Home » Archives by category » Briefs

Pentagon links Chinese cyber security firm to Beijing spy service

A Chinese cyber security firm is covertly working with Beijing’s Ministry of State Security intelligence service in conducting cyber espionage operations, according to Pentagon intelligence officials. The company known as Boyusec, officially the Bo Yu Guangzhou Information Technology Co., is also working with China’s global telecommunications company Huawei Technologies, which has been identified by U.S. intelligence agencies as linked to the Chinese military. According to an internal report by the Pentagon’s Joint Staff J-2 intelligence directorate, Boyusec and Huawei are working together to produce security products that will be loaded into Chinese-manufactured…

FBI, Pentagon counterspies hunt fraudulent Navy contractor

Counterintelligence agents from the FBI and Pentagon are pursuing a suspected foreign agent posing as a Navy officer who offered fraudulent contracts to defense contractors in a bid to obtain sensitive and embargoed American technology. The FBI on Wednesday sent a security alert about the scam uncovered recently by a contractor in Massachusetts to contractors engaged in secret defense work. An FBI counterintelligence agent stated in the alert that the contractor reported “an individual posing as U.S. Navy officer” was issuing fake Navy contracts for computer and telecommunications equipment. Full story…
The Washington…

Cyber security, nuclear modernization top Trump defense priorities

President-elect Donald Trump’s national security priorities are modernizing the aging U.S. nuclear arsenal and securing critical infrastructure from cyber attacks. According to Greatagain.gov, the presidential transition website opened Thursday, Trump also appears to have shifted rhetoric on terrorism. During the campaign, Trump loudly proclaimed radical Islam to be the key driver of terrorism. The transition website, however, refers only to “radical ideologies” as the inspiration behind the long-term threat of terrorism. Trump criticized the Obama administration during the campaign for its failure to use the term radical Islam in countering Muslim terrorism…

Securing ‘The Internet of Things’

The Department of Homeland Security issued a report this week outlining ways the Internet of Things can be made more secure. The Internet of Things, or IoT, includes millions of networked devices ranging from video cameras to television digital video recorders all connected to the internet. Unlike computers and handheld devices, most IoT devices lack security and can be easily hacked. Evidence surfaced last month of a major IoT hack of the domain name service company Dyn, which suffered a multiple-wave cyberattack that temporarily shut down its servers during a massive denial-of-service…

Military warns Chinese computer gear poses cyber spy threat

The Pentagon’s Joint Staff recently warned against using equipment made by China’s Lenovo computer manufacturer amid concerns about cyber spying against Pentagon networks, according to defense officials. A recent internal report produced by the J-2 intelligence directorate stated that cyber security officials are concerned that Lenovo computers and handheld devices could introduce compromised hardware into the Defense Department supply chain, posing cyber espionage risks, said officials familiar with the report. The “supply chain” is how the Pentagon refers to its global network of suppliers that provide key components for weapons and…

Clinton campaign tried to limit damage from classified info on email server

Documents from Hillary Clinton’s presidential campaign show researchers justified leaks of top secret data on drone strikes and North Korea’s nuclear program found on her private email server by highlighting similar disclosures. The detailed reports on the classified information found on Clinton’s private email system were produced by campaign researchers and sent to senior officials, including campaign chairman John Podesta, by opposition research director Tony Carrk on January 29. The documents were among thousands of hacked emails obtained from Podesta’s Gmail account and posted last week on Wikileaks. The U.S. intelligence community…

Obama vows retaliation for hack

The White House is promising unspecified retaliation against Russia for its hacking operation aimed at influencing the outcome of the 2016 presidential election. “The president has made it clear that we will take action to protect our interests, including in cyberspace, and we will do so at a time and place of our choosing,” a senior administration official told Inside the Ring. “Consistent with the practice we have adopted in the past, the public should not assume that they will necessarily know what actions have been taken or what actions we…

Pokemon Go security worries

The hugely popular augmented reality video game Pokemon GO, where users chase virtual creatures in the real world with handheld devices, is creating new security worries around the world, according to a State Department report. “What has become one of the world’s most popular mobile applications over the course of the summer is now causing headaches among security personnel in both the private sector and governments around the world,” the report by the Overseas Security Advisory Council (OSAC) says, adding that the game has “attracted controversy for contributing to security incidents…

Page 1 of 44123Next ›Last »