Blog Posts Tagged with "China"

94ae16c30d35ee7345f3235dfb11113c

Rep. Frank Wolf: What’s with You and Huawei?

March 28, 2012 Added by:Joel Harding

What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Huawei Symantec: Fear of Chinese Espionage Ends Venture

March 27, 2012 Added by:Pierluigi Paganini

While I understand the defensive approach, I believe that such behavior could have serious repercussions on the global market. In terms of security, little will change by breaking strategic alliances. Cyber attacks will continue and will increase in frequency and efficiency...

Comments  (0)

296634767383f056e82787fcb3b94864

The Real Reason Symantec Sold its Interest in Huawei Symantec

March 27, 2012 Added by:Jeffrey Carr

While the joint venture may be over, remember a lot of Huawei equipment has already been sold to the U.S. government including DOD and NASA through channel partners like MPAK and Dell Force 10 Networks. To make matters worse, no one is testing for backdoors in firmware updates...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

China Also the Target of Cyber Attacks

March 21, 2012 Added by:Pierluigi Paganini

The Chinese government has been accused of pursuing an aggressive cyber strategy against foreign companies. Of course, China is also the target of cyber attacks, and many experts are convinced that despite their aggressive cyber offense, Chinese cyber defense is not so efficient...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Yet Another Chinese-Based Targeted Malware Attack

March 14, 2012 Added by:Headlines

"The payload is also an advanced persistent threat - extremely difficult to detect once inside the network. Although it’s more than a week old, the backdoor still has poor detection, with only 7 of 42 antivirus solutions able to detect it..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Use of Social Networks for Cyber Espionage

March 13, 2012 Added by:Pierluigi Paganini

There has been an upsurge in cyber espionage by governments in search of information relating to military and industrial technologies. Of strategic importance for these activities are social networks through which one can trace a target's relationships, habits, and location...

Comments  (1)

296634767383f056e82787fcb3b94864

USCC Report on China Misses the Boat on Cyber Espionage

March 13, 2012 Added by:Jeffrey Carr

The report did a good job exploring part of the Supply Chain problem with with chip development. It didn't cover the more common problem of U.S. companies who out-source development work to Chinese firms or companies like Dell who do their manufacturing and R&D in China...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

You’ve Been Phished Without an Email or a PDF

March 12, 2012 Added by:Infosec Island Admin

It seems that someone is making a full sized driftnet for information on those who would like to sign up as well as discuss the INSCOM Cyber Brigade. On the surface like I said, this looks all well and good, but once you start to poke at it though, you get some strange answers...

Comments  (16)

E11e506024f5d2b70f037b9af4734f33

Chinese Network Operations and Cyber Espionage Capabilities

March 09, 2012 Added by:Stefano Mele

Developments in Chinese network operations applications and research and development point to a nation fully engaged in leveraging all available resources to create a technically advanced ability to operate in cyberspace as a means of meeting military and civilian goals...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

New Opportunities for Cyber Espionage and Cyber Crime

March 08, 2012 Added by:Pierluigi Paganini

Computer fraud, phishing, and malware development designed to steal sensitive information from users, the use of advanced persistent threats, ramsonware, and cyber espionage are all activities united by the intent to profit from the improper use of technology...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Northrop Report Examines Chinese Information Warfare Strategies

March 08, 2012 Added by:Headlines

"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

North Korea’s Cyber War Forces

March 06, 2012 Added by:Dan Dieterle

North Korean Students that show aptitude are selected from elementary schools and are groomed in cyber warfare throughout their college years. They constantly hone their skills and even attend foreign colleges to learn the latest security techniques...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Threats: The Butler in China Did It

March 05, 2012 Added by:J. Oquendo

Aside from the attack coming from a Philips Electronics' Chinese-based IP block, I am positive that whoever was behind the attack was not an employee. Someone probably compromised a machine at Philips and was using it to attack the PBX I managed. Nothing more, and nothing less...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Cyber Arms Race: Casting Shadows on the Future

March 01, 2012 Added by:Pierluigi Paganini

We are confronted with a new arms race for cyber weapons, and as governments around the world compete for innovation, a cultural revolution is occurring in nations which have been considered minor, and which are now nearly on par superpowers like the U.S. and China...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous Now Interested in the Great Firewall of China

February 17, 2012 Added by:Pierluigi Paganini

Why have they not targeted China before? Hypothetically, the structure of Anonymous could have been infiltrated and directed against the Chinese as part of a strategy defined by the West, or perhaps someone is using the name Anonymous to conduct undercover operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intelligence Committee Continues Probe into Chinese Telecoms

February 17, 2012 Added by:Headlines

Chairman Rogers initiated the probe last fall after a preliminary inquiry into Chinese espionage operations determined the need for further investigation into threats aimed at the U.S. technology supply chain, critical infrastructure, and proprietary information...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »