Category espionage, spying

VPN Demand In Hong Kong Reveals A New Fear: China Weaponizing The Internet

VPN demand in Hong Kong reveals a new fear: China weaponizing the Internet https://fortune.com/2020/05/26/hong-kong-china-vpn-internet/ BY GRADY MCGREGOR May 26, 2020 6:05 AM EDT   Tear gas was still fresh in the air as Lee, a 33-year-old demonstrator, watched a line of protesters trade insults with riot police in downtown Hong Kong on Sunday during a lull […]

China Builds Massive Spying Capacity In Africa

China Builds Massive Spying Capacity in Africa State-linked firms have built almost 200 government buildings on the continent Chinese President Xi Jinping shakes hands with Zimbabwe President Emmerson Mnangagwa / Getty Images Yuichiro Kakutani – May 26, 2020 5:00 AM The Chinese government has established an unparalleled spying capacity in Africa by encouraging Chinese companies such as […]

Sabotage And Subversion: The Secret Operations Of The SOE

Sabotage And Subversion: The Secret Operations Of The SOE forces.net · by James Wharton 18th May 2020 at 3:55pm Kidnapping German Generals, blowing up factories and infiltrating the water supply of a laundrette with itching powder … three real examples of the top-secret war time operations of the SOE, or to give it its full name, the […]

New Malware Ramsay, Can Steal Data From Air-Gapped Computers

New Malware Ramsay, Can Steal Data From Air-Gapped Computers   http://www.fortunascorner.com      Sudais Asif posted a May 14. 2020 article to the cyber security and technology website, HackRead.com, with the title above. For the better part of two decades, government and corporate entities, and others — have ‘protected’ their most precious digital information on stand-alone, air-gapped […]

SOCOM Chief: Door-Kickers Are Out, Cyber Operators Are In

Excerpts:   Speaking to thousands of members of the defense industrial base at the 2020 Virtual Special Operations Forces Industry Conference, SOCOM commander Army Gen. Richard Clarke laid out his vision for the future of U.S. special operations around the globe, a future that, while still centered on violent extremism, will rely heavily on information […]

U.S. To Accuse China Of Trying To Hack Vaccine Data, As Virus Redirects Cyberattacks

Cyberattacks Iran and other nations are also looking to steal data and exploit the pandemic with attacks on infrastructure, officials say. Chad Wolf, center, the acting secretary of Homeland Security, with President Trump and members of the coronavirus task force in March. The department is preparing to issue a warning about Chinese cyberattacks.Credit…Erin Schaff/The New […]

Ian Bremmer On: “What Happens Next with North Korea Now That Kim Jong-un’s Back”

What Happens Next with North Korea Now That Kim Jong-un’s Back BY IAN BREMMER  MAY 8, 2020 5:43 PM EDT Bremmer is a foreign affairs columnist and editor-at-large at TIME. He is the president of Eurasia Group, a political-risk consultancy, and GZERO Media, a company dedicated to providing intelligent and engaging coverage of international affairs. He teaches applied […]

Chinese Military Cyber Spies Just Caught Crossing A ‘Very Dangerous’ New Line

Excerpts: The military espionage group’s tactics, described by Check Point as “very dangerous,” involved hijacking diplomatic communication channels to target specific computers in particular ministries. The malware-laced communications might be sent from an overseas embassy to ministries in its home country, or to government entities in its host country. “The group has introduced a new cyber […]

3 Reports Look aA North Korea’s Lazarus Group, Iran’s Farhad Exchange, And The Crypto Ponzi Futurenet | Bitcoin News

3 Reports Look at North Korea’s Lazarus Group, Iran’s Farhad Exchange, and the Crypto Ponzi Futurenet | Bitcoin News news.bitcoin.com · by News · May 6, 2020 On May 4, 2020, the blockchain surveillance firm Chainalysis published a three-part series covering a crypto Ponzi scheme, North Korea, and Iran’s use of digital currencies like bitcoin. The company’s research […]

How Well Can Algorihms Recognize A Masked Face?; How China Built Facial Recognition For People Wearing Masks

How Well Can Algorihms Recognize A Masked Face?; How China Built Facial Recognition For People Wearing Masks http://www.fortunascorner.com        Tom Simonite posted a May 1, 2020 article to the security and technology website, WIRED.com, discussing a subject that is getting a lot of attention in the midst of the coronaviurs pandemic — the […]