Chinese Cyber Code Conflict
46.4K views | +0 today
Follow
Chinese Cyber Code Conflict
Chinese Cyber Code Conflict
Your new post is loading...
Your new post is loading...
Scooped by Red-DragonRising
Scoop.it!

Gameover Zeus Variant Sends Malicious Email Via Cutwail Botnet | threatpost

Gameover Zeus Variant Sends Malicious Email Via Cutwail Botnet | threatpost | Chinese Cyber Code Conflict | Scoop.it
The crew responsible for operating the Gameover variant of the infamous Zeus banking trojan are soliciting the enormous Cutwail botnet’s spamming capacity as an engine to fire off millions of malicious emails that seemingly originate from a number...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Auburn University unveils new cyber security facility

Auburn University unveils new cyber security facility | Chinese Cyber Code Conflict | Scoop.it
From protecting residents from the latest online phishing scams to safeguarding the nation’s security online, these guys have got you covered.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Did Iran’s Cyber-Army Hack Into the IAEA’s computers?

Did Iran’s Cyber-Army Hack Into the IAEA’s computers? | Chinese Cyber Code Conflict | Scoop.it
Amateur hackers or Iranian pros? Eli Lake says recent cyber-attacks on the IAEA might be more than pranks.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Breakup Of Alleged Cybercrime Ring With Overseas Arrests

Breakup Of Alleged Cybercrime Ring With Overseas Arrests | Chinese Cyber Code Conflict | Scoop.it
U.S. authorities said Wednesday that they broke up a sophisticated cybercrime ring that alleged duped Americans out of more than $3 million through online advertisements of nonexistent Lexus and BMW automobiles, Ninja motorcycles and, in one case,...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Air Force role just 1 piece of DoD's cyber puzzle

Air Force role just 1 piece of DoD's cyber puzzle | Chinese Cyber Code Conflict | Scoop.it
Air Force senior leaders assigned themselves several tasks after a summit on cyberspace in mid-November. But the service's role in cyberspace also awaits forthcoming guidance from the military's top leadership on the future of U.S.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Oldie but a Goodie...The Domestic Intelligence Gap: Progress Since 9/11?

Oldie but a Goodie...The Domestic Intelligence Gap: Progress Since 9/11? | Chinese Cyber Code Conflict | Scoop.it
Homeland Security Affairs is the online journal of the Center for Homeland Defense and Security (CHDS) and is the nation's preeminent peer-reviewed journal providing a forum to propose and debate strategies, policies, and organizational...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Congress passes resolution opposing U.N. Internet takeover

Congress passes resolution opposing U.N. Internet takeover | Chinese Cyber Code Conflict | Scoop.it
The U.S. House unanimously passed a resolution urging the U.S. government not to give the United Nations' International Telecommunication Union control over the Internet.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Infosecurity - 2012: The Year Malware Went Nuclear

Kaspersky Lab has broken down the top security stories of 2012, and the list is certainly filled full of doozies.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

New weapons for cyber warfare. The CHAMP project

New weapons for cyber warfare. The CHAMP project | Chinese Cyber Code Conflict | Scoop.it
New weapons for cyber warfare. The CHAMP project Cyber warfare scenario is rapidly changing, governments all around the world are investing to increase their cyber capabilities and designing new tools to adopt in cyberspace to face with opponents...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

China: An Extreme Communist Makeover?

China: An Extreme Communist Makeover? | Chinese Cyber Code Conflict | Scoop.it
In an effort to stave off mounting criticism, China’s leaders have banned official pomp and ceremony.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Hackers Target Ex-Military Chief

Hackers Target Ex-Military Chief | Chinese Cyber Code Conflict | Scoop.it
The FBI is pursuing foreign hackers who targeted the computers of retired Adm. Mike Mullen, former chairman of the Joint Chiefs of Staff, in the latest example of a pattern of attacks on computers of former high-ranking U.S.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Kyrgyz discuss cyber-security

Kyrgyz discuss cyber-security | Chinese Cyber Code Conflict | Scoop.it
This site features news from across and about the region and features analysis, interviews and commentary by paid CentralAsiaOnline.com correspondents.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

WatchGuard Reveals Top Security Predictions for 2013 - The Sacramento Bee

WatchGuard Reveals Top Security Predictions for 2013 - The Sacramento Bee | Chinese Cyber Code Conflict | Scoop.it
/PRNewswire/ -- WatchGuard® Technologies, a global leader in manageable business security solutions, today revealed its annual security predictions for 2013.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Revealed: ITU's deep packet snooping standard leaks online • The Register

Revealed: ITU's deep packet snooping standard leaks online • The Register | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Estonian Electricity Supplier Adds Security Measures After Cyber Attack | Economy | News | ERR

Estonian Electricity Supplier Adds Security Measures After Cyber Attack | Economy | News | ERR | Chinese Cyber Code Conflict | Scoop.it
Estonian Public Broadcasting News in English...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Abuse of .EU domains by malware gangs continues despite Registrar notification

Abuse of .EU domains by malware gangs continues despite Registrar notification | Chinese Cyber Code Conflict | Scoop.it
What do you do when attackers are abusing legitimate domain Registration services?

How do you stop or at least disrupt the malicious attacks?

Reporting the incident to the appropriate Registr...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Oh Canada! Companies not investing enough on cyber-security, government documents say

Oh Canada! Companies not investing enough on cyber-security, government documents say | Chinese Cyber Code Conflict | Scoop.it
OTTAWA — Canadian companies may be skimping on IT security, leaving themselves and Canadians vulnerable to attacks from hackers, newly released records suggest.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

People's Republic of China's Huawei rejects U.S. “threat to national security” claims

People's Republic of China's Huawei rejects U.S. “threat to national security” claims | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Zeusfamily trojan spreads by way of spam botnet

Zeusfamily trojan spreads by way of spam botnet | Chinese Cyber Code Conflict | Scoop.it
Purveyors of the Gameover trojan are using the wellknown Cutwail botnet to lure victims into downloading the banking malware.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Infosecurity - Zeus malware throws €36+ million lightning bolt across Europe

A highly sophisticated, multi-pronged cybercriminal attack used to steal an estimated €36+ million from more than 30,000 bank accounts across Europe has been uncovered. The attack uses a new, souped-up form of the Zeus trojan.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

The Barnes & Noble Breach Take Aways

The Barnes & Noble Breach Take Aways | Chinese Cyber Code Conflict | Scoop.it
On October 24, 2012 it was announced that Barnes & Noble had a credit card breach that was the result of tampered credit card terminals.  As a result of the breach, Barnes & Noble pulled al...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

ZeroNights Conference Report | Security Intelligence Blog | Trend Micro

ZeroNights Conference Report | Security Intelligence Blog | Trend Micro | Chinese Cyber Code Conflict | Scoop.it
We discuss the recent ZeroNights security conference which was held in Moscow last November 19-20.
more...
No comment yet.