Chinese Cyber Cod...
Follow
Find
46.0K views | +0 today
Chinese Cyber Code Conflict
Chinese Cyber Code Conflict
Your new post is loading...
Your new post is loading...
Scooped by Red-DragonRising
Scoop.it!

Why India lags behind China

Why India lags behind China | Chinese Cyber Code Conflict | Scoop.it
Letters: It seems plausible that it is the lack of freedom and poor human rights which hold back the Indian economy. The question is then why a lack of freedom appears to be less damaging in China
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Broad Powers Seen for Obama in Cyberstrikes

Broad Powers Seen for Obama in Cyberstrikes | Chinese Cyber Code Conflict | Scoop.it
The administration is moving to approve the nation’s first rules for how the military can defend, or retaliate, against a major cyberattack.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

What is a Cyber Weapon?

What is a Cyber Weapon? | Chinese Cyber Code Conflict | Scoop.it
What is a Cyber Weapon? At first glance this seems an immediate question to answer, but should anyone try to analyze the meaning of this term more deeply, probably he would be quite surprised and d...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

The state of cyber warfare law

The state of cyber warfare law | Chinese Cyber Code Conflict | Scoop.it
As yet, there is no specific convention or treaty to regulate cyber warfare and seriously address its unique characteristics.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Chinese Media Hacker Ninjas: Bad Form, Bad Habits, Bad PR - Forbes

Chinese Media Hacker Ninjas: Bad Form, Bad Habits,  Bad PR - Forbes | Chinese Cyber Code Conflict | Scoop.it
The obsession with enemies of the state reveals the deeper obstacle to China’s continued evolution: truly abysmal comprehension of the necessity of goodwill, the value of friends.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Research & Analysis of Zero-Day & Advanced Targeted Threats:Operation BEEBUS

Research & Analysis of Zero-Day & Advanced Targeted Threats:Operation BEEBUS | Chinese Cyber Code Conflict | Scoop.it
FireEye discovered an APT campaign consistently targeting companies in the aerospace and defense industries. The campaign has been in effect for sometime now.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Chinese hackers targeted Washington Post in 2011, newspaper says

Chinese hackers targeted Washington Post in 2011, newspaper says | Chinese Cyber Code Conflict | Scoop.it
Post says it was the victim of a 'sophisticated cyber-attack' two years ago but that the breach was dealt with 'promptly'
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

PLA; plan, fight, and win wars is an ominous sign ★China’s New Militancy | TURKISH CENTRAL NEWS

PLA; plan, fight, and win wars is an ominous sign ★China’s New Militancy | TURKISH CENTRAL NEWS | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

US Defense positions a military cyber squad on DHS turf

US Defense positions a military cyber squad on DHS turf | Chinese Cyber Code Conflict | Scoop.it
Computer security experts react to Cyber Command proposal with optimism, blunted by reality that attacks are hard to foresee.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

New York Times targeted attack shows lack of capability of antivirus

New York Times targeted attack shows lack of capability of antivirus | Chinese Cyber Code Conflict | Scoop.it
The advanced persistent threat APT suffered by the New York Times demonstrates the need for more than antivirus.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

North Korea, Iran More Integrated Than Ever On Nukes | Analysis Intelligence

North Korea, Iran More Integrated Than Ever On Nukes | Analysis Intelligence | Chinese Cyber Code Conflict | Scoop.it
Earlier this week, we reported on the international response to North Korea's latest threats of a new nuclear weapon test. During that research, we came upon an
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Advanced Targeted Threats:Hackers Targeting Taiwanese Technology Firm

Advanced Targeted Threats:Hackers Targeting Taiwanese Technology Firm | Chinese Cyber Code Conflict | Scoop.it
In the past, hackers have attempted to compromise targeted organizations by...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

If the Chinese dragon is so mighty, why is it trembling inside?

If the Chinese dragon is so mighty, why is it trembling inside? | Chinese Cyber Code Conflict | Scoop.it
Jonathan Freedland: Beijing's alleged hacking of the New York Times is a sign of both the regime's huge power – and its fear of a Chinese spring
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Experts Say CEOs Need to Get Handle on Cyberespionage Problem | threatpost

Experts Say CEOs Need to Get Handle on Cyberespionage Problem | threatpost | Chinese Cyber Code Conflict | Scoop.it
Eugene Kaspersky and Howard Schmidt said there are not enough CEOs who understand the scope of the cyberespionage problem and that there aren't enough security experts to handle it.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Exclusive: Huawei CFO linked to firm that offered HP gear to Iran

Exclusive: Huawei CFO linked to firm that offered HP gear to Iran | Chinese Cyber Code Conflict | Scoop.it
LONDON (Reuters) - A Hong Kong-based firm that attempted to sell embargoed Hewlett-Packard computer equipment to Iran's largest mobile-phone operator has much closer ties to China's Huawei Technologies...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

China May (or May Not) Be Behind the Twitter Hack

China May (or May Not) Be Behind the Twitter Hack | Chinese Cyber Code Conflict | Scoop.it
You may not have heard, but roughly 250,000 Twitter accounts may have been compromised by hackers.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Why the New York Times network was simple to breach | The Last Watchdog

Why the New York Times network was simple to breach | The Last Watchdog | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

US prepares intelligence assessment on scope of cyberthreat from China

US prepares intelligence assessment on scope of cyberthreat from China | Chinese Cyber Code Conflict | Scoop.it
The Obama administration is considering more assertive action against Beijing to combat a persistent cyberespionage campaign it believes Chinese hackers are waging against US companies and government agencies....
more...
DOSID's comment, February 2, 2013 11:00 PM
Re Scooping with your permission. Thank you in advance.
DOSID's curator insight, February 2, 2013 11:04 PM

Interestingly so in 2010 “The US itself has been named in one of the most prominent cyberattacks - Stuxnet - the computer worm that infiltrated an Iranian nuclear facility, shutting down thousands of centrifuges” 

Scooped by Red-DragonRising
Scoop.it!

New York Times suffers APT at the hands of Chinese attackers

New York Times suffers APT at the hands of Chinese attackers | Chinese Cyber Code Conflict | Scoop.it
The New York Times has suffered a major cyber attack, with a large number of its user passwords stolen.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

A Strange Coincidence

A Strange Coincidence | Chinese Cyber Code Conflict | Scoop.it
After the revelation of the Chinese attack against the Gray Lady, other U.S. media companies have admitted to have been targeted by (probably state-sponsored) Chinese Hackers in 2012. Immediately a...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Battle lines drawn: Nation-state threats - Print Article - SC Magazine

Battle lines drawn: Nation-state threats - Print Article - SC Magazine | Chinese Cyber Code Conflict | Scoop.it
Would any nation or criminal entity attempt a cyber strike on the United States? Ryan Goldberg investigates the possibilities
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Stolen Personal Information is Still For Sale on the Chinese Internet

Stolen Personal Information is Still For Sale on the Chinese Internet | Chinese Cyber Code Conflict | Scoop.it
Chinese "investigation" companies offer clients a creepy level of detail, including QQ and SMS chat records.
more...
No comment yet.