Menu
All about computers
Google Plus racks up followers, but not all are devoted
Social media enables interactive jukebox
Social media puts HR ethics under the spotlight
Zuckerberg, Brin join forces to extend life
LinkedIn buys news app Pulse to broaden content
China, Romania key sources of hacking, report says
Japan, China, S. Korea to cooperate on air pollution
UP fitness wristbands get in stride with Android gadgets
More videogame players moving online
The new consoles from Microsoft, Nintendo and Sony
Tablet sales surge as consumers shun PCs
Coupled particles cross energy wall
High-efficiency zinc-air battery developed
Facebook unveils its 'home' on Android phone
A smartphone app to verify halal products
Google's Motorola to cut 10% of workforce
Google's recipe for excitement
Genetic analysis saves major apple-producing region of Washington state
Android gains US share at Apple expense, survey finds
China social media hailed after official toppled
Twitter tightens security after high-profile breaches (Update)
Tumblr deal sparks talk on next big tech target
Social game star Zynga slashes staff, closes studios
Apple prepares for first debt issue
China, Romania key sources of hacking, report says
China and Romania were by far the largest sources of confirmed hacking attempts last year, with China's mostly from state-controlled sources aimed at data theft, a new report said Tuesday.

Verizon's 2013 Data Breach Investigations report said 30 percent of 621 confirmed attacks were sourced back to China, 28 percent to Romania, and another 18 percent to the United States.

By far most of the attacks in China were focused on data theft, the report said, while those from Romania and most of those in the United States were about theft for financial gains.

"State-affiliated actors tied to China are the biggest mover in 2012. Their efforts to steal IP (intellectual property) comprise about one-fifth of all breaches in this dataset."

"This may mean that other threat groups perform their activities with greater stealth and subterfuge. But it could also mean that China is, in fact, the most active source of national and industrial espionage in the world today."

The report was compiled together with 19 groups from the global computer security and law enforcement community, many of them national cybersecurity organizations and public-private computer security groups.

The report said there were some 47,000 reported security incidents last year, the large part of them related to error, usually on the part of someone in a company who has lost a device or missent an email that could expose its systems.

But of those, there were 621 confirmed data breaches, three-quarters of them driven by financial motives.

Of the total, 111 were combined physical and malware attacks on smaller establishments aimed at financial theft.

Another 190 involved the physical penetration of bank automatic teller or cash point machines, using skimming devices to steal customer data.

And 120 more were what the Verizon report called the standard technique for penetrating networks and data for financial and espionage reasons: a mix of malware, hacking, phishing and other techniques.

Out of the 621 breaches, 19 percent came from state-linked actors, almost all of those from China, and were not financially driven, the report said.

Those from Romania, Russia and Bulgaria—40 percent of the total—were virtually all aimed at financial gains.
No health risk from Fukushima radiation, UN says
How flames change the sound of a firefighters' personal safety alarm
New Zealand police ordered to return Dotcom material
Australia spy chief says new building safe
Dell board recommends Michael Dell buyout offer (Update)
Micro-capsules and bacteria to be used in self-healing concrete
New nerve and muscle interfaces aid wounded warrior amputees
Ultrasound 'making waves' for enhancing biofuel production
USSR's old domain name attracts cybercriminals
Researchers design sensitive new microphone modeled on fly ear
New speaker system creates separate 'audio zones' for front and rear
Transportation fuels from woody biomass promising way to reduce emissions
Our ambiguous world of words
India's Infosys recalls founder as woes mount
Google interns meet their Hollywood counterparts
China trying new form of 'Internet censorship'
Motorola on authentication: We're talking tattoos and pills
US judge orders Google to turn over data to FBI
Yahoo! wraps US music tour with fun
Berlin company counts on the autistic
Adamant Apple in court to fight ebook conspiracy
Thousands rally against nuclear power in Tokyo
Push for US Internet 'wiretap' law faces tough road
Google nixes face-recognition features in Glass eyewear
3-D printing goes from sci-fi fantasy to reality
India's Infosys surges on founder Murthy's return
Apple battles ebook conspiracy in US court
Solar plane to get inflatable hangar after Midwest storms
Menu
Physical by smartphone becoming real possibility
Review: Google music plan solid, serendipitous
Smarty pants: Wearable electronics will recharge your life
Finnish start-up launches smartphone to rival giants
Samsung unveils new Galaxy S4 'Mini'
Google Drive sports new view and scan enhancements
Facebook joins Web freedom group
New method for mass-producing high-quality DNA molecules
WABIAN robot from Japan steps closer to human walk
Printing innovations provide tenfold improvement in organic electronics
Time is ripe for smartwatches, analysts say
Google coming out with two new Android phones
Taiwan makers showcase computers at Computex
"Is that a smartwatch you're not wearing?" Google's may actually appear
Waiting for Apple's iWatch
Internet's fast lane getting crowded
Cheap leases offered to spur electric car sales (Update)
Caterpillar will install no-doze system for mining trucks
Microsoft aims to simplify with Windows 8.1
Tesla promises to add charging stations
App helps prevent healthcare miscommunication
Cherished 'Start' button returning to Windows software (Update)
Android antiviral products easily evaded, study says
Hagel to broach topic of cyberthreats with Chinese
Visit Statistics
http://google.com/

http://bing.com/

https://gepatit-info.top/

https://serdechnic.com/

https://buy-meds24.com/

https://dverirespekt.ru/

https://www.sribno.net/

https://undergroundcityphoto.com/

https://detskiezabolevaniya.com/

http://grafaman.ru/

http://innoslicon.com/html/product/index.htm

https://yginekologa.com/

https://yes-com.com/

https://www.baikaleminer.com/

https://bitmaein.com/shop

https://www.artdeko.info/

https://aerodizain.com/

http://xn--d1abj0abs9d.in.ua/

http://lider82.ru/

http://sta-grand.ru/

http://snabs.kz/

https://sky-mine.ru/

https://rybalka-opt.ru/

http://snegozaderzhatel.ru/

https://xn--e1aaajzchnkg.ru.com/

http://hit-kino.ru/

http://www.regionshop.biz/

https://xn--80aaafbn2bc2ahdfrfkln6l.xn--p1ai/

https://pp-budpostach.com.ua/

https://vykup-avto-krasnodar.ru/

https://gcup.ru/

https://mega-polis.biz.ua/

http://vanrise.com.ua/

http://infra-e.ru/

https://veterinariya.com/

https://ponosanet.com/

https://cariestop.com/

https://proartrit.com/

https://elonm.ru/

https://nakozhe.com/

https://spinanebolit.com/

http://zameskino.ru/

http://kinoprinc.ru/

http://pospektr.ru/

http://buypillsonline24h.com/

http://komputers-best.ru/

https://komp-pomosch.ru/