect critical infrastructure from cyber attack" |
National Cyber Security |
Aug 12, 2014 |
"State-Sponsored Hackers from the East Attack Former Soviet Countries" |
Info Security |
Aug 12, 2014 |
"The Arms Industry Is Ripe Pickings for Hackers" |
Medium |
Aug 12, 2014 |
"The network of USIS compromised by a cyber attack" |
Security Affairs |
Aug 12, 2014 |
"The scary state of cybersecurity" |
C4ISR |
Aug 12, 2014 |
"Battling Hackers" |
National Cyber Security |
Aug 11, 2014 |
"The New Mafia: Battling Hackers Like Organized Crime" |
US News |
Aug 11, 2014 |
"China: No government ban on Apple devices" |
Times of India |
Aug 9, 2014 |
"Cyberspies Help Themselves to DHS Contractor's Data" |
Tech News World |
Aug 8, 2014 |
"Spy Agencies Hit in Cyber Espionage Campaign: Kaspersky Lab" |
PicturesDotNews |
Aug 8, 2014 |
"Ex-Citadel Worker Pleads Guilty to HFT Data Theft" |
Bloomberg |
Aug 7, 2014 |
"Homeland Security Contractor Hit by Hackers" |
Tech Times |
Aug 7, 2014 |
"Anonymous Says It Hacked the US Government Personnel Database Before China" |
Motherboard |
Aug 5, 2014 |
"Hackers can exploit USB to steal data" |
Deutsche Welle |
Aug 3, 2014 |
"Israeli Iron Dome Firms ‘Infiltrated by Chinese Hackers’" |
PicturesDotNews |
Aug 1, 2014 |
"Wild Wild Web: For Now, Cybercrime Has the Upper Hand in Its Duel with the Law" |
RAND |
Aug 1, 2014 |
"How do hackers breach institutions like Canada's NRC?" |
CTV News |
Jul 29, 2014 |
"An IT emperor with no clothes, India lays bare to cyber attacks" |
Times of India |
Jul 27, 2014 |
"NSA director: Cyber attacks need international norms" |
Aspen Daily News |
Jul 27, 2014 |
"Internet Explorer the 'Most Vulnerable' Web Browser of 2014, States Study: Time to Switch to Chrome and Firefox?" |
IBT |
Jul 26, 2014 |
"Security automation: Are humans still relevant?" |
GCN |
Jul 26, 2014 |
"Why Do We Need to Share Cyber Threat Intelligence?" |
Medium.com |
Jul 26, 2014 |
"Commentary: Congress must act now to address cybersecurity issues" |
Palm Beach Post |
Jul 25, 2014 |
"Hackers exploiting Internet Explorer to expose security flaws on a huge scale" |
The Guardian |
Jul 25, 2014 |
"Piracy Crumbling Businesses" |
Daily Guide Ghana |
Jul 25, 2014 |
"Are Certain Countries a Threat to Web Security?" |
Web Hosting Geeks |
Jul 23, 2014 |
"Businesses, Cyber Security Firms Are Coming Up With Creative Ways To Fight Hackers" |
Digital Trends |
Jul 23, 2014 |
"International tensions heighten cyber security risks for business" |
City A.M. |
Jul 23, 2014 |
"Apple "inadvertently admitted" to iOS backdoor: forensics expert" |
Network World |
Jul 22, 2014 |
"Hackers Could Take Control of Your Car. This Device Can Stop Them" |
Wired |
Jul 22, 2014 |
"It's Time to Get Ready for Cyberwar" |
Real Clear Defense |
Jul 22, 2014 |
"Preparing for cyber warfare" |
Journal Sentinel |
Jul 22, 2014 |
"The UK Cyber Security Strategy" |
U.K. Cabinet Office |
Jul 22, 2014 |
"Chinese hackers take command of Tesla Model S" |
CNet |
Jul 17, 2014 |
"Cybersecurity as Arms Control?" |
Weekly Standard |
Jul 17, 2014 |
"Google recruit world's most notorious hacker" |
HITC Tech |
Jul 17, 2014 |
"Here's How Easy It Could Be for Hackers to Control Your Hotel Room" |
Wired |
Jul 17, 2014 |
"Tesla Model S Well and Truly Hacked By Chinese Security Experts" |
Transport Evolved |
Jul 17, 2014 |
"Hack a Tesla Model S, win $10,000" |
Motoring |
Jul 16, 2014 |
"Why Hackers May Be Impersonating Your Colleagues" |
CBR Online |
Jul 16, 2014 |
"Automakers see growing threat from hackers" |
USA Today |
Jul 15, 2014 |
"British Secret Agents No More Skilled Than An 'Average Hacker'" |
Forbes |
Jul 15, 2014 |
"Google Creates Elite Team To Fight Hackers -- And Maybe The NSA" |
Huffington Post |
Jul 15, 2014 |
"Google To Tackle Security Threats With New Project Zero Team" |
RedOrbit |
Jul 15, 2014 |
"New York reports 900 data breaches in public, private institutions in 2013" |
Tech Times |
Jul 15, 2014 |
"Phony messages highlight dangers of 'real' hackers" |
Times of Israel |
Jul 15, 2014 |
"The Complex U.S. Electrical Grid Vulnerable to Cyberthreats and Physical Attack, Study Finds" |
Foreign Policy |
Jul 15, 2014 |
"Congress is overdue in dealing with the cybersecurity threat" |
Washington Post |
Jul 13, 2014 |
"Hackers Inc" |
The Economist |
Jul 12, 2014 |
"Chinese Hackers Gain Access to Data of Thousands of US Federal Employees" |
RIA Novosti |
Jul 10, 2014 |
"Report: Chinese hackers hit US personnel networks" |
Bloomberg |
Jul 10, 2014 |
"Banks Dreading Computer Hacks Call for Cyber War Council" |
Bloomberg |
Jul 8, 2014 |
"Meet Google's Security Princess" |
Elle |
Jul 8, 2014 |
"Report on A Framework for International Cyber Stability" |
U.S. Dept. of State |
Jul 2, 2014 |
"Check Point 2014 Security Report" |
Checkpoint |
Jun 30, 2014 |
"Check Point Security Report 2014 - Malware in the enterprise" |
Bountolos |
Jun 30, 2014 |
"Dragonfly: Western Energy Companies Under Sabotage Threat" |
Symantec |
Jun 30, 2014 |
"Netflix Could Be Classified As a 'Cybersecurity Threat' Under New CISPA Rules" |
Motherboard |
Jun 28, 2014 |
"Beware the Dangers of Congress' Latest Cybersecurity Bill" |
ACLU |
Jun 27, 2014 |
"How Developers Battle Security Bugs" |
Forbes |
Jun 27, 2014 |
"Strengthening Property Rights and the U.S. Economy Through Federal Trade Secret Protection" |
Heritage Foundation |
Jun 27, 2014 |
"Surge in Cybersecurity Revs Up Startups" |
GCXMag |
Jun 27, 2014 |
"As Stuxnet Anniversary Approaches, New SCADA Attack Is Discovered" |
Information Week |
Jun 26, 2014 |
"Australians take title of 'best' internet pirates to new level" |
The World Today |
Jun 26, 2014 |
"The Senate's New Cybersecurity Bill Threatens Net Neutrality" |
Motherboard |
Jun 26, 2014 |
"House Judiciary Committee Looks to Strengthen Trade Secret Protection and Enforcement" |
ShopFloor |
Jun 25, 2014 |
"IBM, Lenovo Tackle Security Worries on Server Deal" |
Wall Street Journal |
Jun 25, 2014 |
"Researchers, brush up your Mandarin and get ready to spend time in China" |
The Guardian |
Jun 25, 2014 |
"Strengthening Property Rights and the U.S. Economy Through Federal Trade Secret Protection" |
Heritage Foundation |
Jun 25, 2014 |
"Theft By Led Zeppelin And Apple? No, Just Innovation" |
Forbes |
Jun 25, 2014 |
"Trade Secret Theft: The Need for a Federal Civil Remedy" |
Global Policy Watch |
Jun 25, 2014 |
"Trade Secret Theft: The Need for a Federal Civil Remedy" |
National Law Review |
Jun 25, 2014 |
"Canadian law trumps the power of Google - and that's a good thing" |
National Post (Canada) |
Jun 24, 2014 |
"Congressional Caucus: Protecting IP Boosts Creativity and Innovation" |
MPAA |
Jun 24, 2014 |
"International Creativity and Theft-prevention Caucus 2014 Watch List" |
Sribd |
Jun 24, 2014 |
"International Creativity and Theft-prevention Caucus Unveils '2014 International Piracy Watch List'" |
U.S. House Judicia Committee |
Jun 24, 2014 |
"Watering Hole Hackers Sniff Out Industrial Control Systems for Future Attack" |
Info Security Magazine |
Jun 24, 2014 |
"Court Hands Google a Worldwide Site Blocking Injunction" |
Copyright Enforcement Canada |
Jun 23, 2014 |
"Hacker Tactic: Holding Data Hostage" |
New York Times |
Jun 22, 2014 |
"DHS warns on threat of cyber attacks" |
Flash Critic: Cyber Threat News |
Jun 21, 2014 |
"Espionage in the EU Capital: An Interview with Kristof Clerix" |
Ruth Jacobs |
Jun 21, 2014 |
