30 Results for

mandiant

Article

Cybersecurity forces align as FireEye acquires Mandiant

The newly formed duo can now detect, prevent, and resolve breaches -- this could have ramifications for security firm competitors and governments accused of spying on their citizens and allies.

By January 2, 2014

Article

Heartbleed may be culprit in hospital chain hack

Hackers reportedly exploited the widespread Internet security flaw to steal the personal information of 4.5 million patients.

By August 20, 2014

Article

Hack of hospital chain leads to theft of up to 4.5M users' data

Community Health Systems is targeted in a massive cyberattack leading to stolen Social Security numbers and patient names and addresses. It's believed the attack originated in China.

By August 18, 2014

Article

Behind US-China cyberspy tensions: The view from Beijing (Q&A)

American tech firms are caught in the cross-fire between China and the US over cyberespionage. International politics specialist Shen Yi says this storm isn't likely to blow over soon.

By June 5, 2014

Article

Heartbleed attack used to skip past multifactor authentication

In one of the earliest instances of a Heartbleed attack breaking through a private corporate network, security firm Mandiant reports that a client's virtual private network session was successfully hacked.

By April 18, 2014

Article

Chinese hackers reportedly stole Obama and McCain documents

During the 2008 presidential campaign, top-level staffers' laptops were infiltrated with malware that allowed alleged Chinese hackers to steal internal documents, files, and e-mails.

By June 6, 2013

Article

U.S. government to propose bill targeting foreign hackers

New legislation to be introduced by the House Intelligence Committee aims to curb cybertheft and cyberespionage done by "cyber hackers from nation-states like China and Russia."

By June 5, 2013

Article

China's military to train on digital warfare

Amid rising concern in the U.S. over China's role in cyberattacks, the latter is expanding its focus on virtual combat.

By May 29, 2013

Article

Is protecting intellectual property from cyberthieves futile?

Experts gathering to discuss intellectual-property theft say that a fix will require the application of economic sanctions, not just more technology.

By May 23, 2013

Article

Google breach may have led to sensitive data leaks

Chinese hackers were blamed for breaking into Google's servers in 2010; now, U.S. officials say these cyberattacks may have led to the release of secret government information.

By May 20, 2013