Categories: Cyber Crime

US Technologies and Trade Secrets at Risk in Cyber space

The threat to the technological solutions and to the secrets of the United States in the cyber space is relevant.  Foreign Organization, mainly Chinese and Russian are hunting for sensitive information of an economic and industrial nature, in public and private sectors.

To denounce the actions under discussion is a report presented to Congress by the Office of the National  Counterintelligence Executive (ONCIX) that alerts the institutions on the possible interference in the governative affairs by partner and “hostile” states.

The proliferation of malicious software, hacktivist actions, prevalence of cyber tool sharing, and routing of operations through third countries make it difficult to attribute responsibility for computer network intrusions. Of course there are also foreign collectors of sensible informations that are interested in all aspects of US economic activity and technology in the following areas:

  • Information and communications technology (ICT).
  • Business information that pertains to supplies of scarce natural resources or that provides foreign actors an edge in negotiations with US businesses or the US Government.
  • Military technologies.
  • Civilian and dual-use technologies in sectors likely to experience fast growth, such as clean energy and health care/pharmaceuticals-

Companies and governments are forced by events to support a significant economic cost for prevention and intrusion defense and the direct loss of intellectual property.

In this scenario there are also companies who are not aware of the threat they facing and often they have to manage late situation of crisis related a suffered attack carried out against them. Those  companies usually do not report what happened to reduce the harm caused to their corporate image and reputation with investors, customers and employees.

Latest data presented during several conferences show that the direct and indirect damage caused by cybercrime activities has a global amounted little less than $ 400 billion. Next year, the costs could easily double, following the current trend.

Just to refer to a recent official data, the England a few days ago said to have suffered so far in 2011 as many as 24 billion pounds.

China, Russia called out as cyberspy hotbeds

ONCIX Report

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A bug in Chrome Password Manager caused user credentials to disappear

Google addressed a Chrome's Password Manager bug that caused user credentials to disappear temporarily for…

3 hours ago

BIND updates fix four high-severity DoS bugs in the DNS software suite

The Internet Systems Consortium (ISC) released BIND security updates that fixed several remotely exploitable DoS…

14 hours ago

Terrorist Activity is Accelerating in Cyberspace – Risk Precursor to Summer Olympics and Elections

Terrorist groups are increasingly using cyberspace and digital communication channels to plan and execute attacks.…

18 hours ago

Progress Software fixed critical RCE CVE-2024-6327 in the Telerik Report Server

Progress Software addressed a critical remote code execution vulnerability, tracked as CVE-2024-6327, in the Telerik Report…

1 day ago

Critical bug in Docker Engine allowed attackers to bypass authorization plugins

A critical flaw in some versions of Docker Engine can be exploited to bypass authorization…

1 day ago

Hackers exploit Microsoft Defender SmartScreen bug CVE-2024-21412 to deliver ACR, Lumma, and Meduza Stealers

The CVE-2024-21412 flaw in the Microsoft Defender SmartScreen has been exploited to deliver information stealers…

2 days ago

This website uses cookies.