"GCHQ's favourite firms to get secret hacking alerts: National security fears raised over BT's links with Chinese company" |
Mail Online (UK) |
Jun 21, 2014 |
"Roundup: London Tech Week" |
IDG Connect |
Jun 20, 2014 |
"The Admiral Sets a Good Course" |
Huffington Post |
Jun 20, 2014 |
"The Rise of Cyber-Security Blackwaters" |
EconoMonitor |
Jun 18, 2014 |
"London Tech Week: Doing Business in China" |
IDG Connect |
Jun 17, 2014 |
"Chinese Cyber Espionage: We Know Everything Except What to Do About it" |
EconoMonitor |
Jun 13, 2014 |
"Inside Shenzhen: China's Silicon Valley" |
The Guardian |
Jun 13, 2014 |
"Kevin Mandia '92 Leads Global Effort to Solve Cyber Crime" |
LaFayette |
Jun 13, 2014 |
"FCC Urges Industry-Led Approach on Cybersecurity" |
Wall Street Journal |
Jun 12, 2014 |
"Mergers and Acquisitions: When Two Companies and APT Groups Come Together" |
FireEye |
Jun 12, 2014 |
"U.S. telecom chief tells industry to lead on cybersecurity" |
Reuters |
Jun 12, 2014 |
"UK calls for global effort to tackle IP theft" |
Computer Weekly |
Jun 12, 2014 |
"Vince Cable calls for global approach to tackling IP crime" |
The Telegraph |
Jun 12, 2014 |
"The Internet: A Lawless Wild West?" |
The National Interest |
Jun 11, 2014 |
"Hackers Steal Up To 20% Of Money Generated By The Internet" |
Business Insider |
Jun 10, 2014 |
"Cybercrime costs $445B US a year to global economy, report finds" |
CBC News |
Jun 9, 2014 |
"Is the global cost of cybercrime really £266bn a year? No, it isn't" |
The Guardian |
Jun 9, 2014 |
"Net Losses: Estimating the Global Cost of Cybercrime" |
Mcafee |
Jun 9, 2014 |
"Report: Cybercrime and espionage costs $445 billion annually" |
Washington Post |
Jun 9, 2014 |
"Guilt or competition? Winning the Cyber Espionage War" |
Daily News Egypt |
Jun 7, 2014 |
"Internet Giants Erect Barriers to Spy Agencies" |
New York Times |
Jun 6, 2014 |
"The flawed US indictment of Chinese hackers" |
Tech Policy Daily |
Jun 6, 2014 |
"Automating Cybersecurity" |
New York Times |
Jun 2, 2014 |
"Indicting Chinese Military Officers for Cyber Theft: Huge Mistake" |
Fortuna's Corner |
Jun 1, 2014 |
"CHINA: Inside the FBI's Fight Against Chinese Cyber-Espionage" |
Newsvine |
May 29, 2014 |
"Chinese Cyber Hacking: Australia-China FTA talks under threat" |
Storify |
May 29, 2014 |
"Pell Center Cybersecurity Conference Discusses Industrial Espionage and Cyber Counter Strikes" |
Pell Center |
May 28, 2014 |
"The Chinese hacking indictments: Where's the strategy?" |
Tech Policy Daily |
May 28, 2014 |
"A China-US tech war will cost the world dearly" |
EIN Newsdesk |
May 27, 2014 |
"China Pulls Cisco Into Dispute on Cyberspying" |
New York Times |
May 27, 2014 |
"Estonia exercise shows NATO's growing worry about cyber attacks" |
Reuters |
May 27, 2014 |
"Security Insiders: Cyberspying Indictments Will Not Stop China From Hacking U.S. Businesses" |
EIN Newsdesk |
May 27, 2014 |
"America, China and the Hacking Threat" |
New York Times |
May 25, 2014 |
"China Cyber Threat: Case against 5 PLA hackers reveals U.S. counter cyberspying capabilities" |
FlashCritic |
May 25, 2014 |
"China's Cyber Espionage Case a Guide to Hacking" |
VOice of America |
May 24, 2014 |
"Organisms stop infections spreading by being diverse. So can computer apps" |
The Economist |
May 24, 2014 |
"KGB General: Of Course Snowden is Working for Russian Intelligence" |
The XX Committee |
May 23, 2014 |
"Editorial | China's hackers may finally face justice for theft" |
Myrtle Beach Online |
May 22, 2014 |
"Former KGB general: Snowden is cooperating with Russian intelligence" |
Venture Beat |
May 22, 2014 |
"Is Snowden working for the Russians?" |
Washington Post |
May 22, 2014 |
"John Carlin's Speech at Brookings on 'Defending Our Nation by Prosecuting State-Sponsored Cyber Theft'" |
Brookings Institute |
May 22, 2014 |
"Mysterious Hacker The real reason the U.S. is indicting Chinese hackers" |
Daily Dot |
May 22, 2014 |
"Why the United States should go after the Chinese hackers" |
Miami Herald |
May 22, 2014 |
"Chinese hackers" |
News-Gazette |
May 21, 2014 |
"Chinese Hacking Raises Cyber Attack Disclosure Issue for Companies" |
Insurance Journal |
May 21, 2014 |
"Espionage indictments against China deliver a useful message" |
Washington Post |
May 21, 2014 |
"Moving Past Snowden" |
Brookings Institute |
May 21, 2014 |
"US lawmakers praise hacking charges against Chinese military" |
PC World |
May 21, 2014 |
"China Cyber Charges: Take Beijing to the WTO Instead" |
National Interest |
May 20, 2014 |
"Chinese Hacker Indictments a Wakeup Call for Enterprises" |
NewsFactor |
May 20, 2014 |
"Companies Bet Exposing Hacks Will Help" |
Wall Street Journal |
May 20, 2014 |
"Global raids on 'BlackShades' hackers" |
IoL SciTech |
May 20, 2014 |
"UK's Private Concerns About Chinese Cyber Spies" |
Sky News |
May 20, 2014 |
"Canada joins global crackdown on BlackShades malware" |
CTV News |
May 19, 2014 |
"FBI's Huge Hacker Bust Could Be Bogus" |
Daily Beast |
May 19, 2014 |
"FBI raids BlackShades RAT Malware Customers in Europe and Australia" |
Hackernews |
May 16, 2014 |
"Cyber attacks on Lockheed Martin quadruple" |
SC Magazine |
May 15, 2014 |
"Is Elderwood the digital arms dealer that fuelled attacks on Google?" |
The Guardian |
May 15, 2014 |
"New Strategies to Combat Counterfeit Parts" |
National Defense Magazine |
May 15, 2014 |
"Technology Confounds the Courts" |
ACM |
May 14, 2014 |
"Combating Economic Espionage and Trade-secret Theft" |
U.S. FBI |
May 13, 2014 |
"Critical Data Discovery: Embarking on a Digital Treasure Hunt" |
Security Intelligence |
May 13, 2014 |
"Cybersecurity in the private sector - playing catch-up" |
The Hill |
May 13, 2014 |
"Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats? - Pamela Passman Testimony" |
U.S. Senate Judiciary |
May 13, 2014 |
"Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats? - Peter Hoffman Testimony" |
U.S. Senate Judiciary |
May 13, 2014 |
"Hackers steal Ukraine crisis data from Belgian foreign ministry" |
The Star Online |
May 12, 2014 |
"Rogue Employees: The Biggest Threat to Information Security" |
International Business Times |
May 12, 2014 |
"Trade Secrets Lessons From HBO's Silicon Valley" |
Orrick |
May 12, 2014 |
"IBM launches new cybersecurity services" |
USA Today |
May 10, 2014 |
"Former NSA Chief Keith Alexander to Launch Private Cybersecurity Firm" |
Mashable |
May 9, 2014 |
"How to thwart hackers with a cyber playbook" |
Information Age |
May 9, 2014 |
"Interview transcript: former head of the NSA and commander of the US cyber command, General Keith Alexander" |
Australian Financial Review |
May 9, 2014 |
"KC software company sues JE Dunn for IP theft" |
KC Business Journal |
May 9, 2014 |
"The Pentagon's New Army Is a Convention of Hackers" |
Fiscal Times |
May 9, 2014 |
"Quincy software developer accused of stealing employer's intellectual property" |
Patriot Ledger |
May 8, 2014 |
"International Counterfeiting Hits Small Businesses Hard" |
SBE Council |
May 7, 2014 |
"Don't let hackers know Mandiant founder checks his email on an iPad. Oh." |
The Register |
May 6, 2014 |
"Journalists, Media Under Attack From Hackers: Google Researchers" |
Shiloh International Missions |
May 6, 2014 |
"Onshoring Because IP Matters" |
EBN |
May 6, 2014 |
"Symantec: Antivirus is 'DEAD' - no longer 'a moneymaker'" |
The Register |
May 6, 2014 |
"IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal" |
Wall Street Journal |
