Source: National Cyber Security – Produced By Gregory Evans South Korean firms are under fire for not being careful about computer hackers and losing some data to the foreign companies. Lee Jung-hoon, one of the top “white” hackers in South Korea, was allegedly leaving the Samsung SDS on November The…
N. Korea Suspected of Hacking Emails of S. Korean Officials
Source: National Cyber Security – Produced By Gregory Evans Anchor: In another hacking attack suspected to have been carried out by North Korea, the e-mail access information of over 50 officials and others who closely work with the government have been stolen. Hackers, this time, used two dozen phishing Web…
Gov’t to Strengthen Response Against N. Korean Cyberattacks
Source: National Cyber Security – Produced By Gregory Evans The Ministry of Science, ICT and Future Planning says the government is strengthening its posture to respond to hacking attempts amid growing risks of cyberattacks by North Korea. The ministry said Friday that the number of cyberattacks launched by the North…
6,000 strong North Korean hacker army collects $866 million per year
Source: National Cyber Security – Produced By Gregory Evans Experts in South Korea estimate that North Korea’s hacker army numbers more than 6,000 people and earns $866 million US per year through online gambling websites and cyber espionage. Officials at a South Korean information security conference yesterday warned that North…
Transport and energy groups targeted by North Korean hackers
Source: National Cyber Security – Produced By Gregory Evans Transport firm Hanjin Group and energy giant SK were among the 140,000 computers at 160 South Korean firms hacked by North Korea, police in Seoul revealed yesterday. North Korean hackers have stolen around 42,000 documents from South Korean firms in a…
North Korean hackers stole US fighter jet blueprints
Source: National Cyber Security – Produced By Gregory Evans As part of a years-long cyber attack, North Korean hackers have allegedly stolen 42,000 materials from South Korean organizations and government agencies, including blueprints for F-15 fighter jet wings. The hacking began in 2014 and was first detected in February, according…
Why German Unification Is Not a Model for Korean Unification
Source: National Cyber Security – Produced By Gregory Evans For decades, many Koreans have viewed German unification as a model for the future of a divided Korean peninsula. However, there are differences between the two that need to be understood, both to inform current policy and provide valuable lessons for…
New Possible Indication of North Korean Nuclear Test Preparations
Source: National Cyber Security – Produced By Gregory Evans A 38 North exclusive with analysis by Joseph S. Bermudez Jr. Commercial satellite imagery of North Korea’s Punggye-ri Nuclear Test Site from May 5 suggests that Pyongyang may be preparing for a nuclear test in the near future. While the test…
Speak Loudly and Carry a Small Stick: The North Korean Cyber Menace
Source: National Cyber Security – Produced By Gregory Evans We often see reports of troubling and sophisticated North Korean capabilities to wage cyber warfare. Although cyber exploits, usually against South Korean targets, are routinely attributed to the North, there is much suspicion and concern, but little hard evidence. Estimates of…
The Future of the North Korean Regime: A Conversation with James Church and Jennifer Lind
Source: National Cyber Security – Produced By Gregory Evans 38 North recently talked with author James Church, and Jennifer Lind (Assistant Professor of Government, Dartmouth College) about the future of North Korea. 38 North: In the 1990s there was a flurry of speculation that North Korea would collapse. We saw…