• Saturday
  • October 25, 2014
  • Last updated: 9:56am
Hong Kong

Humidity 

UV 

Pollution 

Refine Your Search

Sort by

Search Results

Results 1 - 10 of 21 for cyber espionage

Search results

  1. Cyber thieves get clever

    Posted May 08th 2012, 12:00am

    ... Network safety has become the top priority for companies as cyber theft has increased markedly over the years. Despite firewalls, cyber criminals have penetrated well-protected websites. A recent study conducted by Websense Security Labs outlines the reasons. The 'Websense 2012 Threat Report' says the main threats are extremely effective social media lures, evasive ...

    http://www.scmp.com/article/1000358/cyber-thieves-get-clever
  2. Cyber-extortionists target HK businesses

    Posted Apr 10th 2011, 12:00am

    ... Nathan Griffiths Online attacks aimed at crippling websites unless cash is paid are on the rise and authorities can do little to stop them, leaving businesses to fend for themselves. Internet watchers say the attacks are becoming more complex, making the ...

    http://www.scmp.com/article/964616/cyber-extortionists-target-hk-businesses
  3. Cyber extortionists target businesses

    Posted Apr 10th 2011, 12:00am

    ... Nathan Griffiths Online attacks aimed at crippling websites unless cash is paid are on the rise and authorities can do little to stop them, leaving businesses to fend for themselves. Internet watchers say the attacks are becoming more complex, making the ...

    http://www.scmp.com/article/964689/cyber-extortionists-target-businesses
  4. SFC warns of more insidious cyber scams

    Posted Oct 21st 2004, 12:00am by Enoch Yiu

    ... Enoch Yiu The Securities and Futures Commission has warned investors to exercise caution- especially on the internet- saying it has received 100 complaints of fraud this year involving losses of $11 million. Four of the victims are Hong Kong investors, wh ...

    http://www.scmp.com/article/474975/sfc-warns-more-insidious-cyber-scams
  5. Invisible intruders

    Posted Nov 21st 2011, 12:00am

    ... between victim and attacker, and gives cyber criminals the advantage of anonymity. They cleverly lure you into compromising situations. Their methods vary, but by the time you're aware of an attack, it's often too late. Vigilance is one of the best ways to combat cyber attacks. Be aware of scams and other strategies. Knowing the different types of threat will make you a more ...

    http://www.scmp.com/article/985441/invisible-intruders
  6. City a phishing paradise, Web survey shows

    Posted Sep 19th 2007, 12:00am by Staff Reporter

    ... Joshua But HK No 2 in regional cyber fraud Hong Kong hosts the second largest number of fraudulent websites in the region, an internet security report reveals. Symantec's Internet ... 'The attacks that [crash] your computer are now very rare. Most of them want to steal the personal details.' The report said cyber-criminals were becoming more 'commercial'- tool ...

    http://www.scmp.com/article/608416/city-phishing-paradise-web-survey-shows
  7. HK, mainland firms exposed to hackers in Epsilon data breach

    Posted Apr 05th 2011, 12:00am

    ... to be used by criminal elements for phishing scams, spam e-mail and other cyber attacks. Epsilon spokeswoman Jessica Simon would not confirm whether the client databases of all of its corporate ... software supplier Sophos, said cyber attacks on e-mail marketing firms like Epsilon steal data 'to build upon the pre-existing relationship between these companies and their customers'. ...

    http://www.scmp.com/article/964205/hk-mainland-firms-exposed-hackers-epsilon-data-breach
  8. Silent attackers strike the Net

    Posted Apr 25th 2006, 12:00am by Simon Lewis

    ... Reports by Simon Lewis CYBER THREATS have evolved to silently steal data for profit without alerting even the most vigilant user, according to a semi-annual internet security threat report ... financial and confidential information. This information could then be used in cyber crime activities for financial gain,' the report said. Earlier internet threats such as worms and blended ...

    http://www.scmp.com/article/546125/silent-attackers-strike-net
  9. E-mail threats go beyond the obvious

    Posted Apr 12th 2005, 12:00am by Danyll Wills

    ... Reports by Danyll Wills Vulnerabilities include liability, upset customers, espionage and loss of a company's reputation SECURITY IN THE enterprise has normally been thought ... vulnerabilities include liability, the wasting of IT resources, denigration of employee productivity, potential espionage, loss of reputation, as well as inability to comply with new laws ...

    http://www.scmp.com/article/496208/e-mail-threats-go-beyond-obvious
  10. Death of botnet cuts daily dose of spam e-mail

    Posted Apr 03rd 2011, 12:00am

    ... force against cyber-threats. 'Spam is annoying and it can advertise potentially dangerous or illegal products. It is also significant as a symptom of greater threats to internet ...

    http://www.scmp.com/article/964075/death-botnet-cuts-daily-dose-spam-e-mail

Pages

Login

SCMP.com Account

or