Tag Archive for: alleged

Sapporo man held by China stands trial over alleged espionage – The Japan Times

Sapporo man held by China stands trial over alleged espionage
The Japan Times
BEIJING – The first trial hearing of a Japanese detained last year by China for alleged involvement in espionage appears to have been held Thursday, a Japanese government source said. China told the Japanese side in advance that the closed-door …

Espionage China – read more

Untangling the NSA’s latest alleged embarrassment – Engadget – Engadget


Engadget

Untangling the NSA's latest alleged embarrassment – Engadget
Engadget
Last week, security researcher Mikko Hypponen found a notice on Github from an entity called Shadow Brokers, a reference to master of the galactic black …

and more »

flame malware – read more

Alleged NSA hackers probably gave away a small fortune by leaking exploits

Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons allegedly stolen from the U.S. National Security Agency.

The hackers, known as the Shadow Brokers, posted a sample file of the cyberweapons earlier this month and at least some of them appear to be zero-day exploits, or attacks that rely on software defects that practically no one knew about.

Before they were publicly leaked, each of these zero-day exploits could have sold for a great deal of money, according to security researchers. They’re designed to affect firewall and router products from Cisco, Juniper Networks and Fortinet, in addition to those from Chinese vendors.

To read this article in full or to leave a comment, please click here

Network World Security

Alleged NSA data dump contain hacking tools rarely seen

A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen, according to security researchers.

That includes malware that can infect a device’s firmware and persist, even if the operating system is reinstalled.  

“It’s terrifying because it demonstrates a serious level of expertise and technical ability,” said Brendan Dolan-Gavitt, an assistant professor at New York University’s school of engineering.

He’s been among the researchers going over the sample files from the cache, after an anonymous group called the Shadow Brokers posted them online.

To read this article in full or to leave a comment, please click here

Network World Security