Items Tagged with "China"


69dafe8b58066478aea48f3d0f384820

Congressman Confronts China over Cyber Espionage

October 05, 2011 Added by:Headlines

“Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EastWest Institute Builds Consensus on Cybersecurity

October 04, 2011 Added by:Headlines

At the EastWest Institute's Worldwide Security Conference (WSC) in Brussels, experts from the United States, Russia, China and other countries advanced ongoing efforts to develop recommendations for areas of potential cooperation to protect critical infrastructure...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threat: Guard Indicted for Chinese Espionage

October 03, 2011 Added by:Headlines

Bryan Underwood, a former contract guard working at a U.S. Consulate in China, has been charged in a superseding indictment with one count of attempting to communicate national defense information to a foreign government...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Western Powers Wary of Chinese Cyber Espionage Ops

September 26, 2011 Added by:Headlines

"The broad international view... is that China is one of the countries at the forefront of cyber attacks on other states, which it is doing for fairly obvious reasons - intelligence gathering, political and strategic advantage, and also for defensive purposes..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Western Companies in Collusion with Chinese Oppression

September 21, 2011 Added by:Headlines

"Entering into the Chinese market as a search engine or social media provider is an ethical mine field. In the hands of authorities determined to police their subjects, search engines and social media platforms such as Facebook can become a potent tool of online repression..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO Seeks Cyber Alliance with India

September 16, 2011 Added by:Headlines

Chinese state backed hackers are not the only threat we are facing. The Russian Business Network and other foreign government-backed entities are falling from the radar as Chinese hackers take center stage. Lets not forget the lone hackers or hacktivist groups that are very active...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

RSA Attack: All That Glitters Isn't China

September 07, 2011 Added by:J. Oquendo

RSA Attack: So we have a company that digs up a name, associates that name with a quick Google search to an IP in China and labels it a threat, then they compile a half-checked dynamic malware analysis and call it a day. Those are the facts according to FireEye and others, here are mine...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

UK Investing Heavily in Cyber Offensive Capabilities

September 07, 2011 Added by:Headlines

"Suppose you're a scientist at Cheltenham and you come up with a new exploit of Windows. Are you going to tell Microsoft, get it patched and protect 60 million Brits? Or are you going to keep quiet about it so you can exploit 1.2 billion Chinese and 1 billion Indians?"

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

China: What Evil Lurks Within?

September 06, 2011 Added by:Joel Harding

Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

The Cyberworld Points at China

September 01, 2011 Added by:Joel Harding

While the rest of the world is seeking to define and quantify cyberwar, cyber espionage, cyber theft - and only then, finding ways to stop it - I believe the Chinese are nimbly spanking our butts in cyberspace – and we don’t have the guts to stop them...

Comments  (5)

94ae16c30d35ee7345f3235dfb11113c

Did China Really Expose a Cyber Attack Tool?

August 30, 2011 Added by:Joel Harding

Wow, it’s really cool that we have proof that China not only has the capabilities but has been caught red-handed attacking a website, and the target they’re attacking is located inside the US. I’m sure somebody at the new US Cyber Command jumped up and down and said, “Yes! We have proof..."

Comments  (5)

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Monkey See Monkey Do

August 29, 2011 Added by:J. Oquendo

Arguments surrounding APT will remain a battle of expert vs. expert - but how about we use some common sense for a moment? If YOU were an attacker, why would you bother attacking from your own fixed location? It would make more sense to attack from another country for deflection purposes...

Comments  (6)

7fef78c47060974e0b8392e305f0daf0

From China with Love: The Chairman Meow Collection

August 26, 2011 Added by:Infosec Island Admin

China has been working us over for a long time, and with each day’s passing we have been steadily more compromised by the 7th directorate and their proxy hacking groups. This is not to say that others aren’t doing the same thing as well, China just happens to be the more active...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Chinese Documentary Reveals Cyber Attack Software

August 23, 2011 Added by:Headlines

"Now we've got proof. They're also extending their persecution of Falun Gong overseas, attacking a civil website in the U.S. These are the clear messages revealed in these six seconds of video." said Jason Ma, a commentator for New Tang Dynasty Television...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Could a Cyber Attack Shut Down the Stock Exchange?

August 19, 2011 Added by:Infosec Island Admin

The system is vulnerable to attacks that would have great consequences to the financial system within the US as well as potentially the world. Perhaps Mr. Kass is just looking to leverage the fear, perhaps he is trying to fire off the "Bat Signal” that something is wrong or inevitable...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

I Know Who You Hacked Last Summer - Attribution 101

August 18, 2011 Added by:J. Oquendo

The media, security companies, and the “Cybersecurity Industrial Complex” labels almost all attacks as Advanced Persistent Threats almost always originating from China. The mechanism for identifying the attackers is always the same: "The attacker came from the following IP address..."

Comments  (7)

Page « < 5 - 6 - 7 - 8 - 9 > »