Network officials also said voters should expect more of a Koch focus on grassroots activism throughout the 2020 election cycle.Politicsread more
In a room full of avowed capitalists, policies that sound to some like socialism are bound not to go over well.Delivering Alpharead more
GM's usage of temporary workers, potential closure of plants and health care contributions remain major sticking points, according to people familiar with the talks.Autosread more
Republicans and Democrats have long since separated themselves by ideology, leaving each more uniformly conservative or liberal than ever. And now a new data analysis by the...Politicsread more
A Missouri man died of vaping-related illness, officials announced Thursday.Health and Scienceread more
At least in terms of monetary policy, Pence says should be taking after other regions who keep their benchmark interest rates near zero.Delivering Alpharead more
AT&T isn't focused on selling or divesting DirecTV, despite pressure from stakeholder Elliott Management, sources tell CNBC.Technologyread more
Patrick Shyu, a former tech lead at Google, has posted a series of videos making fun of Facebook, where he worked as a software engineer until last month.Technologyread more
The measure to keep the government running through Nov. 21 now heads to the Senate, where McConnell has signaled he will back a temporary spending plan.Politicsread more
Amazon's purchase comes as part of its plan to convert its delivery fleet to 100% renewable energy by 2030. The e-commerce retailer already runs 40% of its fleet on renewable...Autosread more
As part of the plan, Amazon has agreed to purchase 100,000 electric delivery vans from vehicle manufacturer Rivian.Technologyread more
Hackers stole Syrian opposition fighters' strategic battle plans by using "attractive" female Skype avatars to target victims, according to a new report.
The attacks, which happened between November 2013 and January 2014, resulted in a slew of strategic information being stolen, according to cybersecurity company FireEye. These included detailed military plans which outlined attack strategies, the political structure of the opposition and even identification cards of refugees who had escaped to Turkey.
The attacks began with a Skype user with a female persona striking up a conversation with a male opposition fighter. The hacker would ask the victim what device they were using so they would be able to send the appropriate malware.
After some conversation, the female avatar would send a "personal" photograph which was malicious. When the victim opened the file, they would unknowingly install malware, giving the hacker access to their device.
This led to the theft of 7.7 gigabytes of data being stolen, 31,107 Skype conversations, 12,356 contacts and nearly a quarter of a million messages, according to the report, called "Behind the Syrian Conflict's Digital Front Lines."
"We are really seeing the convergence of traditional methods of espionage and internet communication tools," Richard Turner, EMEA vice president of FireEye, told CNBC by phone.
"The evidence of that is the use of the attractive lady avatar to generate interest and open up individuals to deliver malware and compromise their communication."
Syria's civil war has been ongoing since 2011, following pro-democracy protests which were violently crushed by President Bashar al-Assad's forces.
As a result of the fighting, hundreds of thousands of residents have fled Syria to claim refuge in neighbouring countries.
FireEye's report said that the intelligence stolen by hackers likely served a "critical role" in the opposition's operational plans and tactical decisions, but added that "this tactical edge comes with a potentially devastating human cost."
Interestingly, each female Skype avatar used by the hackers also had a corresponding Facebook account, which was populated with pro-opposition content, although many of the links were malicious.
A fake opposition website was also in operation, and included pictures of several women with links to social media accounts and "Live Cam ID." Both links were malicious and allowed hackers to collect data from their victims.
FireEye said it was the first time it had seen a group targeting the Syrian opposition using Android malware – malicious software targeting Google's mobile operating system. The report highlighted the growing threat to mobile devices which security experts have warned will be a key battleground for hackers in 2015.
But as with most major attacks, identifying the hackers was impossible.
The report said that the attackers were likely to be based outside of Syria, and that investigation into their server location pointed towards Lebanon.
Turner said the group was "sophisticated" and had "unique technology" when deploying malware. He added that the infrastructure used to carry out these attacks was no longer in place, but could not say for sure whether the group had disbanded.
"Whether they are still active and have moved to another platform to disguise themselves and remain ahead of other militaries or law enforcement, who knows?" he added.