Items Tagged with "China"


The First Cyber Shot in a Chinese Jasmine Spring

April 01, 2012 Added by:Joel Harding

This does not look like a US military action against China, that is certain. Whoever put the message together seems to be dumbing it down to aid in translation. It’s as if it’s intended for an American audience, but nobody in their right mind would or should do that...

Comments  (0)


Rep. Frank Wolf: What’s with You and Huawei?

March 28, 2012 Added by:Joel Harding

What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?

Comments  (2)


Huawei Symantec: Fear of Chinese Espionage Ends Venture

March 27, 2012 Added by:Pierluigi Paganini

While I understand the defensive approach, I believe that such behavior could have serious repercussions on the global market. In terms of security, little will change by breaking strategic alliances. Cyber attacks will continue and will increase in frequency and efficiency...

Comments  (0)


The Real Reason Symantec Sold its Interest in Huawei Symantec

March 27, 2012 Added by:Jeffrey Carr

While the joint venture may be over, remember a lot of Huawei equipment has already been sold to the U.S. government including DOD and NASA through channel partners like MPAK and Dell Force 10 Networks. To make matters worse, no one is testing for backdoors in firmware updates...

Comments  (0)


China Also the Target of Cyber Attacks

March 21, 2012 Added by:Pierluigi Paganini

The Chinese government has been accused of pursuing an aggressive cyber strategy against foreign companies. Of course, China is also the target of cyber attacks, and many experts are convinced that despite their aggressive cyber offense, Chinese cyber defense is not so efficient...

Comments  (0)


Yet Another Chinese-Based Targeted Malware Attack

March 14, 2012 Added by:Headlines

"The payload is also an advanced persistent threat - extremely difficult to detect once inside the network. Although it’s more than a week old, the backdoor still has poor detection, with only 7 of 42 antivirus solutions able to detect it..."

Comments  (0)


The Use of Social Networks for Cyber Espionage

March 13, 2012 Added by:Pierluigi Paganini

There has been an upsurge in cyber espionage by governments in search of information relating to military and industrial technologies. Of strategic importance for these activities are social networks through which one can trace a target's relationships, habits, and location...

Comments  (1)


USCC Report on China Misses the Boat on Cyber Espionage

March 13, 2012 Added by:Jeffrey Carr

The report did a good job exploring part of the Supply Chain problem with with chip development. It didn't cover the more common problem of U.S. companies who out-source development work to Chinese firms or companies like Dell who do their manufacturing and R&D in China...

Comments  (1)


You’ve Been Phished Without an Email or a PDF

March 12, 2012 Added by:Infosec Island Admin

It seems that someone is making a full sized driftnet for information on those who would like to sign up as well as discuss the INSCOM Cyber Brigade. On the surface like I said, this looks all well and good, but once you start to poke at it though, you get some strange answers...

Comments  (16)


Chinese Network Operations and Cyber Espionage Capabilities

March 09, 2012 Added by:Stefano Mele

Developments in Chinese network operations applications and research and development point to a nation fully engaged in leveraging all available resources to create a technically advanced ability to operate in cyberspace as a means of meeting military and civilian goals...

Comments  (0)


New Opportunities for Cyber Espionage and Cyber Crime

March 08, 2012 Added by:Pierluigi Paganini

Computer fraud, phishing, and malware development designed to steal sensitive information from users, the use of advanced persistent threats, ramsonware, and cyber espionage are all activities united by the intent to profit from the improper use of technology...

Comments  (0)


Northrop Report Examines Chinese Information Warfare Strategies

March 08, 2012 Added by:Headlines

"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."

Comments  (0)


North Korea’s Cyber War Forces

March 06, 2012 Added by:Dan Dieterle

North Korean Students that show aptitude are selected from elementary schools and are groomed in cyber warfare throughout their college years. They constantly hone their skills and even attend foreign colleges to learn the latest security techniques...

Comments  (0)


Advanced Persistent Threats: The Butler in China Did It

March 05, 2012 Added by:J. Oquendo

Aside from the attack coming from a Philips Electronics' Chinese-based IP block, I am positive that whoever was behind the attack was not an employee. Someone probably compromised a machine at Philips and was using it to attack the PBX I managed. Nothing more, and nothing less...

Comments  (0)


The Chinese Government and PLA’s Use of Information Warfare

March 04, 2012

Conclusions of the research and analysis indicate that there is a direct and quantifiable historical linkage between the People’s Republic of China and cyber warfare. This correlation is divided into three sectors as a nation state information warfare initiative...

Comments  (3)


The Cyber Arms Race: Casting Shadows on the Future

March 01, 2012 Added by:Pierluigi Paganini

We are confronted with a new arms race for cyber weapons, and as governments around the world compete for innovation, a cultural revolution is occurring in nations which have been considered minor, and which are now nearly on par superpowers like the U.S. and China...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »