Threat Intelligence

Cybersecurity & Fitness: Weekend Warriors Need Not Apply

It takes consistency and a repeatable but flexible approach to achieve sustainable, measurable gains in both disciplines.

Email Encryption On The Rise But Still Not ‘Universal’

Osterman study finds that more than half of organizations in North America use email encryption for external communications.

Macau Resident Held In US For Hacking, Insider Trading

Iat Hong and two others allegedly breached computers of major US law firms and stole confidential exchange on M&A transactions. Macau resident Iat Hong was recently arrested in his country on US charges that include conspiracy to commit hacking, security fraud, and insider trading along with two others, Bo Zheng (also of Macau) and Chin Hung (of China).

The US Department of Justice (DoJ) unsealed a 13-count indictment against the three and has initiated extradition proceedings against Hong. As per DoJ, using stolen credentials the defendants planted malware into their victims’ Web servers and successfully hacked the networks of two major New York law firms to steal confidential data from emails on forthcoming mergers and acquisitions (M&A) of clients.

They then used the information to allegedly manipulate the market by trading in stocks which were expected to rally post-announcement of the transactions.
In this manner, the three reportedly earned a profit of at least $4 million through insider trading. The defendants also tried to breach computers of five other law firms, at some point making at least 100,000 intrusion attempts. In addition, they launched a start-up robotics company and allegedly hacked the servers of two robotics firms to further business gains and stole information on product design and technology. Read charge details here. Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events.

For more information from the original source of the news item, please follow the link provided in this article.
View Full Bio More Insights

The Business of Security: How your Organization Is Changing beneath You

And why it's your job to change with it and 'skate where the puck is headed.'

Study: Rooted Androids, Jailbroken iPhones Found in Enterprises

A study released today gives greater insight into some of the worst fears for security pros trying to manage employees' BYOD mobile phones.

US Lawmakers Seek Grant For State, Local Cybersecurity

State Cyber Resiliency Act aims to increase resources for governments so they can fight cyber threats.

China's Cybersecurity Law Seeks Scrutiny Of Technology

Country's top internet regulator releases framework for stricter cyberspace laws, including review of local and foreign technology. Cyberspace Administration of China (CAC), China’s chief internet regulator, has released a strategy framework for the country’s cybersecurity law passed in November and called on foreign countries to respect its cyber laws, Reuters reports. CAC has stressed increased cybersecurity surveillance, including security review of technology in industries, both foreign and local.

Top Chinese industries have been asked to follow this keeping national interest in mind and to prevent unfair competition. The country is also planning to open an institute under the Chinese Academy of Sciences for training in national cybersecurity projects. Critics describe China’s new law as harsh and one which would allow authorities to police the internet services targeting foreign firms and potentially require companies to surrender their intellectual property. Read more on Reuters. Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events.

For more information from the original source of the news item, please follow the link provided in this article.
View Full Bio More Insights

Security & Development: Better Together

How DevSecOps removes the silos between security and application development teams so that everyone can work together at the same speed.

The Implications Behind Proposed Internet Privacy Rules

The FCC's overreach needed to be undone to protect the FTC's authority over privacy.

Vulnerabilities Hit High Water Mark in 2016

The good news is that coordinated disclosure keeps getting better.

Malspam Causing Havoc for Mac & Windows

Spam is a multi-platform, multi-vector approach to network compromise, and organizations need to weigh up the risks on all fronts to be able to combat it successfully.