Tech's hottest IPOs of the year, including Beyond Meat and Zoom, dropped on Monday, falling more than the broader market.Technologyread more
"We do not seek conflict with Iran or any other country," Trump tells reporters in the Oval Office.Politicsread more
Stocks in Asia were tepid in Tuesday morning trade, while investors looked toward to a meeting between U.S. President Donald Trump and Chinese President Xi Jinping set to...Asia Marketsread more
Chinese Vice Premier Liu He held a phone conversation with U.S. Trade Representative Robert Lighthizer and U.S. Treasury Secretary Steven Mnuchin, China's Ministry of Commerce...World Economyread more
Sen. Bernie Sanders announced a plan Monday to forgive the country's $1.6 trillion outstanding student loan tab, intensifying the higher education policy debate in the 2020...Personal Financeread more
While earnings usually come in substantially ahead of expectations — as much as 4 or 5 percentage points is not unusual — the downward direction in the outlook doesn't speak...Earningsread more
U.S. President Donald Trump's senior adviser Kellyanne Conway will not testify before the House of Representatives Oversight Committee this week on her alleged violations of...Politicsread more
"We missed being the dominant mobile operating system by a very tiny amount. We were distracted during our antitrust trial. We didn't assign the best people to do the work,"...Technologyread more
PatientsLikeMe was bought by UnitedHealth following a review by Trump's Treasury Department, which scrutinized the start-up because it's backed by Chinese cash.Technologyread more
Some traders think the energy rally is about to wane, despite the sector being one of June's big winners.ETF Edgeread more
Stocks with this one feature are poised to crush the market after a rate cut, according to Goldman Sachs.Marketsread more
A sophisticated hacking campaign launched from computers in China burrowed deeply into satellite operators, defense contractors and telecommunications companies in the United States and southeast Asia, security researchers at Symantec Corp said on Tuesday.
Symantec said the effort appeared to be driven by national espionage goals, such as the interception of military and civilian communications.
Such interception capabilities are rare but not unheard of, and the researchers could not say what communications, if any, were taken. More disturbingly in this case, the hackers infected computers that controlled the satellites, so that they could have changed the positions of the orbiting devices and disrupted data traffic, Symantec said.
"Disruption to satellites could leave civilian as well as military installations subject to huge (real world) disruptions," said Vikram Thakur, technical director at Symantec. "We are extremely dependent on their functionality."
Satellites are critical to phone and some internet links as well as mapping and positioning data.
Symantec, based in Mountain View, California, described its findings to Reuters exclusively ahead of a planned public release. It said the hackers had been removed from infected systems.
Symantec said it has already shared technical information about the hack with the U.S. Federal Bureau of Investigation and Department of Homeland Security, along with public defense agencies in Asia and other security companies. The FBI did not respond to a request for comment.
Thakur said Symantec detected the misuse of common software tools at client sites in January, leading to the campaign's discovery at unnamed targets. He attributed the effort to a group that Symantec calls Thrip, which may be called different names by other companies.
Thrip was active from 2013 on and then vanished from the radar for about a year until the last campaign started a year ago. In that period, it developed new tools and began using more widely available administrative and criminal programs, Thakur said.
Other security analysts have also recently tied sophisticated attacks to Chinese groups that had been out of sight for awhile, and there could be overlap. FireEye in March said that a group it called Temp.Periscope reappeared last summer and went after defense companies and shippers. FireEye had no immediate comment on the new episode.
It was unclear how Thrip gained entry to the latest systems.
In the past, it depended on trick emails that had infected attachments or led recipients to malicious links. This time, it did not infect most user computers, instead moving among
servers, making detection harder.
Following its customary stance, Symantec did not directly blame the Chinese government for the hack. It said the hackers launched their campaign from three computers on the mainland. In
theory, those machines could have been compromised by someone elsewhere.
Symantec provides the most widely used paid security software for consumers and an array of higher-end software and services for companies and public agencies.