The Invisible Threat: M&A Hackers

Noto, Anthony
September 2011
High Yield Report;9/12/2011, p9
The article discusses incidents when hackers attack the network of companies undergoing merger or acquisition (M&A). Information about the latest reported cyber attack on the server of HBGary is described. The integration process during M&A creates soft spots in the network which hackers can easily penetrate. Many of the M&A cyber attacks are found to be from China. Concerns on the impact of the breach to M&A negotiations are also discussed.


Related Articles

  • The Invisible Threat. NOTO, ANTHONY // Mergers & Acquisitions: The Dealermaker's Journal;Sep2011, Vol. 46 Issue 9, p14 

    The article reports on the prevalence of security breach cases in companies engaged in mergers & acquistions (M&A). It notes that M&A attracts cyber criminals and can expose companies to cyber-security risks as information moves freely both before and after the dealmaking which create soft spots...

  • Inside China's booming hacker industry.  // Asian Pacific Post;2/18/2010, p14 

    The article reports on the growing hacker industry in China using Trojan horse programs and other malicious software.

  • My password is not password. Jencius, Marty // Counseling Today;May2013, Vol. 55 Issue 11, p26 

    A personal narrative is presented which explores the author's experience of being hacked.

  • 'Growth hackers' don't need marketing theories, just lots and lots of testing. DAVIES, RUSSELL // Campaign;10/25/2013, p23 

    The author offers his views on growth hacking and its capacity to change.

  • Hack Your City.  // Spinoff;2013, p159 

    The article reports on the National Day of Civic Hacking that took place in more than 80 cities around the U.S. in the summer of 2013.

  • Hackers Harassed. Quittner, Jeremy // American Banker;2/2/2011, Vol. 176 Issue 18, p5 

    Brief information is given about a hacking into Goatse Security, a group of computer hackers who allegedly had previously broken into the security of AT&T Inc.'s iPad services.

  • The Sony Hack Represents a New Form of Warfare. Schnurer, Eric // U.S. News Digital Weekly;12/19/2014, Vol. 6 Issue 51, p18 

    The author reflects on the act of a group of hackers believed to be under the command of North Korea who stole files and leaked private and proprietary information belonging to Sony Pictures Entertainment due to the company's comedy film "The Interview."

  • Expansive Attack Hacks 2,500 Businesses, Agencies.  // AirGuide Online.com;2/22/2010, p1 

    The article reports on the expansive attack hat hacks 2,500 computer systems by the hackers in Europe and China.

  • Attacked.Gov. Quittner, Jeremy // American Banker;6/15/2011, Vol. 176 Issue 92, p5 

    The article reports on cyberattacks on the International Monetary Fund, which the computer hacker group Lulz Security claimed responsibility for, and U.S. Senate and notes the security breach was made possible by a spear-phishing attack.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics