Free Newsletters - Space News - Defense Alert - Environment Report - Energy Monitor
. Military Space News .




CYBER WARS
China, Romania key sources of hacking: report
by Staff Writers
Washington (AFP) April 23, 2013


China and Romania were by far the largest sources of confirmed hacking attempts last year, with China's mostly from state-controlled sources aimed at data theft, a new report said Tuesday.

Verizon's 2013 Data Breach Investigations report said 30 percent of 621 confirmed attacks were sourced back to China, 28 percent to Romania, and another 18 percent to the United States.

By far most of the attacks in China were focused on data theft, the report said, while those from Romania and most of those in the United States were about theft for financial gains.

"State-affiliated actors tied to China are the biggest mover in 2012. Their efforts to steal IP (intellectual property) comprise about one-fifth of all breaches in this dataset."

"This may mean that other threat groups perform their activities with greater stealth and subterfuge. But it could also mean that China is, in fact, the most active source of national and industrial espionage in the world today."

The report was compiled together with 19 groups from the global computer security and law enforcement community, many of them national cybersecurity organizations and public-private computer security groups.

The report said there were some 47,000 reported security incidents last year, the large part of them related to error, usually on the part of someone in a company who has lost a device or missent an email that could expose its systems.

But of those, there were 621 confirmed data breaches, three-quarters of them driven by financial motives.

Of the total, 111 were combined physical and malware attacks on smaller establishments aimed at financial theft.

Another 190 involved the physical penetration of bank automatic teller or cash point machines, using skimming devices to steal customer data.

And 120 more were what the Verizon report called the standard technique for penetrating networks and data for financial and espionage reasons: a mix of malware, hacking, phishing and other techniques.

Out of the 621 breaches, 19 percent came from state-linked actors, almost all of those from China, and were not financially driven, the report said.

Those from Romania, Russia and Bulgaria -- 40 percent of the total -- were virtually all aimed at financial gains.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
US journalist charged in hacking plot is sacked
San Francisco (AFP) April 22, 2013
A US journalist charged with conspiring with the hacker group Anonymous to break into and alter an online Los Angeles Times story said Monday he has been fired by Reuters. Matthew Keys, 26, sent out word via Twitter that the news agency had dismissed him. "Just got off the phone. Reuters has fired me, effective today," Keys said in the message. "Our union will be filing a grievance. More ... read more


CYBER WARS
Pentagon requests more funding for Israel's 'Iron Dome'

Lockheed Martin PAC-3 Missile Intercepts and Destroys Tactical Ballistic Missile in New Test

Japan's missile defence plan: some facts

Poland guarantees funds for missile shield

CYBER WARS
Lockheed Martin's Nemesis Missile Scores 3-For-3 in Flight Tests

Guam heightens alert level after N. Korea threats

US warns N. Korea ahead of expected missile launch

Raytheon demonstrates new Joint Standoff Weapon Extended Range integrated fuel system

CYBER WARS
US drone destroys Taliban base in Pakistan, five killed

Pentagon calls off new medal for drone, cyber warriors

Red Cross chief criticises drone use outside battlefields

Saudis 'turn to South Africa for UAVs'

CYBER WARS
General Dynamics' WIN-T Increment 2, Soldiers' "On-the-Move" Network, Advances as 10th Mountain Division Trains for Deployment

Lockheed Martin Awarded Contract to Modernize U.S. Joint Theater Air Operations System

Boeing Delivers FAB-T Test Units to US Air Force

Fourth Lockheed Martin MUOS Satellite Entering System Test as Communication Module and Multi-Beam Antenna Installed

CYBER WARS
Northrop Grumman launches CUTLASS, Next Generation Unmanned Ground Vehicle

Navy Develops High Impact, High Integrity Polymer for Air, Sea, and Domestic Applications

Australia opens Gaza Ridge vehicle facility

Smaller Pixels, Smaller Thermal Cameras for Warfighters

CYBER WARS
Dutch civil servant jailed for spying for Russia

France wants defense off table in EU-US trade talks

British millionaire guilty of selling fake bomb detectors

Hagel touts arms deal on Israel trip

CYBER WARS
Outside View: America's historical amnesia

Japanese prime minister warns China against landings

South China Sea: a decades-long source of tension

Japan vows force if Chinese land on disputed islands

CYBER WARS
Super-nanotubes: 'Remarkable' spray-on coating combines carbon nanotubes with ceramic

Nanocoating At ESA

New device could cut costs on household products, pharmaceuticals

Nanotechnology imaging breakthrough




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement