Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Dustin Volz In Washington"


5 mentions found


This copy is for your personal, non-commercial use only. Distribution and use of this material are governed by our Subscriber Agreement and by copyright law. For non-personal use or to order multiple copies, please contact Dow Jones Reprints at 1-800-843-0008 or visit www.djreprints.com. https://www.wsj.com/articles/microsoft-to-offer-some-cybersecurity-tools-free-after-suspected-china-hack-6db94221
Persons: Dow Jones Organizations: microsoft
Dustin VolzDustin Volz is a Washington-based cybersecurity and intelligence reporter for The Wall Street Journal. Before joining the Journal in 2018, Dustin worked at Reuters and National Journal. In addition to Washington, Dustin has reported from London, Berlin and the Dominican Republic. He is a graduate of Arizona State University's Walter Cronkite School of Journalism and Mass Communication. Prior to starting his journalism career, Dustin spent a year living in Indonesia as a Fulbright teaching assistant.
Persons: Dustin Volz Dustin Volz, Dustin, Gerald Loeb, Robert F, Arizona State University's Walter Organizations: Wall Street, Reuters, National Journal, White, Correspondents ' Association, Society of Publishers, Kennedy Center for Justice, Human, Arizona State, Arizona State University's Walter Cronkite School of Journalism, Communication Locations: Washington, Asia, London, Berlin, Dominican Republic, Indonesia
Robert McMillanRobert McMillan writes about computer security, hackers and privacy from The Wall Street Journal’s San Francisco bureau. Previously, he was a writer at Wired, the IDG News Service and Linux Magazine, where he covered cloud computing, business technology, bitcoin, artificial intelligence and open-source software. He was the host of Hack Me if You Can, a three-part podcast profile of the Russian hacker Dmitry Smilyanets, produced by the Journal.
Persons: Robert McMillan Robert McMillan, Dmitry Smilyanets Organizations: San, Wired, IDG News Service, Linux Magazine, Journal Locations: San Francisco
China has routinely denied hacking into businesses or governments in other countries. State-sponsored hackers from China have developed techniques that evade common cybersecurity tools and enable them to burrow into government and business networks and spy on victims for years without detection, researchers with Alphabet Inc.’s Google found. Over the past year, analysts at Google’s Mandiant division have discovered hacks of systems that aren’t typically the targets of cyber espionage. Instead of infiltrating systems behind the corporate firewall, they are compromising devices on the edge of the network—sometimes firewalls themselves—and targeting software built by companies such as VMware Inc. or Citrix Systems Inc. These products run on computers that don’t typically include antivirus or endpoint detection software.
Russia has targeted organizations in at least 17 European nations this year, Microsoft says. Russian government hackers have increased their cyber-espionage attacks against Ukraine and its allies in recent months while deploying novel strains of malicious software, according to research from Microsoft Corp. and other security companies. The findings reflect a renewed commitment by Moscow to conduct cyberattacks and suggest it may be preparing to launch more aggressive and potentially destructive ones to coincide with Russia’s expected spring offensive in eastern Ukraine. The shift follows a relative lull in cyber activity after an initial onslaught when the war began, Western officials and experts said.
Total: 5