• Cyber sleuth finds China's fingerprints on code used in Google attacks

    SecureWorks’ Joe Stewart says he found Chinese fingerprints on the code used in the attacks on Google and other Western companies; the telltale sign is an error-checking algorithm in the software that installed the Hydraq backdoor on compromised PCs

  • Aussies open new Cyber Security Operations Center

    The Australian Strategic Policy Institute warned of the nation’s increasing vulnerability to cyber attacks, putting at risk not only its defense system but also its economy, businesses, food production, power and water supplies, transport, and telecommunications; the government is especially worried about sustained cyberattacks from China; the center, operated by the highly secret Defense Signals Directorate, is part of a series of moves launched last year under the government’s cyber security strategy

  • What the Chinese attacks on Google mean for enterprise security

    Chinese government intelligence operatives exploited vulnerabilities in Internet Explorer 6 and higher to launch sustained cyber attacks against 32 Western companies operating in China; the hacking of the Gmail accounts of political dissidents were but a tiny part of the attacks; rather, the attacks were part of a coordinated campaign that targeted the intellectual property of a wide swath of the U.S. industrial base, including Dow Chemical, Symantec, Yahoo!, Northrop Grumman, and Juniper Networks; wide-ranging industrial espionage is a central element in the Chinese government’s effort to hasten the rise of China to a position of global economic hegemony

  • Experts: Chinese attack on Google “one of the most sophisticated hacking attacks to date”

    The cracking techniques used by Chinese government operatives in the assault on Google and 31 other Western companies, used multiple malware components, with highly obfuscated code designed to confound security researchers; this marks out the Chinese attack as one of the most sophisticated hacking attacks to date; why was the search engine giant using the famously vulnerable IE6 remains a mystery

  • UK.gov dismisses Tory claims U.K. cyberspace is not well defended

    On Friday, the U.K. Conservative Party unveiled its national security plans, charging that the current Labor government has left U.K. cyberspace defenseless; the government dismissed the Tory claims, saying that many of the proposals in the Conservative Party’s plan are already being implemented

  • Tories say they will set up a permanent “War Cabinet”

    The Conservative Party is favored to win the next general elections in Britain, which will be held before the summer; on Friday the party’s leader, David Cameron, set out the party’s national security plan, emphasizing cybersecurity

  • Chinese cyber attacks hit U.S. law firm which is suing China for stealing Web filtering code form a U.S. company

    The Los Angeles-based law firm Gipson Hoffman & Pancione sued China for lifting Web-filtering code developed by U.S. company Cybersitter; Chinese companies and government agencies stole the code in order to use it in the Chinese government’s effort to create tighter Web censorship and tracking system (China’s Orwellian name for the project” “The Green Dam Youth Escort monitoring program”); on Monday, Chinese hackers began to hack the law firm’s computer systems, in a manner strikingly similar to the attacks by Chinese intelligence operatives on Google, Adobe Systems, and 32 other Western companies

  • China tries to contain damage from Google dispute

    The Chinese government says it will try to persuade Google to continue its operations in China, but expect Google – and other foreign companies — to “respect local law and regulations and local culture and customs to shoulder social responsibility”; Google already made concessions to Chinese law and regulations by allowing the government to dictate what users can – and cannot — find when they do Google searches; Google’s decision to leave China came after Chinese intelligence agents hacked the Gmail accounts of political dissidents and human rights activitists

  • Cyber exercise to target financial firms

    The test, which starts 9 February, will have different scenarios for each of four different types of businesses: Financial firms, retailers, card processors, and general businesses; on each day, participants will receive a description of a specific scenario for their category of business, building on the previous day

  • Iran-China cyberwar breaks out as Iranians hack into Chinese search engine

    Iranian hackers broke into the Web site of Baidu, the Chinese search engine, displaying the Iranian flag and calling themselves the Iranian Cyber Army; in retaliation, Chinese hackers flooded Iranian Web sites with warnings about intervention in China’s internal affairs

  • Google to pull out of China following government-sponsored cyberattacks

    In order to operate in China, Google agreed to implement stringent government-dictated censorship as to what Chinese consumers can – and cannot – find when doing Google searches; Google’s compliance with Chinese censorship was harshly criticized by human rights and freedom-of-speech organizations, but Google responded that this was the cost of doing business in China; the Chinese government’s hacking of Gmail accounts in order to monitor political dissidents proved to much for Google, though, and the company is now set to end its operations in China

  • Google’s decision a rare show of defiance in China

    Google’s decision to leave China is a rare show of defiance in a market where the government punishes those who do not play by the rules; in industries from automaking to fast food, companies have been forced to allow communist authorities to influence — and sometimes dictate — their choice of local partners, where to operate, and what products to sell; many high-tech companies operating in China are forced to open their intellectual property and industrial secrets to their Chinese competitors – or to Chinese government officials, who pass on that property to Chinese companies – allowing these Chinese companies to reverse engineer and copy Western companies’ products and solutions; Western companies have struggled to make headway against intense competition from Chinese rivals – rivals who enjoy the fact that the Chinese government writes rules which tilt the playing field in favor of Chinese companies

  • Maryland wants to become cybersecurity’s Silicon Valley

    Governor Martin O’Malley: “Our federal facilities are a big part of the reason that we not only think that Maryland can be the national epicenter for cybersecurity, the fact of the matter is our state already is the epicenter of cybersecurity for our country and therefore an important epicenter for the entire world”

  • FTC to examine cloud computing privacy concerns

    The FTC says it wants to examine potential threats to consumer privacy and data security posed by cloud computing services; David Vladeck, director of the FTC’s Bureau of Consumer Protection: “The ability of cloud computing services to collect and centrally store increasing amounts of consumer data, combined with the ease with which such centrally stored data may be shared with others, create a risk that larger amounts of data may be used by entities in ways not originally intended or understood by consumers”

  • China offers Internet pirates bulletproof havens for illegal file sharing

    Most bulletproof hosts which allow music, video, and software to be illegally shared online are located in China, where criminals are able to take advantage of low costs and legal loopholes to avoid prosecution; despite officials in Beijing talking in tough terms about computer crime — hacking potentially carries a death sentence in China — the authorities rarely cooperate with other countries to take action against hi-tech criminals; as a result, just a handful of firms in China are responsible for hosting thousands of criminal enterprises online; one example: more than 22,000 Web sites which sent pharmaceutical spam were hosted by six bulletproof servers in China