Cybersecurity

Another day, another cyber indictment

A second indictment in as many months accuses the owner of a Chinese aviation firm of selling data stolen from U.S. defense contractors to state-owned companies in China.

Cybersecurity

Chinese Citizen Allegedly Nicked Data on Boeing Military Cargo Plane

The owner of an aviation technology company also apparently plotted to burglarize other U.S. defense contractor networks.

Cybersecurity

Hacker compromises Google, Yahoo secure site credentials

Government (U.S.) // Web Services // New Delhi, India

Cybersecurity

10,000 guests at Houston luxury retreat exposed to ID theft

Hospitality // Texas, United States

Cybersecurity

Chinese-Made Inventory Scanners Allow Hackers to Track Shipments

Malware traced to China was found on tools at seven shipping and logistics firms.

Cybersecurity

Plastic surgeon provided a woman’s before-and-after photos to a TV station

Healthcare and Public Health // Utah, United States

Cybersecurity

No thawing of cyber tensions on Kerry’s Beijing trip

A "frank exchange" of views between the U.S. and China yielded no concrete results on the cyber-attack front.

Modernization

Beijing Thinks the <span>i</span>Phone is a Threat to China’s National Security

The phone's Frequent Locations function, which tracks the exact places you have been and the amount of time you spent there, is capturing "extremely sensitive data," says Chinese government TV.

Cybersecurity

Hackers track where shipments go with tainted inventory scanners

Manufacturing // Other Critical Infrastructure // United States

Modernization

Android's Factory Reset Doesn't Delete Everything. Here's How to Really Wipe Your Data

Security firm Avast purchased twenty used Android phones on eBay. Through extraction methods, they were able to recover old emails, texts, and even photos.

Cybersecurity

97 Percent of Key Industries Doubt Security Compliance Can Defy Hackers

Utilities and energy companies are more focused on preventing downtime than thwarting breaches.

Cybersecurity

Isolate and conquer: Getting past a reliance on layered security

It's time to throw cyberattackers into solitary before they strike, writes Bromium's Simon Crosby.