Items Tagged with "China"
February 17, 2012 Added by:Pierluigi Paganini
Why have they not targeted China before? Hypothetically, the structure of Anonymous could have been infiltrated and directed against the Chinese as part of a strategy defined by the West, or perhaps someone is using the name Anonymous to conduct undercover operations...
February 17, 2012 Added by:Headlines
Chairman Rogers initiated the probe last fall after a preliminary inquiry into Chinese espionage operations determined the need for further investigation into threats aimed at the U.S. technology supply chain, critical infrastructure, and proprietary information...
February 16, 2012 Added by:Infosec Island Admin
Sure, there are potential issues with regard to infrastructure and hacking/warfare, but, it is not such that we need to frame it and clothe it in the ripped flag of 9/11 do we? Obviously these guys all think so. I would beg to differ, and I find it shameful...
February 15, 2012 Added by:Pierluigi Paganini
The damage is incalculable if we consider the enormous amount of data that may have been lost. Information on technological solutions, business reports, and other sensitive documents were stolen for years, seriously compromising the intellectual property of the company...
February 09, 2012 Added by:Infosec Island Admin
China, Russia, Israel etc etc are all key players in the espionage world which now includes the 5th battlespace of information warfare carried out on the internet and within computer networks. To think anything else because someone asked them just how prepared “they” were for “cyberwar” is just appallingly stupid...
February 07, 2012 Added by:Pierluigi Paganini
Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...
February 02, 2012 Added by:Pierluigi Paganini
“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”
January 30, 2012 Added by:Pierluigi Paganini
At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...
January 27, 2012 Added by:Headlines
The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...
January 23, 2012 Added by:Pierluigi Paganini
China is a cyber power capable of destroying most any opponent, especially when going against companies in trouble because of the difficult economy situation. These companies are the most vulnerable members of the security chain and therefore a favorite target...
January 23, 2012 Added by:Infosec Island Admin
The Cuckoo’s Egg”, which happened in 1986, is the first "documented” case of computer espionage that is not classified. Cliff Stoll was asked to look into an accounting error on a University system and ended up finding and tracking an asset for the KGB...
January 19, 2012 Added by:Dan Dieterle
Growing up I heard numerous times that the Soviet's needed so many missiles to protect it’s vast land mass from aggressors. Everyone knew that the large missile stockpile was more of a threat than a safety net. It seems that China may be trying to play the same card...
January 10, 2012 Added by:Joel Harding
That the Chinese government seems to be systematically penetrating corporate and government system in order to steal corporate and government secrets is not really the issue. This appears to be an accepted fact, and the issue is how to address the problem...
January 04, 2012 Added by:Headlines
"This campaign could target organizations related to technology used in... aerospace and military industries... With the information we collected it appears that this campaign has been running for months. Someone has said that cyberwar does not exist?. Draw your own conclusions..."
January 03, 2012 Added by:Joel Harding
Now in the very likely propaganda department… The Voice of Russia is stating in an article published recently that Iran is offering access to their recently acquired RQ-170 Sentinel, reputedly a captured CIA collection platform, to Russia and China...
December 22, 2011 Added by:Headlines
"What was unusual about it was that this was clearly somebody very sophisticated, who knew exactly who we are and who targeted specific people and used sophisticated tools to try to gather intelligence," said the Chamber's COO David Chavern...