Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

US report warns of Russia, China cyber spying

Nov 3 , 2011 | ITNews.com

The U.S. can expect more aggressive efforts from countries such as Russia and China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing, according to a new government report released Thursday.

The two countries were singled out in the report from the Office of the National Counterintelligence Executive, which also issued recommendations for how organizations can strengthen their defenses.

"Chinese actors are the world's most active and persistent perpetrators of economic espionage," the report said. "Russia's intelligence services are conducting a range of activities to collect economic information and technology from U.S. targets."

The growing complexity of IT systems will work to the advantage of cyberspies, as more sensitive information is held on devices such as smartphones and laptops.

Cyberspying is efficient since it can be conducted with relatively limited resources from far away. Once an intrusion is detected, it can be difficult to trace the origin since attacks can be routed through computers worldwide.

The information haul can be devastating. The reported cited the case of Dongfan Chung, who was an engineer with Rockwell and Boeing and was sentenced in 2010. He worked on the B-1 bomber program and was found to have 250,000 pages of documents in his house, which would have filled four, four-drawer filing cabinets.

If converted to digits, the information would fit onto one CD. "Cyberspace makes possible the near instantaneous transfer of enormous quantities of economic and other information," the report said.

China's intelligence agencies often leverage people who have insider access to corporate networks to gain trade secrets and copy them to removable media. Russia's desire to diversify its economy will drive the country to use its highly capable intelligence services, including cybertechniques, to try to gain an economic advantage.

"We judge that the governments of China and Russia will remain aggressive and capable collectors of sensitive U.S. economic information and technologies, particularly in cyberspace," the report said.

It recommended that organizations encrypt information, use multifactor authentication and conduct real-time monitoring of networks, among others.

The report covers 2009 through this year and is part of a law that requires the U.S. president to send Congress a biennial report on the threat to U.S. industry from industrial espionage.

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/