May 5, 2014 |
"Symantec Says 'Antivirus Software Is Dead'" |
Mish's |
May 5, 2014 |
"Virtual Legality 2: Oculus VR Responds Comprehensively To Zenimax Legal Letters" |
Forbes |
May 5, 2014 |
"Europe's cybersecurity policy settings under attack" |
Phys.org |
May 4, 2014 |
"Defense, energy, banks hit by Internet Explorer bug" |
FijiOne |
May 2, 2014 |
"Innovative U.S. cybersecurity initiative to address cyberthreats" |
Homeland Security News Wire |
May 2, 2014 |
"Missing In Asia: The Pivotal Person In Obama's Pivot" |
Forbes |
May 1, 2014 |
"That was quick! Microsoft patches the "1776" hole in Internet Explorer" |
NakedSecurity |
May 1, 2014 |
"The Wild Cyber West" |
TownHall.com |
May 1, 2014 |
"Zimbabwe missing from the knowledge economy" |
zimpolitic |
May 1, 2014 |
"Lots of Americans Heard About Heartbleed, but Not Many Were Worried" |
Slate |
Apr 30, 2014 |
"The Danger Deepens: Neustar's Annual DDoS Attack Report" |
Neustar |
Apr 30, 2014 |
"PDF"]
"Verizon annual cybersecurity report: 'The bad guys are winning'" target="_blank">USTR Releases Annual Special 301 Report on Intellectual Property Rights" |
USTR |
Apr 30, 2014 |
"Cyber security: business is in the front line" |
Financial Times |
Apr 29, 2014 |
"Cybersecurity skills crisis contributes to security breaches" |
BetaNews |
Apr 29, 2014 |
"FBI Keeps Internet Flaws Secret to Defend Against Hackers" |
Bloomberg |
Apr 29, 2014 |
"NSA reveals some cyber security flaws are left secret" |
Global News Canada |
Apr 29, 2014 |
"Pirates beware as China opens first intellectual property centre" |
Irish Times |
Apr 29, 2014 |
"Smokescreening: Data Theft Makes DDoS More Dangerous" |
CircleID |
Apr 28, 2014 |
"The Road to Resilience: How Cybersecurity is Moving from the Back Office to the Boardroom" |
FireEye |
Apr 28, 2014 |
"White House Details Thinking on Cybersecurity Flaws" |
New York Times |
Apr 28, 2014 |
"Dept. of Homeland Security struggles to recruit, retain cybersecurity tech workers" |
The Raw Story |
Apr 26, 2014 |
"Protecting African creatives: The importance of intellectual property law for SMEs" |
Biztech Africa |
Apr 26, 2014 |
"DDOS Attacks an Increasing Cover for Theft, Fraud" |
Threat Post |
Apr 24, 2014 |
"Ethical hackers say government regulations put information at risk" |
Global News Canada |
Apr 24, 2014 |
"Tech Giants Pledge $3.6M to Help Fund OpenSSL Following Heartbleed Bug" |
International Business Times |
Apr 24, 2014 |
"Life after Heartbleed: 'The Internet will never be 100% safe'" |
BGR |
Apr 23, 2014 |
"2014 Data Breach Investigations Report" |
Verizon |
Apr 22, 2014 |
"5 Tips to Cybersecure the Power Grid" |
GreenTechGrid |
Apr 22, 2014 |
"Attacker Grabs Heartbleed VPN Sessions" |
ISS Source |
Apr 22, 2014 |
"Hackers going after intelligence data, but most will also take your money" |
TechTimes |
Apr 22, 2014 |
"New cyber-threats that go bump in the night" |
CNN Money |
Apr 22, 2014 |
"Are inventions at risk to cyber attacks?" |
PhilMcKinney |
Apr 21, 2014 |
"Heartbleed's Never-Ending Drip, Drip, Drip" |
Ecommerce Times |
Apr 21, 2014 |
"China on frontlines of cyber security threat" |
Want China Times |
Apr 20, 2014 |
"The Interview: 'MafiaBoy' speaks up" |
Yahoo News |
Apr 20, 2014 |
"U.S. Promotes Network to Foil Digital Spying" |
New York Times |
Apr 20, 2014 |
"Hackers Use Heartbleed Bug to Attack 'Major Corporation'" |
NBC News |
Apr 18, 2014 |
"Heartbleed attack used to skip past multifactor authentication" |
CNet |
Apr 18, 2014 |
"Heartbleed bug 'will cost millions'" |
The Guardian |
Apr 18, 2014 |
"Insider Threat: Firms Aware, but Take No Action" |
ISS Source |
Apr 18, 2014 |
"Mandiant: Hackers Broke In Using Heartbleed" |
Wall Street Journal |
Apr 18, 2014 |
"The Lies Edward Snowden Tells" |
The Atlantic |
Apr 18, 2014 |
"Crucial military satellite systems are vulnerable to hacking, experts say" |
The Guardian |
Apr 17, 2014 |
"United States: Implications Of U.S. Sanctions Program On Intellectual Property Owners" |
Mondaq |
Apr 17, 2014 |
"Hackers Are Scanning the Web for Websites Vulnerable to Heartbleed Attacks" |
SoftPedia |
Apr 16, 2014 |
"Man who made light of 'Heartbleed thingamajig' hacked within minutes" |
The Telegraph |
Apr 16, 2014 |
"Mounties always get their man: Heartbleed 'hacker', 19, CUFFED" |
The Register |
Apr 16, 2014 |
"The first suspected Heartbleed hacker has been arrested" |
Washington Post |
Apr 16, 2014 |
"After Heartbleed, can Britain's new Cyber Emergency Response Team beat the hackers?" |
Metro UK |
Apr 15, 2014 |
"Between Heartbleed And Homeland, NSA Treads Cybersecurity Gray Area" |
NPR |
Apr 15, 2014 |
"Hackers Test Water Treatment Plant Vulnerabilities" |
WSO |
Apr 15, 2014 |
"Heartbleed: Cybersecurity as Melodrama" |
CSIS |
Apr 15, 2014 |
"New technique to fight 'Heartbleed' virus" |
The Hindu |
Apr 15, 2014 |
"On privacy, tech firms needs to step up: Editorial" |
LA Daily News |
Apr 15, 2014 |
"TONKIN: Though needed in democracy, whistleblowing shouldn't threaten Constitution" |
Daily Nebraska |
Apr 15, 2014 |
"Smarter military spending needed, not more" |
Post-Crescent |
Apr 14, 2014 |
"Cybersecurity As A War Against Haunted Objects" |
Gizmodo |
Apr 13, 2014 |
"Dark Reading: Heartbleed Will Go On Even After The Updates" |
ThreatConnect |
Apr 11, 2014 |
"Heartbleed vuln under ACTIVE ATTACK as hackers map soft spots" |
The Register |
Apr 11, 2014 |
"NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS" |
The Register |
Apr 11, 2014 |
"NSA Said to Exploit Heartbleed Bug for Intelligence for Years" |
Bloomberg |
Apr 11, 2014 |
"U.S. rallied 120 nations in response to 2012 cyberattack on American banks" |
Washington Post |
Apr 11, 2014 |
"Why a hacker got paid for finding the Heartbleed bug" |
New Scientist |
Apr 11, 2014 |
"From the Origins of Hacking to the recent Heartbleed" |
Docsity |
Apr 10, 2014 |
"Mandiant 2014 Threat Report: Beyond the Breach" |
FireEye |
Apr 10, 2014 |
"Anatomy of OpenSSL's Heartbleed: Just four bytes trigger horror bug" |
The Register |
Apr 9, 2014 |
"Canada shuts access to tax website over 'Heartbleed bug' fears" |
Financial Times |
Apr 9, 2014 |
"Insider Spies Are the New Cyberthreat" |
Epoch Times |
Apr 9, 2014 |
"The Unfortunate Cookie - A Chinese Restaurant Cyber-Security Caper" |
OCEG |
Apr 8, 2014 |
"Local firms to continue XP support" |
Global Times (China) |
Apr 7, 2014 |
"Cyber Emergency Response Team launched by UK" |
BBC |
Apr 5, 2014 |
"Be'er Sheva wooing cybersecurity firms" |
Haaretz |
Apr 2, 2014 |
"Ex-Microsoft employee pleads guilty to trade secret theft" |
Computerworld |
Apr 1, 2014 |
"Free tool calculates the damage of a cyber attack" |
Net Security |
Apr 1, 2014 |
"UK reaches key milestone in cyber security" |
Computer Weekly |
Apr 1, 2014 |
"Crack CERT warriors arrive to save UK from grid-crippling hack attacks" |
The Register |
Mar 31, 2014 |
"Cyber security is economic opportunity for the UK, says government" |
Computer Weekly |
Mar 31, 2014 |
"NOT JUST ONE! RSA adopted Two NSA Backdoored Encryption Tools" |
The Hacker News |
Mar 31, 2014 |
"Popular Remote access Trojan njRAT fuels Middle East Cyber Crime" |
The Hacker News |
Mar 31, 2014 |
"What's Wrong with America's Cyber Security Policy?" |
Huffington Post |
Mar 31, 2014 |
"Pentagon to Triple Cyber Security Staff" |
Techno Buffalo |
Mar 29, 2014 |
"White House cyber chief: future cyber attack to wipe out critical infrastructure" |
Flash Critic |
Mar 29, 2014 |
