Correspondent, Boston
Jim's Feed
Dec 4, 2014

Sony malware may be linked to other damaging attacks: researchers

BOSTON (Reuters) – Cybersecurity researchers have uncovered what they say is technical evidence linking the massive breach at Sony Corp’s Hollywood studio with attacks in South Korea and the Middle East.

Moscow-based security software maker Kaspersky Lab said on Thursday it uncovered evidence that all three campaigns might have been launched by the same group, or facilitated by a single organization skilled in working with destructive malware.

Dec 4, 2014

Exclusive: Intel Security CTO Michael Fey joins Blue Coat as COO

By Jim Finkle and Supantha Mukherjee

(Reuters) – Michael Fey has left Intel Security Group to become chief operating officer at Blue Coat Systems Inc, a privately owned network security company.

Fey was one of the few top McAfee managers to stay with the company after it was bought by Intel Corp in 2011. McAfee is now part of Intel Security Group, where Fey had been chief technology officer.

Dec 4, 2014

Intel Security CTO Michael Fey joins Blue Coat as COO

Dec 4 (Reuters) – Michael Fey has left Intel Security Group
to become chief operating officer at Blue Coat Systems Inc, a
privately owned network security company.

Fey was one of the few top McAfee managers to stay with the
company after it was bought by Intel Corp in 2011.
McAfee is now part of Intel Security Group, where Fey had been
chief technology officer.

Dec 4, 2014

North Korea surfaces in Sony investigators’ probe into hack

Dec 3 (Reuters) – Cyber investigators looking for the
culprits of a devastating hack into Sony Pictures Entertainment
have found some links to North Korea – hacking tools similar to
those used by that country in previous attacks on South Korea.

A person familiar with the company’s investigation said on
Wednesday that investigators hired by the company made the
connection as they reviewed evidence left by the hackers. The
person was not authorized to publicly discuss the Sony probe and
requested anonymity.

Dec 3, 2014

Sony investigators find links to North Korea in hack probe

By Jim Finkle

(Reuters) – Hackers used tools in a devastating cyber attack on Sony Pictures Entertainment that were based on ones used in similar attacks conducted against South Korea by North Korea, a person familiar with the company’s investigation said on Wednesday.

The person, who was not authorized to publicly discuss Sony’s probe into the attack which is being led by FireEye’s Mandiant forensics unit, said that investigators made the connection to North Korea as they reviewed evidence left by the hackers.

Dec 2, 2014
Dec 2, 2014

North Korea, other nations among suspects in Sony hack: U.S. source

WASHINGTON/BOSTON (Reuters) – U.S. investigators are considering multiple suspects, including North Korea, in their investigation into a cyber attack on Sony Pictures Entertainment that knocked out the company’s computer systems for over a week, according to a U.S. national security official with knowledge of the investigation.

The official, who asked to remain anonymous, told Reuters on Tuesday that the forensic investigation is in its early stages, and that no clear suspects have emerged.

Dec 2, 2014

Iran hackers targeted airlines, energy firms -report

BOSTON, Dec 2 (Reuters) – Iranian hackers have infiltrated
some of the world’s top energy, transport and infrastructure
companies over the past two years in a campaign that could allow
them to eventually cause physical damage, according to U.S.
cyber security firm Cylance.

Aerospace firms, airports and airlines, universities, energy
firms, hospitals, and telecommunications operators based in the
United States, Israel, China, Saudi Arabia, India, Germany,
France, England have been hit by the campaign, the research firm
said, without naming individual companies.

Dec 2, 2014

Iran hackers target airlines, energy, defense companies: researchers

BOSTON (Reuters) – Iranian hackers have infiltrated major airlines, energy companies, and defense firms around the globe over the past two years in a campaign that could eventually cause physical damage, according to U.S. cyber security firm Cylance.

The report comes as governments scramble to better understand the extent of Iran’s cyber capabilities, which researchers say have grown rapidly as Tehran seeks to retaliate for Western cyber attacks on its nuclear program.

Dec 2, 2014
    • About Jim

      "Jim works in the Reuters Boston bureau covering cyber security, hacking and technology privacy issues. He’s been with Reuters since 2005. He previously covered technology, media and biotechnology for Broadcasting & Cable, the Orange County Register and Bloomberg News out Tokyo, Taipei, San Francisco, Los Angeles and Santa Ana, California."
      Joined Reuters:
      2005
      Languages:
      English, Mandarin
    • More from Jim

    • Contact Jim

    • Follow Jim