In a speech at the PLA's National Defense University, US Defense Secretary Chuck Hagel planned to urge China to be more open about its cyber capabilities to defuse tensions and prevent a potential crisis.
Seattle, Washington-based network security firm WatchGuard Technologies has added a new level of defense to its Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) appliances to help block Advance Persistent Threats.
Two members of an international cybercrime operation have pleaded guilty in federal court in New Jersey to their roles in an identity theft and fraud scheme that attempted to steal at least $15 million.
Enemy infrastructure is and always has been an important military target. The difference is that with increasingly automated and connected infrastructure, the ability for an enemy to target these systems digitally has increased, putting these systems at greater risk.
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Because transactions using virtual currencies happen anonymously, they confuse issues of jurisdiction and can become difficult to enforce. When authorities do take action, cybercrime simply re-images itself with a new currency and a new platform.