"A digital fortress?" |
Economist |
Mar 28, 2014 |
"Hacker black market more lucrative than drug trade" |
Merlin Intl. |
Mar 28, 2014 |
"Hagel Seeks Peace Pact for Digital Realm" |
New York Times |
Mar 28, 2014 |
"Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar" |
RAND Corp. |
Mar 28, 2014 |
"Report: Hackers Would Rather Steal Your Twitter Account Than Your Credit Card" |
Consumerist |
Mar 27, 2014 |
"Law Firms Are Pressed on Security for Data" |
New York Times |
Mar 26, 2014 |
"Malaysian flight MH370 tragedy abused by Chinese hackers for Espionage attacks" |
The Hacker News |
Mar 26, 2014 |
"The U.S. notified 3,000 companies that their computer systems had been hacked in 2013" |
Daily News |
Mar 25, 2014 |
"Hackonomics: A First-of-Its-Kind Economic Analysis of the Cyber Black Markets" |
Juniper Networks |
Mar 24, 2014 |
"Microsoft Word Zero-Day Vulnerability is being exploited in the Wild" |
The Hacker News |
Mar 24, 2014 |
"Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370" |
FireEye |
Mar 24, 2014 |
"'Most Wanted' Hacker Speaks Out" |
Raconteur |
Mar 21, 2014 |
"Industry voice: Windows XP: The perils for businesses that fail to upgrade" |
Vaxxe |
Mar 21, 2014 |
"United Front Can Foil the Hackers" |
Raconteur |
Mar 21, 2014 |
"Hackers turning to Tor network to hide evolved malware, warns Kaspersky Lab" |
V3 |
Mar 20, 2014 |
"Commercial RAT Used by Malicious Hackers" |
InfoSec Magazine |
Mar 18, 2014 |
"From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms in RATs" |
FireEye |
Mar 18, 2014 |
"Japan holds first broad cybersecurity drill, frets over Olympics risks" |
Reuters |
Mar 17, 2014 |
"Windows XP deadline to leave 10 per cent of government PCs vulnerable" |
TechRadar |
Mar 17, 2014 |
"LightOut is Latest Cyber Threat to Target Energy Sector" |
InfoSec Magazine |
Mar 15, 2014 |
"Apple Inc.’s (AAPL) Safari browser tough but not invulnerable, according to PWN2OWN hackers" |
PF Hub |
Mar 14, 2014 |
"Chinese hacker cracks Safari, wins $62.5K, praises Apple's security" |
CNN Money |
Mar 14, 2014 |
"Gone phishing: Army uses Thrift Savings Plan in fake e-mail to test cybersecurity awareness" |
Washington Post |
Mar 14, 2014 |
"The Next Move for Cyberwarfare Armies" |
ADI News |
Mar 14, 2014 |
"All hacking eyes on the prize money at CanSecWest" |
CNet |
Mar 13, 2014 |
"McAfee President Pulls Back Curtain on Cyber Security" |
St Mary's College |
Mar 13, 2014 |
"New EU cybersecurity law avoids making big Internet companies report breaches" |
Network World |
Mar 13, 2014 |
"State-Sponsored Cybercrime: From Exploitation to Disruption to Destruction" |
Alston & Bird |
Mar 13, 2014 |
"The Cyberspies Who Don't Love Us" |
The Cutting Edge |
Mar 12, 2014 |
"Web founder Berners-Lee calls for online 'Magna Carta' to protect users" |
Reuters |
Mar 12, 2014 |
"Amid Cyber-Theft Onslaught, Calit2 Workshop Kicks Off New IP-Focused Program" |
Xconomy |
Mar 11, 2014 |
"Cybersecurity: The Must-Read Books" |
Bank Info Security |
Mar 11, 2014 |
"Protecting trade secrets is a challenge in a global economy" |
Global Post |
Mar 11, 2014 |
"Cybersecurity" |
Hawaii Reporter |
Mar 10, 2014 |
"Workshop to Highlight Growing Role of Innovation and IP as Drivers of the Global Economy" |
UCSD News |
Mar 10, 2014 |
"How Many Cyberattacks Hit the United States Last Year?" |
NextGov |
Mar 8, 2014 |
"Analysis: There's No Real Difference Between Online Espionage and Online Attack" |
Nextgov |
Mar 7, 2014 |
"Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace" |
Heritage Foundation |
Mar 6, 2014 |
"Four Federal Cyber Escapades to Watch for This Spring" |
Nextgov |
Mar 5, 2014 |
"Avoiding data breaches is almost impossible - so now what?" |
IT Business (Canada) |
Mar 3, 2014 |
"United States: If You Have A Trade Secret, You Better Protect It" |
Mondaq |
Mar 3, 2014 |
"U.S. military not prepared for cyber warfare, commander warns" |
Washington Times |
Feb 28, 2014 |
"Here's what $100,000 buys you at the cybersecurity industry's biggest conference" |
Washington Post |
Feb 27, 2014 |
"How the cloud can improve security: Courtot" |
IT Business (Canada) |
Feb 27, 2014 |
"Israeli venture capital fund is hooked on cyber security" |
Haaretz |
Feb 27, 2014 |
"U.S. Supreme Court sets record for IP cases in coming year" |
Innovation Asset Group |
Feb 27, 2014 |
"Cybersecurity industry at war with itself" |
CNBC |
Feb 26, 2014 |
"H-P Lands $32M Cyber Security Contract From Dept. of Homeland Security" |
Fox Business |
Feb 26, 2014 |
"Latest cybersecurity threat: WiFi virus" |
Homeland Security News Wire |
Feb 26, 2014 |
"The Crisis of the Internet" |
Christie Boyden |
Feb 26, 2014 |
"US Intelligence Warns On Counterintelligence and Cyber Espionage" |
Chainsoff's Blog |
Feb 26, 2014 |
"U.S. military is playing catch-up in digital media war" |
Heritage Foundation |
Feb 24, 2014 |
"Apple Admits Products Are Vulnerable to Hackers" |
ABC News |
Feb 22, 2014 |
"White hats to the rescue" |
The Economist |
Feb 22, 2014 |
"Top 10 worst state-sponsored hack campaigns: From PRISM to Stuxnet and Mask" |
V3.CO.UK |
Feb 21, 2014 |
"Watch Out, Hackers: This VC-Backed, Israeli Special Ops Cybersecurity Company Will Hunt You Down" |
Forbes |
Feb 21, 2014 |
"Former McAfee CTO's Cyber Security Data Company Cylance Raises $20M From Khosla, Blackstone" |
TechCrunch |
Feb 20, 2014 |
"Google backs two more cyber security start-ups" |
Financial Times |
Feb 20, 2014 |
"How international relations theory shapes U.S. cybersecurity doctrine" |
Washington Post |
Feb 20, 2014 |
"Microsoft combats SnowMan hackers with rush fix for Internet Explorer" |
V3.CO.UK |
Feb 20, 2014 |
"NSA, universities push to establish cybersecurity as a science" |
GCN |
Feb 20, 2014 |
"ThreatStream Raises $4M From Google Ventures To Add Realtime Cybersecurity Intelligence" |
TechCrunch |
Feb 20, 2014 |
"What cyberthreats are costing US companies" |
CNBC |
Feb 20, 2014 |
"Hackers dropping Zeus in favour of Xtreme RAT Trojan, reports FireEye" |
V3.CO.UK |
Feb 19, 2014 |
"Magal Chief Executive Seeks Cyber Security Acquisitions" |
Bloomberg |
Feb 19, 2014 |
"Microsoft crash reports reveal Houdini hack campaign hitting firms" |
V3.CO.UK |
Feb 19, 2014 |
"Exclusive: France's Snecma targeted by hackers - researcher" |
Reuters |
Feb 18, 2014 |
"Navy Describes Iran Hack Attack As Obama Prepares 'Cybersecurity Framework'" |
InfoWars |
Feb 18, 2014 |
"Tech Industry Praises Cybersecurity Framework From White House" |
CIO |
Feb 18, 2014 |
"Cyber Security Canon" |
Terebrate |
Feb 16, 2014 |
"2013 Out-of-Cycle Review of Notorious Markets" |
U.S. Trade Representative |
Feb 12, 2014 |
"Government Passwords Are Incredibly Easy to Hack" |
Defense One |
Feb 12, 2014 |
"Intellectual Property Theft: A Threat to U.S. Workers, Industries, and Our Economy" |
AFL-CIO |
Feb 12, 2014 |
"New US cybersecurity standards: Will they do enough?" |
Yahoo News |
Feb 12, 2014 |
"The U.S. Tells You Where to Buy the Best Fake Designer Handbags, Pirated Movies, and More" |
U.S. News |
Feb 12, 2014 |
"Cybersecurity expert explains importance of NCCIP Act" |
Government Security News |
Feb 11, 2014 |
"Target Corp. Breached at Weakest Link" |
Epoch Times |
Feb 11, 2014 |
"Cyber criminals target smaller companies" |
Financial Times |
Feb 10, 2014 |
"What was lost in the rush to the Internet of Things" |
Symantec |
Feb 5, 2014 |
"DHS Agents Seized More Than $21.6 Million In Fake NFL Merchandise" |
HS Today |
