Technology

President Obama’s “Autonomous” Organizing For Action Accused of Generating Fake Tweets Supporting Obama

February 26, 2013

“The Obama group Organizing for Action is fighting back against accusations that it generated fake tweets supporting the president’s call for gun-control legislation.”

Read the full article →

U.S. Internet Service Providers Launch Controversial “Six Strikes” Anti-Piracy Program

February 26, 2013

“The “Copyright Alert System,” or CAS, will allow content owners to monitor peer-to-peer networks for illegal downloading or uploading.”

Read the full article →

Symantec Security Response Discovers Earliest Version of Stuxnet 0.5 in

February 26, 2013

“Analysis of this code reveals the latest discovery to be version 0.5 and that it was in operation between 2007 and 2009 with indications that it, or even earlier variants of it, were in operation as early as 2005.”

Read the full article →

House Intelligence Committee Chairman Mike Rogers (R-MI) Dismisses China’s Hacking Denials

February 24, 2013

“He said the attacks were illegal and unprecedented in scope, and that the United States was not currently able to protect American companies from them.”

Read the full article →

Security Experts: Chinese Hackers Have Infiltrated Most Powerful Washington Institutions

February 21, 2013

“The list of those hacked in recent years includes law firms, think tanks, news organizations, human rights groups, contractors, congressional offices, embassies and federal agencies.”

Read the full article →

Mandiant: Chinese Hackers Outed Themselves By Logging Onto Facebook, a Website Blocked By China

February 20, 2013

““The easiest way for them to log into Facebook and Twitter is directly from their attack infrastructure,” the company’s report explains. “Once noticed, this is an effective way to discover their real identities.”"

Read the full article →

Copyright Dispute Prevents Germans From Viewing Video of Russian Meteorite

February 20, 2013

“Germany doesn’t have an equivalent of the American fair use provision, which this would almost certainly fall under in the United States.”

Read the full article →

White House Considering Trade Restrictions as Punishment for State-Sponsored Cyber Attacks

February 20, 2013

“The White House plans come after a Virginia-based cybersecurity firm released a torrent of details Monday that tied a secret Chinese military unit in Shanghai to years of cyberattacks against U.S. companies.”

Read the full article →

Google Unveils High-Tech Glasses

February 20, 2013

“Google began selling Glass developer prototypes called Explorer last year for $1,500 that are due to ship this year.”

Read the full article →

White House: State Department Inquiring About Cyber Hacking at “Highest Levels” of the Chinese Government

February 19, 2013

“State Department spokeswoman Victoria Nuland stopped short of saying whether the U.S. was in a cyber-war with China. But she and White House Press Secretary Jay Carney said U.S. officials have started a dialogue with the “highest levels” of the Chinese government.”

Read the full article →

Apple Inc.: Hackers Infiltrated Employee Computers Through Java Vulnerability

February 19, 2013

“The flaw was also used to compromise Macs at other companies, including a recently disclosed attack at Facebook.”

Read the full article →

President Obama Issues Executive Order to Protect Critical Infrastructure From Hackers

February 19, 2013

“The eight-page order represents a major attempt to shore up the country’s digital defenses against the new threats emerging from China, Iran and elsewhere — though it will require later intervention by a divided Congress.”

Read the full article →

Report: Chinese Military Linked to Hacker Group Targeting U.S. Businesses

February 19, 2013

“The Wall Street Journal reports Internet security company Mandiant says in the report it traced 141 major hacking attempts to a People’s Liberation Army building in Shanghai, 115 of which targeted U.S. companies or organizations.”

Read the full article →

Documents: United States is Target of “Sustained” Cyber-Espionage Campaign From China

February 11, 2013

“Over the past five years, the Chinese have focused their efforts on businesses operating in finance, technology, and aerospace, among others, according to the Post.”

Read the full article →

Federal Reserve Still Working to Determine Extent of Hackers’ Infiltration into its Computer Systems

February 8, 2013

“The Federal Reserve said on Thursday it was still working to determine the extent that its computer systems had been breached by hackers, adding that the incident was the subject of a criminal investigation by the Federal Bureau of Investigation.”

Read the full article →
Page 2 of 2512345...1020...Last »