The U.S. will likely emerge the winner in a "cold currency war" that is heating up, an expert said.Currenciesread more
These box office numbers do not include the cost of production or marketing costs. They also don't count the billions in merchandising that Disney has made over the last...Entertainmentread more
Tariffs are the only instrument left for addressing China's systematic and excessive surpluses on its U.S. trades, writes Michael Ivanovitch.US Economyread more
In its latest attempt to build market credibility, China on Monday launched the Science and Technology Innovation Board, or "STAR Market," on which 25 companies were listed.China Economyread more
When Cathy Hsu and Tony Hsieh wanted to build an English language app for Chinese children, they decided to follow Facebook and Google's lead.Start-upsread more
Stocks in Asia traded lower on Monday afternoon, as a Nasdaq-style technology board on the Shanghai Stock Exchange marked its debut.Asia Marketsread more
Instagram began tests that hide "like" counts on posts. That means influencers who market products on Instagram will have to rely on different metrics to show success.Technologyread more
Peter Neupert worked for Microsoft and Amazon-backed Drugstore.com, where he got to know Jeff Bezos. He now advises start-ups.Technologyread more
The firing of the tear gas was the latest confrontation between police and protesters who have taken to the streets for over a month to fight a proposed extradition bill and...China Politicsread more
Last week shows that oil prices are not the indicator for Middle East tensions they once were, and worries about global demand and growing U.S. production has changed that...Market Insiderread more
Facebook Vice President David Marcus is the face of the company's Libra digital currency, but the original driving force was a 26-year-old female corporate-development...Technologyread more
Hackers stole Syrian opposition fighters' strategic battle plans by using "attractive" female Skype avatars to target victims, according to a new report.
The attacks, which happened between November 2013 and January 2014, resulted in a slew of strategic information being stolen, according to cybersecurity company FireEye. These included detailed military plans which outlined attack strategies, the political structure of the opposition and even identification cards of refugees who had escaped to Turkey.
The attacks began with a Skype user with a female persona striking up a conversation with a male opposition fighter. The hacker would ask the victim what device they were using so they would be able to send the appropriate malware.
After some conversation, the female avatar would send a "personal" photograph which was malicious. When the victim opened the file, they would unknowingly install malware, giving the hacker access to their device.
This led to the theft of 7.7 gigabytes of data being stolen, 31,107 Skype conversations, 12,356 contacts and nearly a quarter of a million messages, according to the report, called "Behind the Syrian Conflict's Digital Front Lines."
"We are really seeing the convergence of traditional methods of espionage and internet communication tools," Richard Turner, EMEA vice president of FireEye, told CNBC by phone.
"The evidence of that is the use of the attractive lady avatar to generate interest and open up individuals to deliver malware and compromise their communication."
Syria's civil war has been ongoing since 2011, following pro-democracy protests which were violently crushed by President Bashar al-Assad's forces.
As a result of the fighting, hundreds of thousands of residents have fled Syria to claim refuge in neighbouring countries.
FireEye's report said that the intelligence stolen by hackers likely served a "critical role" in the opposition's operational plans and tactical decisions, but added that "this tactical edge comes with a potentially devastating human cost."
Interestingly, each female Skype avatar used by the hackers also had a corresponding Facebook account, which was populated with pro-opposition content, although many of the links were malicious.
A fake opposition website was also in operation, and included pictures of several women with links to social media accounts and "Live Cam ID." Both links were malicious and allowed hackers to collect data from their victims.
FireEye said it was the first time it had seen a group targeting the Syrian opposition using Android malware – malicious software targeting Google's mobile operating system. The report highlighted the growing threat to mobile devices which security experts have warned will be a key battleground for hackers in 2015.
But as with most major attacks, identifying the hackers was impossible.
The report said that the attackers were likely to be based outside of Syria, and that investigation into their server location pointed towards Lebanon.
Turner said the group was "sophisticated" and had "unique technology" when deploying malware. He added that the infrastructure used to carry out these attacks was no longer in place, but could not say for sure whether the group had disbanded.
"Whether they are still active and have moved to another platform to disguise themselves and remain ahead of other militaries or law enforcement, who knows?" he added.