Russian hacker forums cater to business transactions while Chinese hacktivism is rooted in allegiance to country, according to a new report from Recorded Future, a threat intelligence firm. China’s first hacker groups popped up in the late 1990s, triggered by anti-Chinese riots in Indonesia, the report said. Originally nationalistic discussion boards, they eventually evolved into the initial wave of Chinese hacking groups: the Green Army, China Eagle Union, and Hongke (or Honker) Union, Recorded Future added.
At the end of last month, Facebook made a bombshell disclosure: As many as 90 million of its users may have had their so-called access tokens--which keep you logged into your account, so you don't have to sign in every time--stolen by hackers. Friday, the company put the actual number at 30 million. Here's how to see if you were one of them, and if so, what the hackers got from your account.
Facebook on Friday revealed that hackers had stolen extensive information from 14 million users in the hack it announced last month. The company said an estimated 30 million people were affected by the hack, downgrading its initial estimate that information on 50 million users had been compromised.
Leaders of the U.S. intelligence community focused on security threats posed by China, with little attention paid to Russia, during an annual oversight hearing by the Senate Homeland Security and Governmental Affairs Committee on Wednesday.
In an investigation that began in July 2017 and concluded this month, GAO testers discovered some shocking security problems. In many cases, the weapons and systems still used default passwords. In others, unauthorized access could be obtained with “relatively simple tools”; in one case, it took nine seconds.
China’s growing expertise with computers is a bigger threat to the United States than Russia’s attempts to influence American elections. That claim comes from the U.S. Director of National Intelligence, Dan Coats. He warns that China is on a path to possibly become more powerful than any other country.
The risks to U.S. tech companies from Chinese cyberespionage have accelerated. Tech companies from both countries have been pitted against one another, as an enormous amount of American technology is produced in China due to the cheap costs, Ives said, and competition over who will cash in on the technology of tomorrow -- in particular, artificial intelligence -- is extremely fierce. Security concerns are virtually promised to be an issue for many years to come.
The bill will rebrand DHS’s main cybersecurity unit known as National Protection and Programs Directorate (NPPD) as the Cybersecurity and Infrastructure Protection Agency, spinning the headquarters office out into a full-fledged operational component of DHS on the same level as Secret Service or FEMA.
An explosive report published by Bloomberg Businessweek on Thursday claimed the Chinese military sabotaged circuit boards used by dozens of major American companies and government contractors by implanting a tiny chip that gave the People’s Liberation Army backdoor access to supposedly secure systems. The report cited a U.S. investigation long in progress but only now revealed to the public.
When apps wants to access data from your smartphone's motion or light sensors, they often make that capability clear. That keeps a fitness app, say, from counting your steps without your knowledge. But a team of researchers has discovered that the rules don't apply to websites loaded in mobile browsers, which can often often access an array of device sensors without any notifications or permissions whatsoever.