cyber-espionage, hackers, rules of war, united nations

Governments and Hackers Agree: The Laws of War Must Apply in Cyberspace

There are rules in war. International humanitarian law regulates what combatants can and can’t do, with the goal of protecting civilians and limiting suffering. Most of these laws were developed during the 19th and 20th centuries. But in our century, a new kind of battlefield has emerged: the domain of cyberattacks, digital campaigns, and online ...

Troy Oakes

Anonymous.

China Is Preparing Digital Dossiers on Foreigners

Matt Pottinger, the Deputy National Security Adviser to President Donald Trump, recently revealed that Beijing is building a database of millions of foreigners through a digital surveillance campaign by setting up digital dossiers. The communist regime plans to use the database to intimidate, influence, and blackmail foreign nationals to do their bidding. Digital dossiers Pottinger ...

Nspirement Staff

World map overlaid with one's and zero's and the image of a padlock.

Chinese Group Busy Hacking Government Networks in Asia-Pacific

A recent report by the Israeli cybersecurity firm CheckPoint has revealed that a China-based hacking group called Naikon has been conducting a 5-year cyber espionage campaign against countries in the Asia-Pacific region. Nations targeted by Naikon include Indonesia, Thailand, Myanmar, Vietnam, Brunei, the Philippines, and Australia. The hacking group focused on state-owned companies as well ...

Max Lu

Computer hacking.

Video Conferencing Service Zoom a Security Risk, Say Analysts

Zoom is a popular video conferencing app that is used by numerous businesses for conducting online meetings and group discussions. One of the features highlighted by the app is its support for end-to-end encryption for video calls. However, a recent report by watchdog Citizen Lab claims that the company not only holds on to the ...

Armin Auctor

A Zoom conference.

Easy Security Hack: Cracking Firewalls Using Spy Chips

A cybersecurity expert has revealed a way to secretly implant spy chips in popular hardware products and it’s so cheap that anyone with US$200 can easily do it. Monta Elkins from the security firm Foxguard will be presenting his work at the CS3sthlm security conference this month. The spy chip “To create his tiny spy ...

Armin Auctor

a username and password.

Chinese-Made Drones Can Potentially Be a Risk to U.S. Cyber Security

Chinese-made drones are susceptible to cyber espionage, according to U.S. officials — and the government seems to be preparing to crack down on the threat. Security issues with Chinese drones Drones are multi-purpose. They can be used for disaster relief, commercial aerial surveillance, filmmaking, and oil and mineral exploration among other things. Most of the ...

Jack Roberts

Two drones flying above the ground.

Chinese Hackers Charged by US for Stealing Business Secrets

The U.S. administration has charged two Chinese nationals with stealing sensitive business secrets from several American and international companies. The accused Chinese hackers are linked to the Chinese Communist Party (CCP). Chinese hackers stealing business secrets The hackers have been identified to be part of a group known as Advanced Persistent Threat 10 (APT 10). ...

Jack Roberts

American Security and Prosperity Threatened by Chinese Espionage

Chinese espionage has been increasing against U.S. companies and security establishments with an intention to destroy American values and influence. And though President Trump initiated import tariffs on Chinese products in a bid to force Beijing to stop the theft of U.S. intellectual property, stricter actions may be required to keep the communist nation in ...

Nspirement Staff