Feb 3, 2014 |
"Several cyber security initiatives lost after Snowden leaks" |
Stars and Stripes |
Feb 2, 2014 |
"National cyber complex to open next to Ben-Gurion University of the Negev campus" |
Homeland Security News Wire |
Jan 31, 2014 |
"Software piracy hitting pharmaceutical bottom lines" |
BioPrepWatch |
Jan 31, 2014 |
"Two Israeli startups with innovative cybersecurity solutions raise combined $25 million" |
Homeland Security News Wire |
Jan 31, 2014 |
"DNI: China, Russia grow as cyber, space threats to U.S. security" |
Washington Free Beacon |
Jan 30, 2014 |
"International Index Charts Course to Stronger IP Protection" |
U.S. Chamber of Commerce |
Jan 30, 2014 |
"New Study by Harvard Business School Professor and Nam Chief Economist Shows International Software Piracy Hampering Manufacturers in the U.S." |
NAM |
Jan 30, 2014 |
"New Study by Harvard Business School Professor and NAM Chief Economist Shows International Software Piracy Hampering Manufacturers in the U.S." |
PR Newswire |
Jan 30, 2014 |
"New study demonstrates that global software piracy costs U.S. manufacturers jobs, revenue and innovation" |
NAM |
Jan 30, 2014 |
"New Worldwide Index Reveals Value of Intellectual Property to U.S. Prosperity" |
CFIF |
Jan 30, 2014 |
"3D printing to cost $100bn a year in IP theft" |
CRN |
Jan 29, 2014 |
"Charting the Course: Ranking the Players of Global Intellectual Property Rights" |
TAPP |
Jan 29, 2014 |
"GIPC International IP Index" |
GIPC |
Jan 29, 2014 |
"Help the Economy: Protect the Intellecutal Property in Your Business" |
Traklight |
Jan 29, 2014 |
"Law enforcement in US, China, India, Romania collaborate to arrest hackers-for-hire" |
Naked Security |
Jan 29, 2014 |
"Time for a Cybersecurity Overhaul" |
Security Affairs |
Jan 29, 2014 |
"Worldwide Threat Assessment of the US Intelligence Community" |
U.S. DNI |
Jan 29, 2014 |
"Care Enough to Protect Your Intellectual Property" |
HoGo |
Jan 23, 2014 |
"Hacker Groups Embracing More Effective Tactics in Targeted Attacks" |
CIO |
Jan 23, 2014 |
"Spies spy: CrowdStrike report says cyberspooks are EVERYWHERE" |
The Register |
Jan 23, 2014 |
"2014's Hacking Pain is Cyber Security's Gain" |
Forbes |
Jan 22, 2014 |
"CrowdStrike Takes On Chinese, Russian Attack Groups in Threat Report" |
Security Week |
Jan 22, 2014 |
"Get Ready for Big Data Heists" |
Bloomberg |
Jan 22, 2014 |
"Podcast: CrowdStrike’s Adam Meyers Discusses Attacks Emanating from China, Russia and the Middle East" |
IT Security News |
Jan 22, 2014 |
"Politically Motivated Cyberattackers Adopting New Tactics, Report Says" |
Dark Reading |
Jan 21, 2014 |
"Top 'good guy' hackers to tackle biggest cyber challenges yet" |
Times of Israel |
Jan 20, 2014 |
"Encrypted Blackphone goes to war with snoopers" |
Space Daily |
Jan 19, 2014 |
"Warning computer hackers shortens their intrusion" |
Phys.org |
Jan 17, 2014 |
"Your Biggest Cybersecurity Threat Isn't Coming From the Outside" |
Business News Daily |
Jan 17, 2014 |
"Cisco 2014 Annual Security Report" |
Cisco |
Jan 16, 2014 |
"For The First Time, Hackers Have Used A Refrigerator To Attack Businesses" |
Business Insider |
Jan 16, 2014 |
"Hacker threats rise, with defenders lacking: report" |
Space Daily |
Jan 16, 2014 |
"Hacking threat is posed by malware : study" |
All Hacker News |
Jan 16, 2014 |
"State Dept. computers open to hackers: report" |
Washington Times |
Jan 16, 2014 |
"On-line or off, cyber-spies can get you, Israeli expert says" |
Times of Israel |
Jan 15, 2014 |
"'Zero-day' hacking reform raises hackels with US tech groups" |
Financial Times |
Jan 14, 2014 |
"N.S.A. Devises Radio Pathway Into Computers" |
New York Times |
Jan 14, 2014 |
"The dangerous hacking groups you don't know" |
CNBC |
Jan 14, 2014 |
"McAfee Labs 2014 Threats Predictions" |
McAfee |
Jan 13, 2014 |
"McAfee security report suggests 2014 will be a rough year" |
Computerworld |
Jan 13, 2014 |
"New cyber-attack model helps hackers time the next Stuxnet" |
The Conversation |
Jan 13, 2014 |
"Terror Tactics: Report Urges Government to Use Financial, Trade and Immigration Systems to Squeeze Theft of IP" |
Electronics-Trade Blog |
Jan 13, 2014 |
"The Scariest Thing About Cybersecurity Is How Unprepared We Are" |
Vice: Motherboard |
Jan 13, 2014 |
"The State, the Internet and Cybersecurity" |
Brookings Institute |
Jan 13, 2014 |
"ASSESSMENT: OSINT On NUCLEAR POWER SYSTEMS" |
krypt3ia |
Jan 11, 2014 |
"Cyber-security: Small satellite dish systems called ripe for hacking" |
Christian Science Monitor |
Jan 11, 2014 |
"From Heists to Hacktivists: 2013 Cybersecurity in Review" |
Cyber Security Law and Policy |
Jan 8, 2014 |
"The case for forecasting cyberattacks" |
USA Today |
Jan 8, 2014 |
"Top 10 countries where most of the world’s hackers come from" |
Hindustan Times |
Jan 8, 2014 |
"United States: Trending Issues In The Prosecution Of Trade Secret Theft" |
Mondaq |
Jan 8, 2014 |
"IPR Remains Among Top USTR Priorities For China In 2014" |
IP Watch |
Jan 7, 2014 |
"Cybersecurity is for the C-suite, 'not just the IT crowd'" |
CNN |
Jan 6, 2014 |
"Just the Right Amount of Cyber Fear" |
The Atlantic |
Jan 6, 2014 |
"Hackers easily hijack Windows crash reports, report says" |
Tech Hive |
Jan 5, 2014 |
"Windows crash reports may help hackers claims research" |
Neowin |
Jan 5, 2014 |
"Thousands of visitors to yahoo.com hit with malware attack, researchers say" |
Washington Post |
Jan 4, 2014 |
"Clean Energy Patent Growth Index" |
Cleantech Group |
Jan 2, 2014 |
"Cyber security deal highlights threats from spying" |
CNBC |
Jan 2, 2014 |
"Cybercriminals are eyeing these 5 targets in 2014" |
CBC News |
Jan 2, 2014 |
"Cybersecurity Deal: FireEye Buying Mandiant for About $1 Billion" |
Wall Street Journal |
Jan 2, 2014 |
"Cybersecurity forces align as FireEye acquires Mandiant" |
CNet |
Jan 2, 2014 |
"FireEye Computer Security Firm Acquires Mandiant" |
New Yortk Times |
Jan 2, 2014 |
"United States: Trade Secrets Watch 2013 Year-In-Review" |
Mondaq |
Jan 2, 2014 |
2013 |
"2013 Security Brief: NSA Spying, Adobe Hack, Chinese Cyber Espionage, SEA" |
Softpedia |
Dec 29, 2013 |
"Beware of counterfeit versions of top Android, iOS apps" |
PC World |
Dec 29, 2013 |
"BGU researchers identify critical vulnerability Samsung's Galaxy S4" |
Homeland Security News Wire |
Dec 27, 2013 |
"BGU Security Researchers discover Vulnerability in Samsung's Secure Software on the Company's Flagship Device Galaxy S4" |
Ben-Gurion University |
Dec 24, 2013 |
"Hackers find cloud servers easy prey" |
SF Gate |
Dec 22, 2013 |
"Hacking Back: For Now, Be Vigilant Rather Than a Vigilante" |
JD Supra |
Dec 20, 2013 |
"Appointment & Timing of "Deputy" USPTO Director Disturbs Many" |
IP Closeup |
Dec 18, 2013 |
"How hackers made minced meat of Department of Energy networks" |
ARS Technica |
Dec 16, 2013 |
"Top 100 Android apps hacked in 2013" |
Net Security |
Dec 13, 2013 |
"Secret TPP intellectual property agreement misses deadline" |
PC World |
Dec 10, 2013 |
"Someone's Been Siphoning Data Through a Huge Internet Security Hole" |
GIZMODO |
Dec 6, 2013 |
"Internet Firms Step Up Efforts to Stop Spying" |
New York Times |
Dec 5, 2013 |
"Microsoft's General Counsel: N.S.A. Hacks Were an 'Earthquake' for Tech" |
New York Times |
Dec 5, 2013 |
"Someone's Been Siphoning Data Through a Huge Security Hole in the Internet" |
Wired |
Dec 5, 2013 |
"The Department of Energy's July 2013 Cyber Security Breach" |
U.S. Dept. of Energy |
Dec 5, 2013 |
"Kaspersky Lab Names This Year's Top Cyber Security Threats" |
Forbes |
Dec 4, 2013 |
"Snowden, Cyber-espionage, hacktivism and Bitcoins cause security headaches" |
ARN Net |
Dec 4, 2013 |
"Cyber-security puzzle: Who is sending Internet traffic on long, strange trips?" |
Alaska Dispatch |
Dec 3, 2013 |
"Global Fraud Report 2013-2014 Annual edition" |
Compliance Alert |
Dec 2, 2013 |
"Global Fraud Report 2013-2014 Annual edition" |
Economist |
Dec 2, 2013 |
"Israeli company starts 'Cyber Gym' school for ethical hacking" |
NDTV |
Dec 2, 2013 |
"US Moving From Technology Leader To Laggard" |
Information Week |
Dec 2, 2013 |
"Counterfeit Grinches Lure You With Bargains" |
NCPC |
Nov 27, 2013 |
"Cyber Monday Means Bargains, Convenience...and Counterfeits" |
StreetInsider |
Nov 27, 2013 |
"Symantec CEO Declares IP Theft Greater Threat Than Cyber War" |
InfoSecurity Magazine |
Nov 26, 2013 |
"Symantec chief warns over cyber threat to intellectual property" |
Financial Times |
Nov 26, 2013 |
"Cyberthreats on the rise, says McAfee Labs report" |
CNBC |
Nov 25, 2013 |
"Investigators warn dangerous counterfeit items are on sale this holiday shopping season" |
ABC News |
Nov 21, 2013 |
"The New Threat: Targeted Internet Traffic Misdirection" |
Renesys |
Nov 19, 2013 |
"New Strategies in the Battle Against IP Theft" |
Corporate Counsel |
Nov 18, 2013 |
"Trans-Pacific Partnership – similar to, but stronger than, SOPA and ACTA" |
InfoSecurity Magazine |
Nov 16, 2013 |
"IP theft costs Australia $15bn" |
The Australian |
Nov 15, 2013 |
"IT security costs countries more than gained: Report" |
ZD Net |
Nov 15, 2013 |
"Microsoft opens a futuristic Cybercrime Center in Redmond to tackle botnets, malware and more" |
TheNextWeb |
Nov 14, 2013 |
"Microsoft unveils state-of-the-art Cybercrime Center" |
Microsoft |
Nov 14, 2013 |
"Hackers may have stolen data during International Atomic Energy Agency raid" |
V3.CO.UK |
Nov 13, 2013 |
"International Atomic Energy Agency hit by unknown malware attack" |
V3.CO.UK |
Nov 12, 2013 |
"How Corporate America fights hackers" |
CNN Money |
Nov 11, 2013 |
"Cyber Readiness Index 1.0" |
Harvard |
Nov 1, 2013 |
"It's Now Clear That Edward Snowden's Life Is Dictated By Russian Intelligence" |
Business Insider |
Nov 1, 2013 |
"McAfee Labs Threats Report: Third Quarter 2013" |
McAfee |
Nov 1, 2013 |
"How Edward Snowden Escalated Cyber War With China" |
Newsweek |
Nov 1, 2013 |
"Intellectual Property Theft - Stealing Ideas: Manufacturers Feel the Brunt" |
Verizon |
Oct 30, 2013 |
"Protecting Your Critical Infrastructure from Advanced Threats Using Big Data Answers" |
HackSurfer |
Oct 30, 2013 |
"Snowden's Legacy Weighs On Obama Cybersecurity Meeting" |
Wall Street Journal |
Oct 29, 2013 |
"The Staggering Cost of Economic Espionage Against the US" |
Epoch Times |
Oct 22, 2013 |
"Keeping your endpoint data safe: some simple precautions" |
The Register |
Oct 21, 2013 |
"Snowden says he kept NSA documents from Russian, Chinese Intellegence" |
RT America |
Oct 18, 2013 |
"Hackers Compromise PR Newswire Customer Database" |
Security Week |
Oct 17, 2013 |
"Report outlines characteristics of nation-state driven cyber attacks" |
The Guardian |
Oct 16, 2013 |
"Report: Addressing cyber theft requires clarity, not hype" |
CREATE.org |
Oct 16, 2013 |
"Government Procurement Challenges: Fakes, IP theft and Corruption [PDF]" |
Create.org |
Oct 15, 2013 |
"Government Procurement Challenges: Fakes, IP theft and Corruption" |
Create.org |
Oct 15, 2013 |
"Hackers Target Web Apps as a Bridgehead to the Datacenter" |
Security Week |
Oct 15, 2013 |
"World War C: Understanding Nation-State Motives Behind Today's Advanced Cyber Attacks" |
FireEye |
Oct 15, 2013 |
"Cyber warrior shortage hits anti-hacker fightback" |
Reuters |
Oct 13, 2013 |
"HP Reveals Cost of Cybercrime Escalates 78 Percent, Time to Resolve Attacks More Than Doubles" |
HP |
Oct 8, 2013 |
"Security compromised at security companies -- during Cyber Security Month" |
Fox News |
Oct 8, 2013 |
"Hackers Purloin 2.9M Adobe Customers' Data" |
TechNewsWorld |
Oct 4, 2013 |
"The Adobe Breach This Week Should Get Your Attention" |
Nextgov |
Oct 4, 2013 |
"Adobe Announces Security Breach" |
New York Times |
Oct 3, 2013 |
"EU report findings: ICC says now is time for leaders to step up IP protection" |
International Chamber of Commerce |
Oct 3, 2013 |
"Illegal Access to Adobe Source Code" |
Adobe |
Oct 2, 2013 |
"National Cyber Security Awareness Month 2013" |
FBI |
Oct 1, 2013 |
"The State of the Internet: Q1, 2013" |
TechCrunch |
Oct 1, 2013 |
"Cybersecurity Legislation Asked for by NSA Director" |
WebProNews |
Sep 27, 2013 |
"National Cyber Security Awareness Month starts 1 October" |
Homeland Security News Wire |
Sep 26, 2013 |
"Security Staff Feel Largely Unprepared for Cyber-Espionage and APTs" |
InfoSecurity Magazine |
Sep 26, 2013 |
"Cyber Theft of Competitive Data: Asking the Right Questions" |
Brookings Institute |
Sep 25, 2013 |
"U.S. officials woo tech companies in new push for cybersecurity law" |
Reuters |
Sep 25, 2013 |
"America's hypocritical approach to economic espionage" |
CNN Money |
Sep 24, 2013 |
"Senate working on counterpart to CISPA cybersecurity bill" |
The Hill |
Sep 24, 2013 |
"Why Antivirus Software Isn't Enough To Fend Off Attacks" |
Forbes |
Sep 23, 2013 |
"Close the N.S.A.'s Back Doors" |
New York Times |
Sep 21, 2013 |
"FireEye's debut signals red hot interest in cybersecurity" |
Yahoo News |
Sep 21, 2013 |
"Hacking U.S. Secrets, China Pushes for Drones" |
New York Times |
Sep 20, 2013 |
"Cyber security: The new arms race for a new front line" |
Christian Science Monitor |
Sep 15, 2013 |
"Congress appears in no rush on cyber legislation" |
Inside Cybersecurity |
Sep 13, 2013 |
"G-20 Urged to Treat Cyber-Attacks as Threat to Global Economy" |
Bloomberg |
Sep 13, 2013 |
"NIST seeks early adopters of draft cybersecurity framework" |
Inside Cybersecurity |
Sep 13, 2013 |
"White House cybersecurity official says 'no new regulations'" |
Inside Cybersecurity |
Sep 13, 2013 |
"4 ways to stop a cyber 9/11" |
The Business Journals |
Sep 11, 2013 |
"Group-IB Threat Intelligence Report 2012–2013 H1" |
Security Affairs |
Sep 11, 2013 |
"Proposed NIST cyber framework nearly complete, faces major implementation questions" |
Inside Cybersecurity |
Sep 11, 2013 |
"Protecting Intellectual Property is Critical to our Economy" |
Trade Reform |
Sep 11, 2013 |
"Threat Intelligence Report" |
Group IB |
Sep 11, 2013 |
"Government Announces Steps to Restore Confidence on Encryption Standards" |
New York Times |
Sep 10, 2013 |
"Uncle Sam's Economic Espionage – Not Looking for Your Trade Secrets" |
National Law Review |
Sep 10, 2013 |
"Internet experts want security revamp after NSA revelations" |
Reuters |
Sep 7, 2013 |
"N.S.A. Able to Foil Basic Safeguards of Privacy on Web" |
New York Times |
Sep 6, 2013 |
"Trade Secret Law in a Nutshell" |
UNH Law |
Sep 6, 2013 |
"Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security" |
ProPublica |
Sep 5, 2013 |
"Why We Published the Decryption Story" |
ProPublica |
Sep 5, 2013 |
"U.S. Chamber of Commerce has unveiled a proposal aimed at creating tough rules for the theft of trade secrets within the context of the Trans-Pacific Partnership, including the installation of criminal sanctions, which many TPP countries currently lack" |
UNH Law |
Sep 4, 2013 |
"G20: All Access - Local companies highlight need to combat IP theft" |
ABC News |
Sep 3, 2013 |
"Global conditions pose challenges, incentives for cybersecurity standards" |
Inside Cybersecurity |
Sep 3, 2013 |
"IP Contribution Report" |
OHIM |
Sep 1, 2013 |
"When Theft Trumps Innovation" |
KPLU/NPR |
Aug 27, 2013 |
"Cyber Security Ranked Third on Lloyd's Of London Risk Index" |
Tripwire |
Aug 22, 2013 |
"The Pentagon as Silicon Valley's Incubator" |
New York Times |
Aug 22, 2013 |
"Pro-Patent Momentum on the Rise?" |
IP CloseUp |
Aug 20, 2013 |
"Is cyber the new gunpowder and corruption the spark?" |
Reuters |
Aug 14, 2013 |
"Japan Battery Maker Makes Case For Intellectual Property Paranoia" |
Wall Street Journal |
Aug 13, 2013 |
"Printing Hard Copies of Stolen Source Code: The Difference Between Freedom and Incarceration in the Second Circuit" |
Trade Secrets Watch |
Aug 13, 2013 |
"Administration Issues Latest Road Map to Combat Trade Secret Theft" |
JD Supra |
Aug 12, 2013 |
"Stop the Grandstanding on Patent Trolls" |
IP CloseUp |
Aug 11, 2013 |
"The Big Shift: The End Of The Era Of Great Invention" |
Forbes |
Aug 11, 2013 |
"Jon Kyl: Don't weaken intellectual property rights" |
USA Today |
Aug 9, 2013 |
"Cybersecurity and the board of directors: avoiding personal liability - Part II of III" |
Reuters |
Aug 6, 2013 |
"FBI's new iGuardian portal aims to ease cyber crime reporting" |
CSO Online |
Aug 5, 2013 |
"The Emerging Risks of Unauthorized IP in Your Supply Chain and How You Should Respond" |
JD Supra |
Aug 3, 2013 |
"Is IP Theft the Leading Cause of Tech Decline in the US?" |
Chip Design |
Aug 1, 2013 |
"Poison Ivy: Assessing Damage and Extracting Intelligence" |
FireEye |
Aug 1, 2013 |
"Address the patent trolls, but don't ignore the patent evaders" |
The Hill |
Jul 31, 2013 |
"Computer scientists achieve 'iron wall' software obfuscation to protect IP" |
Wired |
Jul 31, 2013 |
"Long story short: Fair use is theft by any other name" |
Brisbane Times |
Jul 31, 2013 |
"U.S. IP Commission Explores Foreign Theft; Ignores Domestic" |
IPCloseUp |
Jul 31, 2013 |
"Former Wash. AG named president of alliance aimed at stopping IP theft" |
Legal Newsline |
Jul 30, 2013 |
"Protect your small business from cybercrime" |
USA Today |
Jul 30, 2013 |
"Senators take aim at foreign cybercriminals" |
Politico |
Jul 30, 2013 |
"A Fractured Fairy Tale: Separating Fact & Fiction on Patent Trolls" |
IPWatchDog |
Jul 29, 2013 |
"Cyber espionage costs 508,000 jobs in the US" |
V3.CO.UK |
Jul 23, 2013 |
"Cybersecurity and the board of directors: avoiding personal liability - Part I of III" |
Reuters Complinet |
Jul 23, 2013 |
"N.S.A. Imposes Rules to Protect Secret Data Stored on Its Networks" |
New York Times |
Jul 18, 2013 |
"One big threat to cybersecurity: IT geeks can't talk to management" |
Quartz |
Jul 13, 2013 |
"Senate signals piecemeal approach on cybersecurity" |
FCW |
Jul 12, 2013 |
"A list of significant cyber events since 2006" |
Center for Strategic & International Studies |
Jul 11, 2013 |
"Defence partnership tackles cyber security risks" |
GOV.UK |
Jul 5, 2013 |
"Fear of IP theft a "growing concern" for emerging economies" |
WIPR |
Jun 27, 2013 |
"State AGs Developing Groundbreaking Solutions to Battle IT Theft and Unfair Competition" |
Yahoo |
Jun 26, 2013 |
"Troubled waters: the risks of international commercial disputes" |
Reed Smith |
Jun 24, 2013 |
"UK Home Office invests £4m to raise SMBs' cyber threat awareness" |
V3.CO.UK |
Jun 21, 2013 |
"G-20 Urged to Treat Cyber-Attacks as Threat to Global Economy" |
Washington Post |
Jun 13, 2013 |
"Stop thief! Time to limit US IP theft" |
TheHill |
Jun 10, 2013 |
"Bipartisan Effort to Punish Nation-State Cyber Hackers" |
Homeland Security & Government Affairs |
Jun 6, 2013 |
"Spooks nicking your tech? What you need is THE CLOUD - NSA boss" |
The Register |
Jun 5, 2013 |
"Policy Feature Issue: Global Intellectual Property Theft" |
GOP.gov |
Jun 4, 2013 |
"Attacking the attackers: Can active cyber defense stay within the rules?" |
GCN |
May 28, 2013 |
"IP theft commission wants to use rootkits and malware to attack piracy" |
Tech2 |
May 28, 2013 |
"Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies" |
Washington Post |
May 27, 2013 |
"Slowed by Debate and Uncertainty, New Rules Green Light Response to Cyber Attacks" |
Defense News |
May 27, 2013 |
"Protecting Know-How In China: Process Is Simple And Complex" |
Forbes India |
May 20, 2013 |
"Top U.S. admiral puts cyber security on the Navy's radar" |
News Daily |
May 13, 2013 |
"Inside a Cyber War Room: The Fight Against Hacking" |
CNBC |
May 7, 2013 |
"Combating IP Theft Using Unfair Competition Law" |
New York Law Journal |
May 6, 2013 |
"Global Piracy, SAP, Takeda, Goldman: Intellectual Property (1)" |
Bloomberg |
May 2, 2013 |
"Ukraine named as piracy Priority Foreign Country" |
Advanced Television |
May 2, 2013 |
"2013 Special 301 Report" |
USTR |
May 1, 2013 |
"Intellectual Property (IP) Theft Enforcement Program" |
U.S. Dept. of Justice |
Apr 26, 2013 |
"Organised crime linked to IP theft" |
News 24 |
Apr 26, 2013 |
"State of Intellectual Property" |
U.S. Chamber of Commerce |
Apr 26, 2013 |
"US embassies worldwide take to Facebook in bizarre promotion of 'World IP Day'" |
ARS Technica |
Apr 26, 2013 |
"Latest U.S. Efforts to Prosecute Trade Secret Theft Hit a Few Snags" |
Crime in the Suites |
Apr 23, 2013 |
"New IPC Certification Program Helps Electronics Manufacturers Protect Intellectual Property" |
IPC |
Apr 19, 2013 |
"U.S. House OKs bill to protect businesses against cyberattacks" |
Detroit News |
Apr 19, 2013 |
"Cyber Security and Cyber Espionage: A CCCA Panel" |
Slaw |
Apr 16, 2013 |
"Cyberattacks, corporate espionage now targeting smaller companies" |
CBC News |
Apr 16, 2013 |
"Q&A: Why cyberspies are targeting small businesses" |
USA Today |
Apr 16, 2013 |
"Government pledge to make UK one of the safest places to do business in cyberspace" |
The Daily Telegraph (UK) |
Apr 14, 2013 |
"Cybersecurity Responding to the Threat of Cyber Crime and Terrorism" |
FBI |
Apr 12, 2013 |
"New cybersecurity bill: Privacy threat or crucial band-aid?" |
Christian Science Monitor |
Apr 10, 2013 |
"A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace" |
Heritage Foundation |
Apr 1, 2013 |
"Concerns about cybersecurity" |
Ernst & Young |
Apr 1, 2013 |
"Spies and Big Business Fight Cyberattacks" |
International Herald Tribune |
Mar 27, 2013 |
"UK Government Establishes 'Fusion Cell' to Combat Cyber Attacks" |
International Business Times |
Mar 27, 2013 |
"Government to protect UK's £82bn digital economy with cyber crime task force" |
V3.CO.UK |
Mar 21, 2013 |
"The Looming Threats of Cyber War and Cyber Espionage" |
The Crime Report |
Mar 21, 2013 |
"White House Shares Plan to Mitigate Trade Secret Theft" |
IP Watchdog |
Mar 10, 2013 |
"Investing Opportunity: Prepping For Cyber Pearl Harbor" |
Forbes |
Mar 7, 2013 |
"Stopping Rampant Intellectual Property Theft With NAJI" |
Manufactoring.net |
Mar 7, 2013 |
"DHS Notifies Companies, Offers Intel about Ongoing Hacks" |
NextGov |
Feb 25, 2013 |
"Analysis: The near impossible battle against hackers everywhere" |
Reuters |
Feb 24, 2013 |
"Disclosure Plays Into Hackers' Hands" |
New York Times |
Feb 22, 2013 |
"A National Priority and a Business Priority" |
New York Times |
Feb 21, 2013 |
"Average computer users need to be on their guard for hackers, too" |
