Items Tagged with "China"


7fef78c47060974e0b8392e305f0daf0

Hard Power, Soft Power, and the Power of Digital Espionage

May 21, 2012 Added by:Infosec Island Admin

By combining the military, the economic, and the political aspects of soft and hard power, and the gray’s in between, China has become a force to be reckoned with. In order to better understand the mosaic, we need to re-tool some of the ideas we have preconceived for ourselves...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

US vs. China: Is the Cyber Warfare Gap Increasing?

May 21, 2012 Added by:Pierluigi Paganini

"We continue to see China expressing interest in making investments to improve their capacity for operations in cyberspace, and that is something that we pay very, very careful attention to. There is the potential for these types of operations to be very disruptive..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Developments Involving the People’s Republic of China

May 21, 2012 Added by:Headlines

"In 2011, computer networks and systems around the world continued to be targets of intrusions and data theft, many of which originated within China. Although some of the targeted systems were U.S. government-owned, others were commercial networks owned by private companies..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Attribution: Inductive vs. Deductive Reasoning

May 18, 2012 Added by:Infosec Island Admin

In the present day where cyberwar is all the rage, and governments as well as private sector entities are seeking to cash in on the power grab that is mostly information warfare - as the Chinese call it - too many are forgetting a core problem to the picture: Attribution...

Comments  (7)

2dc39ef06d1ad53bea80d28b84f3aa7e

Companies Hit in Targeted Attacks

May 18, 2012 Added by:Gregory Hale

If an attacker wants to target a system, they will get in no matter what, what kind of damage occurs depends on how many layers of security buttress the system. Companies in specific industries could band together and share information on attacks that target their industries...

Comments  (1)

296634767383f056e82787fcb3b94864

China's Intelligence Apparatus: Implications for Foreign Firms

May 16, 2012

A business does not need to be located in the PRC to fall victim to espionage. This problem includes old fashioned spying outside of China, sometimes by a classic sleeper agents or by a PRC-owned or invested firm that assesses, develops, and recruits an agent inside your firm...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Panetta Treads Lightly Around Chinese Cyber Attacks

May 10, 2012 Added by:Headlines

"I can hardly agree with the proposition that the cyber attacks directed to the United States are directly coming from China. And during the meeting, Secretary Panetta also agreed on my point that we cannot attribute all the cyber attacks in the United States to China..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Big Boy Politics: Rep. Frank Wolf Demonstrates

May 09, 2012 Added by:Joel Harding

Congressman Wolf, why don’t you establish a program, for the sake of national security, inspecting equipment originating from outside the US, looking for embedded malicious code and backdoors as well as inspecting software updates for that equipment for the same?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

China vs. Philippines: Cyberwar or Hacktivism?

May 03, 2012 Added by:Pierluigi Paganini

While attention is focused on Iran and its quarrel with the West, other silent battles are being fought. In the last month, there has been a surprising level of activity between China and the Philippines, with reciprocal attacks via bits and bytes. Are we witnessing a cyber conflict?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Military Advocates Cyber Offensive Capability

May 02, 2012 Added by:Headlines

“If this represents the official line of thinking, this means that the prospects are not good that a limited conflict in a Taiwan Straits would remain localized to that geography without escalating into an all-out war,” said Chinese cyber warfare expert Dmitri Alperovitch...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congressional Testimony Rings Cybersecurity Alarm Bells

April 25, 2012 Added by:Headlines

"Every day nations and 'hacktivist' groups penetrate our public and private computer networks. The degradation of our national security and intellectual property from cyber theft threatens to weaken us where we have been historically strong: in our ingenuity and creativity..."

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch Intelligence Rings the Chinese Warning Bell

April 20, 2012 Added by:Don Eijndhoven

Finally the Dutch intelligence service AIVD has started warning the people about Chinese cyber espionage practices against Dutch firms. The Chinese government is actively recruiting Chinese researchers and technical experts to work for them in foreign countries...

Comments  (0)

296634767383f056e82787fcb3b94864

China: Our Incompetent Master Adversary?

April 16, 2012 Added by:Jeffrey Carr

Either China is the greatest and dumbest adversary we've ever had, or the real dummies are those in infosec who can't be bothered to question the obvious when doing incident response, or who choose to cater to the rising tide of Sinophobia in the U.S. in order to boost their sale...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

China, Cyber Warfare and Challenges for the Future

April 09, 2012 Added by:Pierluigi Paganini

China's growing presence in cyber space will result in an increase in cyber operations against the nation. Due to the imbalance between an aggressive cyber offense its weak cyber defense capabilities, it could be the origin of significant technological problems for China...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Real Questions about Huawei for US Rep. Frank Wolf

April 03, 2012 Added by:Joel Harding

The Congressman was obviously attempting to either persuade the US China Economic and Security Commission or reassure them about Huawei. He passionately made a one-sided statement but failed to provide any evidence aside from one news report in that day’s Washington Post...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Operation Luckycat Targets Tibet, Japan and India

April 02, 2012 Added by:Pierluigi Paganini

Of course, the involvement of Gu Kaiyuan doesn't prove the campaigns are officially sponsored by the Chinese government, but the targets chosen leads the experts believe that the Beijing government is behind the Operation Luckycat attacks...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »