As few as 12 different Chinese groups, largely backed or directed by the government there, commit the bulk of the China-based cyber attacks stealing critical data from U.S. companies and government agencies, according to U.S. cyber security analysts and experts. The aggressive but stealthy attacks, which have stolen billions of…
As few as 12 hacker teams responsible for bulk of China-based data theft
Sketched out by analysts who have worked with U.S. companies and the government on computer intrusions, the details illuminate recent claims by American intelligence officials about the escalating cyber threat emanating from China. And the widening expanse of targets, coupled with the expensive and sensitive technologies they are losing, is…
A few Chinese hacker teams do most US data theft
As few as 12 different Chinese groups, largely backed or directed by the government there, do the bulk of the China-based cyberattacks stealing critical data from U.S. companies and government agencies, according to U.S. cybersecurity analysts and experts. The aggressive, but stealthy attacks, which steal billions of dollars in intellectual…
ProtectMyID: If you need to withdraw cash, don’t use a private ATM at a convenience store or restaurant—your data may not be secure there. #identitytheft
ProtectMyID: If you need to withdraw cash, don’t use a private ATM at a convenience store or restaurant—your data may not be secure there. #identitytheft View full post on Twitter / ProtectMyID View full post on National Cyber Security
Cross-site scripting flaws pose a risk to web app data security, says Veracode
Cross-site scripting flaws are the most prevalent vulnerabilities found in Web applications, posing a risk to data and intellectual property, according to a study of thousands of applications by vendor Veracode. Veracode, a company that specialises in finding vulnerabilities in code, analysed more than 9,900 applications that were submitted to…
#Ebook Deal/Day: Head First Data Analysis – $19.99 (Save 50%)
Get “Head First Data Analysis” today and save 50%! This sale ends at 2:00 AM 2011-12-08 (PDT, GMT-8:00). View full post on O’Reilly News and Commentary View full post on National Cyber Security
Data Protection Convention is rewritten 30 years on
A 30-year old international treaty covering data protection is undergoing a partial rewrite to reflect new concerns in the age of the Internet. The long-titled treaty, called the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, is the only legally binding international treaty covering…
SXU Prof. William Kresse discusses cell phone data security on CBS 2 Chicago News at 5
Saint Xavier University Prof. William Kresse, aka “Professor Fraud” appeared live on CBS Chicago News at 5 to discuss cell phone data security and offered tips to prevent identity thieves from accessing personal information on cell phones on March 4. Kresse is an associate professor at the Graham School of…
Europe cloud vendors cleaning up with data protection fears
Concern in the European Union that US data protection laws are too lax may have created a new market for European cloud computing services. A recent survey indicated that 70 percent of Europeans have concerns about their online data and how well companies secure it and now two Swedish companies,…
Lawmakers want spy agencies to share cyber data (Reuters)
Reuters – U.S. lawmakers on Wednesday proposed fighting the cyber threat that is taking a toll on American companies by allowing spy agencies to share threat intelligence with private firms. View full post on Yahoo! News: Security News View full post on National Cyber Security