Items Tagged with "China"
April 01, 2012 Added by:Joel Harding
This does not look like a US military action against China, that is certain. Whoever put the message together seems to be dumbing it down to aid in translation. It’s as if it’s intended for an American audience, but nobody in their right mind would or should do that...
March 28, 2012 Added by:Joel Harding
What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?
March 27, 2012 Added by:Pierluigi Paganini
While I understand the defensive approach, I believe that such behavior could have serious repercussions on the global market. In terms of security, little will change by breaking strategic alliances. Cyber attacks will continue and will increase in frequency and efficiency...
March 27, 2012 Added by:Jeffrey Carr
While the joint venture may be over, remember a lot of Huawei equipment has already been sold to the U.S. government including DOD and NASA through channel partners like MPAK and Dell Force 10 Networks. To make matters worse, no one is testing for backdoors in firmware updates...
March 21, 2012 Added by:Pierluigi Paganini
The Chinese government has been accused of pursuing an aggressive cyber strategy against foreign companies. Of course, China is also the target of cyber attacks, and many experts are convinced that despite their aggressive cyber offense, Chinese cyber defense is not so efficient...
March 14, 2012 Added by:Headlines
"The payload is also an advanced persistent threat - extremely difficult to detect once inside the network. Although it’s more than a week old, the backdoor still has poor detection, with only 7 of 42 antivirus solutions able to detect it..."
March 13, 2012 Added by:Pierluigi Paganini
There has been an upsurge in cyber espionage by governments in search of information relating to military and industrial technologies. Of strategic importance for these activities are social networks through which one can trace a target's relationships, habits, and location...
March 13, 2012 Added by:Jeffrey Carr
The report did a good job exploring part of the Supply Chain problem with with chip development. It didn't cover the more common problem of U.S. companies who out-source development work to Chinese firms or companies like Dell who do their manufacturing and R&D in China...
March 12, 2012 Added by:Infosec Island Admin
It seems that someone is making a full sized driftnet for information on those who would like to sign up as well as discuss the INSCOM Cyber Brigade. On the surface like I said, this looks all well and good, but once you start to poke at it though, you get some strange answers...
March 09, 2012 Added by:Stefano Mele
Developments in Chinese network operations applications and research and development point to a nation fully engaged in leveraging all available resources to create a technically advanced ability to operate in cyberspace as a means of meeting military and civilian goals...
March 08, 2012 Added by:Pierluigi Paganini
Computer fraud, phishing, and malware development designed to steal sensitive information from users, the use of advanced persistent threats, ramsonware, and cyber espionage are all activities united by the intent to profit from the improper use of technology...
March 08, 2012 Added by:Headlines
"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."
March 06, 2012 Added by:Dan Dieterle
North Korean Students that show aptitude are selected from elementary schools and are groomed in cyber warfare throughout their college years. They constantly hone their skills and even attend foreign colleges to learn the latest security techniques...
March 05, 2012 Added by:J. Oquendo
Aside from the attack coming from a Philips Electronics' Chinese-based IP block, I am positive that whoever was behind the attack was not an employee. Someone probably compromised a machine at Philips and was using it to attack the PBX I managed. Nothing more, and nothing less...
March 04, 2012
Conclusions of the research and analysis indicate that there is a direct and quantifiable historical linkage between the People’s Republic of China and cyber warfare. This correlation is divided into three sectors as a nation state information warfare initiative...
March 01, 2012 Added by:Pierluigi Paganini
We are confronted with a new arms race for cyber weapons, and as governments around the world compete for innovation, a cultural revolution is occurring in nations which have been considered minor, and which are now nearly on par superpowers like the U.S. and China...