Americans now say they approve of free trade by 64%-27%, a margin of better than two to one. That's up from 57%-37% early in Trump's presidency, and 51%-41% near the end of...Politicsread more
Kudlow pointed to strong retail sales and low unemployment as signs that the U.S. economy remained strong.Marketsread more
The yield on the benchmark 10-year Treasury note briefly fell below the 2-year rate on Wednesday, a phenomenon in the bond market known as yield curve inversion, which is...Marketsread more
The MacBook Pro recall and its subsequent ban from flights underscores the increasing brand risk from problems with lithium-ion batteries.Technologyread more
Experts say the timing of Amazon executives' contributions to Rep. David Cicilline likely reflect the company's heightened urgency over growing regulatory scrutiny.Technologyread more
Despite aggressive strides, Waymo needs one thing before their self-driving cars become a seriously useful transportation system: people. We talked to the ones closest to it.Technologyread more
CNBC combed through Wall Street research to see which stocks are still a buy after their earnings reports.Marketsread more
Coinbase security chief Philip Martin explains, "Possession of a key is possession of your currency. What that means is that you can't revoke a cryptocurrency key, if that key...Technologyread more
Fraud investigator Harry Markopolos' accusations extended beyond GE's management to actuaries, auditors and analysts who he claims overlooked billions in liabilities.Marketsread more
The Supreme Court could strike down the constitutionality of the Consumer Financial Protection Bureau, an agency Elizabeth Warren has likened to her child and which Justice...2020 Electionsread more
Bianco Research's James Bianco suggests Wall Street is desperately looking for a signal that a 50 basis point cut is coming next month.Trading Nationread more
A small, sophisticated international hacking group was responsible for a widely publicized 2011 spying attack on members of Japan's parliament as well as dozens of previously undisclosed breaches at government agencies and strategic companies in Japan and South Korea, security researchers said.
Researchers at Kaspersky Lab believe they have found a squad of hackers for hire, who contract out to governments and possibly businesses, in contrast to recent reports on hacks said to be carried out by full-time government employees.
"What we have here is the emergence of small groups of cyber-mercenaries available to perform targeted attacks," said Kaspersky's global research director, Costin Raiu, in an interview with Reuters.
(Read more: The Apple iPhone fingerprint hackfest begins)
"We actually believe they have contracts, and they are interested in fulfilling whatever the contract requirements are," he said.
The espionage against members of the Japanese Diet had been blamed by that country's officials on Chinese hackers, according to local media, but few details had been provided. Kaspersky attributed the attack to the new group. He was unable to say if the Chinese government was behind or contributed to the attack.
Logs and other records show that the same group also took aim at some of the world's biggest shipbuilders, media companies and defense contractors including Selectron Industrial Co., although Kaspersky did not say which attacks had been successful.
Selectron, which supplies U.S.-designed components to defense and industrial customers in Korea, Japan and elsewhere, had no immediate comment.
Kaspersky said it was working with some of the companies and with law enforcement in multiple countries.
In a report released on Wednesday, Kaspersky said researchers had won access to many of the command computers used in the campaigns and that logs and other material showed a long list of intended victims.
They said that comments within the attack programs and the names of some internal files were in simplified Chinese, but that members of the group were also conversant in Japanese and Korean, suggesting a presence in all three countries.
Servers were discovered in China, Japan, Hong Kong, Taiwan, Korea and the United States.
Hacking teams often suck up enormous amounts of data with little discrimination over long periods, aiming to filter through the trove afterwards, according to reports suspected state-sponsored electronic espionage.
But this team acted with great precision, targeting specific documents or log-in credentials and then leaving the victimized network within weeks.
The report by Moscow-based Kaspersky follows a Sept. 17 research paper by SymantecCorp that blamed a separate, larger Chinese group for well-known attacks on Google Inc, EMC Corp's RSA division, and Adobe Systems Inc.
Kaspersky dubbed the new campaign IceFog, after the name of one of the control servers, and said attacks typically began with emails tailored to a specific person at a victim company.
Microsoft Word or other attachments, once opened, allowed direct access to the attackers, who then roamed the network looking for blueprints or other treasure. The multiple security holes that were used were previously known, but the systems had not been patched.
(Read more: )
There were a few dozen victims who used Windows, Raiu said. A Mac variant of the same malicious software was detected in thousands of infections, but was spread casually on a Chinese-language bulletin board, perhaps as a test. He said there was no evidence that any of the Mac victims had files copied and removed.
The hackers have changed their attack software in the past two years, leaving fewer clues to what was done, Kaspersky said.
The objectives of the customers appeared to vary. In one case, the detailed budget for a national army was sought, Kaspersky said, declining to name the army. In other cases, product blueprints were sought.
Raiu saw no evidence of tampering or destruction, only the removal of sensitive information.
-- by Reuters