Senin, 31 Oktober 2011
Cyber spy campaign targets chemical industry: Symantec
FBI releases video, papers on Russian spy ring
Olive Branch Man Caught Peeping with 'Spy Pen'
Hudson Woman Charged With Felony in Alleged Eavesdropping Incident
Spouse Spy’s on the case
Sabtu, 29 Oktober 2011
Facebook hack attacks strike 600,000 times per day, security firm reports
Social media company admits to massive lapse in security
Read more...
Over 700 Companies Infiltrated by Cyber-Attack
At least 760 companies' networks were compromised by the same breach that affected security firm RSA, elevating concern over data security.
Jumat, 28 Oktober 2011
German secret police arrest elderly Spies "Mr. & Mrs. Smith"
Israel Convicts Conspirator Who Wiretapped Michael Cherney
According to the original indictment, filed in January 2011 by the Israel State Attorney's office, Eskin was contacted in 2007 by a Russian citizen, Alexei Drobashenko, who asked him to gather information about Michael Cherney in order to use it in a smear campaign.
Russian spies suspected of stealing auto secrets from Germans
A married couple was arrested in the German town Michelbach, suspected of stealing secrets from German car manufacturers, after it emerged one of them worked in the auto industry for the past 20 years.
“intelligence service sources say the man, named only as Andreas A., had worked for Faurecia, one of Germany’s top car part manufacturers which supplies major companies including Volkswagen, Renault, Toyota and Ford,” where he is thought to have engaged in “industrial espionage.”
Man Charged With Unlawfully Video Taping Woman at Counseling Center
School employee caught with secret camera
RAYMOND, NH -- An employee at a New Hampshire high school is accused of looking for trouble. Police said he used a hidden camera to violate a secretary’s privacy.
The apparent victim said she caught him in the act.
The 27-year-old computer technician, Daniel Malo, was arrested for allegedly shooting video of a female colleague from under her desk at Raymond High School.
According to the police report, Malo admitted he has a “boot fetish.”
“I think that’s totally wrong, a boot fetish?” said Jessica Harris, a concerned citizen.
Police said Malo was called to the school guidance office to fix a woman’s computer. Malo allegedly took his digital camera out of his pocket and placed it on the floor shooting video in “movie mode.”
Police said the woman was wearing a skirt with knee high boots and asked Malo, “Is that a camera?”
Malo allegedly said it was.
There was no comment from a woman that opened the door at Dan Malo’s Manchester home.
Raymond residents that read about the arrest on the town’s website were appalled.
“Oh wow, that’s crazy,” one resident said.
“No, he shouldn’t be around children or anything like that, especially women,” added Jessica Harris.
The alleged victim was sad to be concerned and upset.
School officials said they met with the woman and assured her she was safe, they also said that no students were involved.
Read more..
Minggu, 23 Oktober 2011
FBI: Tech firms face spy risk
Kexue Huang, a scientist and native of China, pleaded guilty last week in a federal court to swiping millions of dollars worth of trade secrets from Dow Chemical Co. and Cargill Inc. for other people doing research in Germany and China.
A federal jury last month ordered South Korea's Kolon Industries to pay DuPont Co. $920 million for stealing trade secrets regarding synthetic fibers used in such products as Kevlar body armor. A former DuPont engineer hired by Kolon, Michael Mitchell of Virginia, was sentenced in March last year to 18 months in prison for theft of trade secrets for passing on key DuPont data to Kolon.
And area technology companies are likely fooling themselves if they think they're not in the cross-hairs of such spy efforts, according to the Federal Bureau of Investigation. "If you haven't been a victim yet, it's because you have been and you don't know it, or you will be," Barry W. Couch, a special agent with FBI's Buffalo division, told a conference room full of area optics industry executives last week. "Don't be blindsided."
Chili's Sydor Optics played host as the FBI spent a handful of hours talking about counterintelligence and economic espionage issues, with handouts and a video presentation all revolving around the message that companies are under siege by foreign economic competitors, often with explicit help from foreign governments.
Optics in particular "is a targeted industry," said FBI special agent Chad Kaestle. Other frequently targeted technologies include sensors, aeronautics and marine systems.
Rabu, 19 Oktober 2011
U.S. DHS expects Anonymous to attack infrastructure
Anonymous is eyeing industrial control systems for future attacks, says the U.S. Department of Homeland Security, but its members have yet to demonstrate a capability to inflict damage to these systems.
"The information available on Anonymous suggests they currently have a limited ability to conduct attacks targeting ICS," says in thesecurity bulletin recently compiled by DHS' National Cybersecurity and Communications Integration Center. "However, experienced and skilled members of Anonymous in hacking could be able to develop capabilities to gain access and trespass on control system networks very quickly."
Aware that vulnerabilities in industrial control systems are plentiful, the DHS warns that common penetration testing software already uses control system exploits and packet inspection tools now support industrial protocols, so they can be taken advantage of for mounting attacks.
"In addition, there are control systems that are currently accessible directly from the Internet and easy to locate through internet search engine tools and applications," says the DHS experts. "These systems could be easily located and accessed with minimal skills in order to trespass, carry out nefarious activities, or conduct reconnaissance activities to be used in future operations."
Anonymous has still not targeted industrial control systems, but the DHS expects them to start in the near future as the collective has already made it known that its members should be targeting energy companies that don't seem to make an effort towards a "greener" production.
More...
Jumat, 14 Oktober 2011
Welcome to the World of Cyber-Terror Vulnerability
Did you open your BlackBerry Wednesday or even Thursday morning and find – nothing? No new e-mails, or tweets. No new text messages. Just blackness and that familiar screen saver photo of your child, spouse or dog? Welcome to the world of cyber-terrorism vulnerability.
The mysterious, world-wide virus that crippled BlackBerrys this week and spread like the plague – more on that threat later – across crossing oceans and five continents may spell financial catastrophe for the struggling Research In Motion aka RIM, whose stock shares have lost 60 percent of their value since the start of the year.
An RIM spokesman has said that the outage was caused by what Security Week called “a core switch failure within RIM’s infrastructure,” and not by a deliberate disabling attack. But the outage highlights the threat that determined cyber-warriors could pose to the nation’s communications systems if they target them.
For over a decade cyber-experts have urged the U.S. to upgrade critical infrastructure to protect vital dams, power plants, and communications systems from cyber-crime or cyber-attacks from rival countries. But the country remains complacent and highly vulnerable, as the BlackBerry outage shows.
During a recent cyber-security summit in New York, numerous experts warned that cyber-attacks could not only cause billions of dollars in damage to such vital systems, but endanger national security.
Read more: http://nation.foxnews.com/blackberry-outage/2011/10/13/welcome-world-cyber-terror-vulnerability#ixzz1amzsvuvp
Kamis, 13 Oktober 2011
FBI Arrests Man Who Allegedly Hacked Celebrities to Steal Nude Photos
Federal authorities have arrested and charged a 35-year old Florida man for allegedly hacking dozens of Hollywood celebrities, including breaking into Scarlett Johansson’s phone and leaking nude pictures of her to the internet.
Florida Man Arrested in “Operation Hackerazzi” for Targeting Celebrities with Computer Intrusion, Wiretapping, and Identity Theft
Jumat, 07 Oktober 2011
SpearTip’s Top Cyber Counterespionage Expert Gives TV Interview on TRICARE Data Theft
Doubts custodian’s assurances. Fears possible extortion of military employees whose personal medical data was taken.
Rabu, 05 Oktober 2011
Mirage device to be used in espionage?
(CBS News)
Devices That Can Listen In on Cellphone Traffic, Control Your Phone
Law enforcement and military officials are increasingly using secret devices sometimes called “stingrays” to locate people via their cellphones, even when the phones aren’t in use, the Wall Street Journal reported recently. But finding people isn’t all that this type of gear can do.
Social media for corporate networking or corporate espionage?
Today, corporates are looking at social media like Twitter, LinkedIn and Facebook to broaden their online outreach. In a session at INTEROP Mumbai 2011, Abilash Sonwane, Senior-VP, Elitecore Technologies, talked about how social media networks are the next frontier of corporate espionage
Around 13 percent of corporate losses occur due to corporate espionage, as per a recent KPMG report. The number is less as most of the companies usually don’t admit it. In a session at INTEROP Mumbai 2011, Abilash Sonwane, Senior-VP, Elitecore Technologies, talked about how social media networks are the next frontier of corporate espionage.
Today, corporates are looking at social media like Twitter, LinkedIn and Facebook to broaden their online outreach. As per Nielsen Online study, social networking is now officially more popular then e-mail. Considering the popularity of social media among corporates, Elitecore Technologies did a research on 20 companies to find out how social media can be used for corporate espionage.
To conduct the research, Elitecore selected companies that were active on social media from a mix of industries and geographies. The company found out that though on one hand social media can enable an enterprise to enhance its relationship with customers, on the other hand it can adversely affect a company’s reputation.
More...
Selasa, 04 Oktober 2011
In face of massive cybersecurity threat, government security dawdles
Despite efforts to improve, GAO report says most government agencies are at risk of security attack.
McAfee reveals ‘Shady RAT’ espionage ring
Minggu, 02 Oktober 2011
Business travelers should be on alert for cyber-spying

Packing for business in China? Bring your passport and business cards, but maybe not that laptop loaded with contacts and corporate memos.
China’s massive market beckons to American businesses — the nation is the United States’ second-largest trading partner — but many are increasingly concerned about working amid electronic surveillance that is sophisticated and pervasive.
Security experts also warn about Russia, Israel and even France, which in the 1990s reportedly bugged first-class airplane cabins to capture business travelers’ conversations. Many other countries, including the United States, spy on one another for national security purposes.
But China’s brazen use of cyber-espionage stands out because the focus is often corporate, part of a broader government strategy to help develop the country’s economy, according to experts who advise American businesses and government agencies.
“I’ve been told that if you use an iPhone or BlackBerry, everything on it — contacts, calendar, emails — can be downloaded in a second. All it takes is someone sitting near you on a subway waiting for you to turn it on, and they’ve got it,” said Kenneth Lieberthal, a former senior White House official for Asia who is at the Brookings Institution.