Washington Times |
Feb 20, 2013 |
"Nuclear Lab Remains Vulnerable to Cyberstrikes, Energy IG Say" |
NextGov |
Feb 15, 2013 |
"Cybersecurity research gets boost in 2013 budget request" |
GCN |
Feb 14, 2013 |
"Executive Order -- Improving Critical Infrastructure Cybersecurity" |
White House Executive Order |
Feb 12, 2013 |
"Employee IP Theft is Common" |
Symantec |
Feb 11, 2013 |
"Symantec raises the alarm over employee IP theft" |
IT Pro |
Feb 7, 2013 |
"Administraion Strategy on Mitigating the Theft of U.S. Trade Secrets" |
Scribd |
Feb 1, 2013 |
"Administration Strategy on Mitigating the Theft of U.S. Trade Secrets" |
OMB |
Feb 1, 2013 |
"Pentagon Expanding Cybersecurity Force to Protect Networks Against Attacks" |
New York Times |
Jan 27, 2013 |
"Brocade Awarded Permanent Injunction in Intellectual Property Theft Case Against A10 Networks" |
MarketWire |
Jan 11, 2013 |
"European agencies at center of cyberspying campaign" |
Pitssburgh Post Gazette |
Jan 5, 2013 |
2012 |
"Report: US government plans legal assault on foreign hackers" |
The Register |
Dec 20, 2012 |
"The Conference Board Launches New Report Highlighting Risks of Intellectual Property Theft and Corruption in Supply Chains" |
CNBC |
Dec 19, 2012 |
"Hype and fear" |
The Economist |
Dec 8, 2012 |
"Time Line: Fighting Intellectual Property Theft" |
Risk Management |
Dec 6, 2012 |
"2012: The year in cybersecurity" |
FCW |
Dec 5, 2012 |
"Experts develop protections for product piracy, intellectual property theft" |
Search Security |
Dec 5, 2012 |
"The Conference Board Launches New Report Highlighting Risks of Intellectual Property Theft and Corruption in Supply Chains" |
PR Newswire |
Dec 3, 2012 |
"Global Intellectual Property Center (GIPC) International IP Index" |
U.S. Chamber of Commerce |
Dec 1, 2012 |
"Safeguarding Intellectual Property and Addressing Corruption in the Global Supply Chain" |
The Conference Board |
Dec 1, 2012 |
"Step Into the Arena and Be Prepared to Get Dirty: Apple vs. Samsung" |
IP Made Simple |
Nov 29, 2012 |
"The Curious Case of Samsung's Missing TVs" |
Bloomberg |
Nov 29, 2012 |
"Attacks targeting government info, intellectual property grow more complex" |
GCN |
Nov 15, 2012 |
"A Need for Clearer Disclosure Rules after Cyberattacks" |
New York Times |
Nov 9, 2012 |
"Welcome to the era of drive-by hacking" |
BBC |
Nov 6, 2012 |
"Intellectual Property Theft Hurts Small Businesses" |
Hispanic Business |
Nov 4, 2012 |
"Intangible Theft" |
Intellectual Property Office (UK) |
Nov 1, 2012 |
"The bloody patent battle over a healing machine" |
CNN |
Oct 30, 2012 |
"IP Theft, Supply Chain Security Major Worries for Government, Former Cybersecurity Czar Says" |
Threat Post |
Oct 26, 2012 |
"IP Theft: Dyson Accuses Bosch Of Industrial Spying" |
Manufacturing Executive |
Oct 25, 2012 |
"Cyberwarfare" |
New York Times |
Oct 24, 2012 |
"Report sheds light on intellectual property theft" |
Security Info Watch |
Oct 24, 2012 |
"Verizon Releases Industry-by-Industry Snapshots of Cybercrime, Based on the Data Breach Investigations Report Series" |
Wall Street Journal |
Oct 24, 2012 |
"IP Theft Emerges as an Inside Job" |
Point 2 Security |
Oct 23, 2012 |
"Kroll Global Fraud Report Annual Edition 2012/13" |
Kroll Advisory Solutions |
Oct 16, 2012 |
"Ready Player One: Did the Pentagon just take over America's cybersecurity?" |
FP National Security |
Oct 12, 2012 |
"School settles laptop spying case to 'protect taxpayers'" |
ARS Technica |
Oct 12, 2012 |
"Panetta divulges secrets to make cyber-security come alive" |
FP National Security |
Oct 11, 2012 |
"Panetta Warns of Dire Threat of Cyberattack on U.S." |
New York Times |
Oct 11, 2012 |
"Pentagon Chief Reveals 'Classified' Cyber Threats" |
Wired" |
Oct 11, 2012 |
"Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City" |
U.S. Department of Defense |
Oct 11, 2012 |
"Automated Toolkits Named in Massive DDoS Attacks Against U.S. Banks" |
Threat Post |
Oct 2, 2012 |
"The Battle to Protect Confidential Data" |
Bloomberg |
Oct 2, 2012 |
"'Historic' DDoS Attacks Against Major U.S. Banks Continue" |
Threat Post |
Sep 27, 2012 |
"Smart Grid Cybersecurity Alert: Telvent Reports Hack" |
Green Tech Media |
Sep 27, 2012 |
"Maker of Smart-Grid Control Software Hacked" |
Wired |
Sep 26, 2012 |
"Microsoft Carries out Nitol Botnet Takedown" |
Threat Post |
Sep 12, 2012 |
"Shamoon The Wiper: further details" |
SecureList |
Sep 11, 2012 |
"Cyber attacks grow increasingly 'reckless', official says" |
Reuters |
Sep 7, 2012 |
"The Elderwood Project" |
Symantec |
Sep 7, 2012 |
"Guarding the Grid Against the New Breed of Cybercrime" |
Green Tech Media |
Sep 5, 2012 |
"Espionage Hackers Target 'Watering Hole' Sites" |
Krebs on Security |
Sep 1, 2012 |
"Tagging and Tracking Espionage Botnets" |
Krebs on Security |
Sep 1, 2012 |
"Bungling Cyber Spy Stalks Iran" |
Technology Review |
Aug 31, 2012 |
"Connecting the Dots After Cyberattack on Saudi Aramco" |
New York Times |
Aug 27, 2012 |
"Saudi Aramco Confirms Scope of Malware Attack" |
Threat Post |
Aug 27, 2012 |
"Smart Grid Cybersecurity: DHS Reports Vulnerability in RuggedCom's Software" |
Green Tech Media |
Aug 23, 2012 |
"Siemens 'flaw' claim sparks US power plant security probe" |
BBC |
Aug 22, 2012 |
"'Degrade, Disrupt, Deceive': U.S. Talks Openly About Hacking Foes" |
Wired |
Aug 11, 2012 |
"Darpa Looks to Make Cyberwar Routine With Secret 'Plan X'" |
Wired |
Aug 11, 2012 |
"Qatari Gas Company Hit With Virus in Wave of Attacks on Energy Companies" |
Wired |
Aug 3, 2012 |
"The Impact of Intellectual Property Theft on the Economy" |
Report by the US Congress Joint Economic Committee Chairman's Staff - Senator Bob Casey - Chairman |
Aug 1, 2012 |
"Rise Is Seen in Cyberattacks Targeting U.S. Infrastructure" |
New York Times |
Jul 26, 2012 |
"Foreign intelligence agencies are biggest online threat, ex-Fed warns" |
The Register |
Jul 25, 2012 |
"White Paper: Chasing APT" |
DELL SecureWorks |
Jul 23, 2012 |
"Research on Hardware Security" |
Sergei Skorobogatov |
May 31, 2012 |
"Anonymous Launches Cyberattack Salvo on China" |
TechNewsWorld |
May 28, 2012 |
"Massive targeted cyber-attack in Middle East uncovered" |
CNET Network |
May 28, 2012 |
"Chinese official's downfall tied to wiretapping spree" |
The New York Times |
Apr 26, 2012 |
"Cyber Theft of Corporate Intellectual Property" |
The Economist |
Apr 24, 2012 |
"2012 Data Breach Investigations Report" |
Verizon |
Apr 5, 2012 |
"10 Steps for Early Incident Detection" |
Tripwire |
Apr 1, 2012 |
"Japan joins worry list after losing the electronics plot" |
The Australian |
Mar 29, 2012 |
"Labor Takes Brave, True Path on Huawei and Tibet" |
The Australian |
Mar 29, 2012 |
"Taiwan giant buys into Sharp" |
The Australian Financial Review |
Mar 29, 2012 |
"McAfee: Corporate Espionage Is the Currency of Cybercrime" |
PCWorld |
Mar 28, 2012 |
"Hacktivism Is The Rising Cause of Data Breaches, Verizon Finds" |
Security Week |
Mar 22, 2012 |
"Cyber Theft of Corporate Intellectual Property" |
Economist Intelligence Unit and Booz Allen Hamilton |
Mar 12, 2012 |
"NSF: US losing ground as more R&D jobs head overseas" |
EE Times |
Jan 20, 2012 |
"'Red October' Cyberattack Ring Is Uncovered" |
Wall Street Journal |
Jan 14, 2012 |
"Oil above $110 on Iran, China data" |
Reuters |
Jan 3, 2012 |
2011 |
"Intellectual property theft fuels underground cyber economy" |
Venture Beat |
Mar 27, 2011 |