Blog Posts Tagged with "China"

306708aaf995cf6a77d3083885b60907

FireEye Reveals APT30: A Decade-Long Cyber Espionage Campaign Targeting South East Asia

April 12, 2015 Added by:Mike Lennon

FireEye on Sunday uncovered details of a decade-long cyber espionage campaign carried out by China targeting governments, journalists and businesses in South East Asia and India.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

CrowdStrike Releases Global Threat Report: Tracked More Than 50 Threat Actor Groups in 2013

January 21, 2014 Added by:InfosecIsland News

CrowdStrike's Intelligence Team tracked more than 50 different threat actor groups believed to be behind the majority of sophisticated threats against enterprises in 2013.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

U.S. Court to Decide Whether National Security Trumps Foreign Investment and Due Process

July 10, 2013 Added by:InfosecIsland News

There is an uneasy tension with respect to Chinese investment in the U.S., given serious concerns about espionage, theft of intellectual property and cyber-security.

Comments  (0)

Da3ca2c61c4790bcbd81ebf28318d10a

The Emperor Is Naked!

May 09, 2013 Added by:Krypt3ia

Last week a report came out on Wired about how the ACE (Army Corps of Engineers) database was hacked by China and "sensitive" dam data was taken.. By China, let that sink in for a bit as there was no real attribution data in the story

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Pentagon Ups Cyber Espionage Accusations Against China

May 07, 2013 Added by:InfosecIsland News

A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber spying is focused on the US government, as well as American corporations.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

From Cyber Quarrelling to Cyber Diplomacy

March 15, 2013 Added by:Jarno Limnéll

Cyber quarrelling ‒ lately practiced by the US and China ‒ makes the need for increased openness and international cooperation in the domain clearly evident...

Comments  (1)

Da3ca2c61c4790bcbd81ebf28318d10a

APT1: The Good, The Bad, and The Ugly

February 21, 2013 Added by:Krypt3ia

I believe that Mandiant published the APT1 report primarily as a means of advertising and not much else. There is talk of the release being given the tacit nod by the government to push through the idea that there is a problem and that China is robbing us blind.

Comments  (3)

306708aaf995cf6a77d3083885b60907

China's PLA Behind Massive Cyber Espionage Operation

February 19, 2013 Added by:Mike Lennon

In a fascinating, unprecedented, and statistics-packed report, security firm Mandiant made direct allegations and exposed a multi-year, massive cyber espionage campaign that they say with confidence is the work of China.

Comments  (0)

Default-avatar

New York Times Attacks Show Need For New Security Defenses

February 01, 2013 Added by:Infosec Island

The recent attacks against the New York Times allegedly carried out by the Chinese military highlight the importance of layered security to protect sensitive systems and data.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Android Phones in China Hit by Most Costly Malware in History

February 01, 2013 Added by:Dan Dieterle

China may be the source for a lot of international cyber attacks and malware, but they get hit by it too. 620,000 Android phones in China were infected with a nasty virus that collects personal information and begins to send costly text messages to benefit the malware maker...

Comments  (0)

Default-avatar

New York Times Says It Was Infiltrated By Chinese Hackers

January 31, 2013 Added by:Infosec Island

The New York Times said it had fallen victim to hackers possibly connected to China's military, linking the sophisticated attacks to its expose of the vast wealth amassed by Premier Wen Jiabao's family.

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Beacon Events Compliance Conference in Beijing – I Wish I Could Be There

November 27, 2012 Added by:Thomas Fox

If you have not had the opportunity to attend a compliance-related conference tailored to the challenges of working in the Far East this would be the one for you. Even if you have attended such an event, this conference focuses on China and will give you insight into how to do business...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

US Responses to Cyberattacks – Circus du Jour

October 31, 2012 Added by:Joel Harding

Who is in charge? Don’t answer that, you don’t want to know. Who is in charge of our national response to anything? It depends? What do you mean? Do you mean to say that there is no one person or office, no agency or even a department with the mission of coordinating a national response?

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

National Security and Chinese Telecommunications Companies

October 14, 2012 Added by:Stefano Mele

Unfair trade practices of the Chinese telecommunications sector should be investigated by committees of jurisdiction in U.S. Congress and enforcement agencies in the Executive Branch. Particular attention should be paid to China’s continued financial support of key companies...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Chinese Hack Energy Company, Attack Pentagon, Try to Steal Stealth Bomber Skin

October 03, 2012 Added by:Dan Dieterle

China is well know for trying to steal military and scientific research, in an attempt to catch up on technology. How successful have they been? Just check out this cockpit comparison between China’s new Chengdu J-20 Stealth Fighter and the US F-22 Raptor...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Chinese cyber attack against the White House

October 02, 2012 Added by:Pierluigi Paganini

The news is circulating on the internet creating great concern once again that Chinese hackers have hit the infrastructure of a foreign state, and once again we are speaking of cyber espionage, but this time they were able to access the White House Military Office...

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked