Chip Security
  • Email
  • Home
  • News
  • Reports
  • Opinion
  • Tools
  • About

Hackers shifting to ‘destruction’: US cyber chief | DAWN.COM

Posted on October 7, 2012 by John in News

WASHINGTON, Oct 1, 2012 – Hackers are stepping up the intensity of their attacks, moving from “disruption” to “destruction” of key computer systems, the top US cyber-defense official said Monday. General Keith Alexander, who is director of the National Security Agency and commander of the US Cyber Command, told a Washington forum that the new tactics […]

command, cyber, destruction, hackers

Malicious code in the IT supply chain threatens federal operations

Posted on March 28, 2012 by John in News

… IT systems at the Energy, Homeland Security and Justice departments more vulnerable to malicious or counterfeit software installed by other nations’ intelligence agencies or by nonstate actors and hackers… via Malicious code in the IT supply chain threatens federal operations – Nextgov.

hackers, hardware, IT, malicious, software, system

Richard Clarke: China has hacked every major US company

Posted on March 28, 2012 by John in News

Cybersecurity advisor Richard Clarke is warning the U.S. that its major companies are being regularly infiltrated by Chinese hackers employed by the Chinese government to steal R&D. Richard Clarke: China has hacked every major US company | ZDNet.

advisor, Chinese, cybersecurity, hackers, Richard Clarke, theft

Recent Posts

  • Design for Security: Needed More than Ever
  • New DARPA Program Seeks to Reveal Backdoors and Other Hidden Malicious Functionality in Commercial IT Devices
  • Electrical testing to track fake military parts
  • DOD requirement to mark parts with unique DNA
  • Toshiba adds IP protection to automotive MCUs

Recent Comments

    (c) 2012 Chip Security - Web Design by Blue Mustang