Mar 31, 2015

South Korea creates cybersecurity post to counter threat from Pyongyang

Concerned by the growing threat of cyberattacks from North Korea, South Korea’s cabinet on Tuesday approved the creation of a new presidential post handling cyber-security. The post will provide a “control tower” for efforts to counter North Korean hackers, presidential spokesman Min Kyung-Wook told ...

Mar 18, 2015

North Korea Web outage was reprisal for Sony hack, U.S. lawmaker says

A December blackout of North Korea’s Internet was retaliation for that nation’s hacking of computers at Sony Corp.’s Hollywood studio, a top U.S. lawmaker on cybersecurity issues said without identifying who was responsible. Rep. Michael McCaul of Texas, the Republican chairman of the House ...

In about-face, Sweden offers to question Assange in London

Mar 14, 2015

In about-face, Sweden offers to question Assange in London

Julian Assange and his supporters warily welcomed a surprise U-turn Friday by Swedish prosecutors, who now say they are willing to come to London to quiz the WikiLeaks founder over alleged sex crimes. The reversal, however, doesn’t mean the anti-secrecy activist will soon be ...

Japanese websites allegedly hacked by Islamic State group

Mar 12, 2015

Japanese websites allegedly hacked by Islamic State group

Several organizations in Japan appear to have had their websites hacked and temporarily defaced by the Islamic State militant group, according to informed sources. At least eight entities in five prefectures have been targeted, the sources said. They include the Nishinomiya Tourism Association in ...

Politics intrude as cybersecurity firms hunt for spies

Mar 12, 2015

Politics intrude as cybersecurity firms hunt for spies

The $71 billion cybersecurity industry is fragmenting along geopolitical lines as firms chase after government contracts, share information with spy agencies, and market themselves as protectors against attacks by other nations. Moscow-based cybersecurity firm Kaspersky Lab has become a leading authority on American computer ...

Mar 10, 2015

CIA allegedly sought to hack Apple iPhones from earliest days

CIA researchers have worked for nearly a decade to break the security protecting Apple phones and tablets, investigative news site The Intercept reported Tuesday, citing documents obtained from NSA whistleblower Edward Snowden. The report cites top-secret U.S. documents that suggest U.S. government researchers had ...

Mar 10, 2015

South Korea activists plan to send 'Interview' to North

South Korean activists vowed Tuesday to sneak copies of Hollywood satire “The Interview” across the border by propaganda balloon later this month, in defiance of North Korea’s repeated threats. Up to 10,000 copies of the film — a comedy about a fictional CIA plot ...

Mar 9, 2015

NISC to begin hiring 'white hat' hackers in fiscal 2015

To cope with cyberattacks, the government plans to hire so-called white hat hackers who use their sophisticated techniques and knowledge to protect rather than destroy. The government will hire several private-sector computer experts in fiscal 2015, which starts next month. The government accepted applications ...

Mar 7, 2015

U.S. charges three in ring that stole 1 billion email addresses

Two Vietnamese citizens and a Canadian have been charged with running a massive cyberfraud ring that stole 1 billion email addresses, then sent spam offering knockoff software products, the U.S. Department of Justice said on Friday. The Justice Department described the hacking spree as ...

CIA to make sweeping changes, focus more on cyberops

Mar 7, 2015

CIA to make sweeping changes, focus more on cyberops

The Central Intelligence Agency will make one of the biggest overhauls in its nearly 70-year history, aimed in part at sharpening its focus on cyberoperations and incorporating digital innovations, Director John Brennan says. Brennan told reporters he is creating new units within the CIA, ...

Stolen SIM card could be powerful spy tool

Feb 28, 2015

Stolen SIM card could be powerful spy tool

by Rob Lever

It would be another powerful tool in the arsenal of U.S. and British spy services: encryption keys for a large share of the SIM cards used for mobile phones. A report by the investigative news website The Intercept, citing leaked documents from former National ...