Back to home
Technology

Intel's former staffer accused of stealing 18,000 'Top Secret' files, worked there for 10 years

Source

TweakTown

Published

TL;DR

AI Generated

An ex-Intel employee is accused of stealing 18,000 "Top Secret" files after working at the company for a decade. The former staffer allegedly took the files to use in a new job at a rival company. Intel claims that the stolen files contain sensitive information and are crucial to the company's competitiveness. The accused individual faces charges of theft of trade secrets and could potentially face severe legal consequences.

Read Full Article

Similar Articles

UK spy agency releases malware-blocking gadget for HDMI and DisplayPort cables — SilentGlass blocks malicious traffic traveling between display and computer

UK spy agency releases malware-blocking gadget for HDMI and DisplayPort cables — SilentGlass blocks malicious traffic traveling between display and computer

The UK's GCHQ has introduced SilentGlass, a device that blocks malicious traffic between a display and a PC, aimed at protecting government estates in high-threat environments. The design has been licensed to Goldilock Labs, a cybersecurity firm, for global availability. While some experts question the necessity of SilentGlass for common cyberattacks, vulnerabilities in HDMI and DisplayPort could be exploited by advanced adversaries targeting sensitive information. The gadget is now available for purchase, primarily beneficial for users dealing with state secrets and confidential data.

Tom's Hardware
10 petabytes of sensitive data stolen from China's National Supercomputing Center, hackers claim — daring heist would be largest ever China hack, covering 6,000 clients across science, defense, and beyond

10 petabytes of sensitive data stolen from China's National Supercomputing Center, hackers claim — daring heist would be largest ever China hack, covering 6,000 clients across science, defense, and beyond

A hacker group named FlamingChina claims to have stolen over 10 petabytes of sensitive data from China's National Supercomputing Center, affecting 6,000 clients in science, defense, and other sectors. The breach, if confirmed, would be the largest known hack in China, exposing research from entities like AVIC and COMAC. The stolen data includes classified files on weapons systems and simulation results, with access being sold for cryptocurrency. The attack, allegedly executed through a compromised VPN domain and botnet, highlights cybersecurity vulnerabilities in China's critical infrastructure and raises concerns about the potential misuse of the stolen technologies by foreign entities.

Tom's Hardware
Thousands of consumer routers hacked by Russia's military

Thousands of consumer routers hacked by Russia's military

Russia's military has hacked thousands of consumer routers, primarily from MikroTik and TP-Link, in a widespread operation spanning 120 countries. The compromised routers were used by APT28, a threat group linked to Russia's GRU military intelligence agency, to harvest passwords and credential tokens for espionage campaigns. APT28, also known as Pawn Storm, Sofacy Group, and others, has a history of high-profile hacks targeting governments globally. The attackers exploited unpatched security vulnerabilities in older router models to change DNS settings and intercept connections to specific domains, including Microsoft's 365 service. The group's use of sophisticated techniques and willingness to revisit classic attack methods poses an ongoing risk to organizations worldwide.

Ars Technica
China intensifies efforts to poach semiconductor talent from Taiwan, claims report — international restrictions motivate illicit efforts to obtain talent and equipment

China intensifies efforts to poach semiconductor talent from Taiwan, claims report — international restrictions motivate illicit efforts to obtain talent and equipment

China is increasing efforts to attract semiconductor talent from Taiwan due to international restrictions on technology transfer. Taiwan's National Security Bureau reports that China is targeting Taiwan's semiconductor industry to access advanced chip manufacturing technology and skilled workers. China is using indirect methods like front companies and recruitment schemes to poach engineers and obtain sensitive know-how. Taiwan is strengthening legal barriers to prevent technology transfer and espionage activities. The report also highlights intense cyber activity against Taiwan's sensitive assets and rising military pressure around the island.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.