Resource Library Economic Espionage

Links to web sites outside the U.S. Federal Government or the use of trade, firm, or corporation names within the Overseas Security Advisory Council web site are for the convenience of the user. Such use does not constitute an official endorsement or aapproval by the Overseas Security Advisory Council of any private sector web site, product, or service.
Data pager
Records Per Page:
PageSizeComboBox
select
 
Data pager
Records Per Page:
PageSizeComboBox
select


“Cyber Security’s Infamous Five of 2014” and accompanying infographic analyzes which malware gave cyber criminals the biggest bang for their buck by recycling code and methods…


Quick reference guide for security and privacy while traveling with smartphones: DOs and DON'Ts, recommended Android and iPhone settings, and other tips


Quick reference guide for security and privacy while using smartphones and images with social networking and media sites: DOs and DON'Ts, identifying information, prevention of…


Center for a New American Security (CNAS): Research Associate Amy Chang explores the political, economic, and military objectives of China’s cybersecurity apparatus; reveals…


Understanding and preventing both external and insider security breaches.


Joint Informational Bulletin (JIB-14-20185): In February 2014, a private cyber security firm G Data SecurityLabs published a red paper detailing the activity of the malware…


Operation SMN is a coordinated, private-industry effort led by Novetta and supported by a coalition of leading security companies. This is their report on "Axiom," a…


FBI Cyber Division FLASH Alert #A-000042-MW: The FBI obtained information regarding a group of Chinese Government affiliated cyber actors who routinely steal high value…


The following selections are taken from "Unrestricted Warfare," a book published in China in February 1999 which proposes tactics for developing countries, in particular China, to…


In this report, Kaspersky Lab’s cybersecurity experts give you an insight into: • How businesses can suffer from direct – and indirect – cyber-espionage attacks • What you can do…