Chinese Cyber Code Conflict
46.5K views | +7 today
Follow
Chinese Cyber Code Conflict
Chinese Cyber Code Conflict
Your new post is loading...
Your new post is loading...
Scooped by Red-DragonRising
Scoop.it!

Палубное сравнение. J-15 лучше Су-33? | Военно-политическое обозрение

Палубное сравнение. J-15 лучше Су-33? | Военно-политическое обозрение | Chinese Cyber Code Conflict | Scoop.it
Авторский взгляд на геополитику и безопасность
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Apps for Windows 8 easily hacked - The H Security: News and Features

Apps for Windows 8 easily hacked - The H Security: News and Features | Chinese Cyber Code Conflict | Scoop.it
Unfathomable riches in one's favourite game and full versions that are free of charge - apps for Windows 8 offer little resistance to ambitious hackers, claims an engineer who should know
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

A Statement from .c0mrade

A Statement from .c0mrade | Chinese Cyber Code Conflict | Scoop.it
This year a hacker named .c0mrade came out of nowhere and left many high profile targets exposed as having exploitable systems.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Telstra invests $4 million in cloud communications company

Telstra completed a $4 million investment in Whispir that will help the cloud-based software company expand into Asia.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Facebook helps FBI smash global 11 million-strong botnet | ZDNet

Facebook helps FBI smash global 11 million-strong botnet | ZDNet | Chinese Cyber Code Conflict | Scoop.it
Social network Facebook has assisted worldwide law enforcement agencies to crack a botnet that is thought to have infected 11 million machines, and raked in more than $850 million.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Ransomware: The new cyber threat taking your computer hostage

Ransomware: The new cyber threat taking your computer hostage | Chinese Cyber Code Conflict | Scoop.it
Cyber-criminals are increasingly turning to a new money-making method of infecting your computer – holding it to ransom. Metro asks web security experts what users can do to stop their devices being taken hostage.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Our New Initiatives To Combat Botnets

Our New Initiatives To Combat Botnets | Chinese Cyber Code Conflict | Scoop.it
We often throw around the term "bots" in our industry. Short for "robots," it's the common term for software programs that run automated tasks. In many cases, bots can be innocuous and even useful.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Three New Cyber Security Threats in One Day

Three New Cyber Security Threats in One Day | Chinese Cyber Code Conflict | Scoop.it
Internet crooks never cease to surprise me. The inventiveness in being bad is super. If these guys lent their thinking power to the economy, the economic crisis would be solved within a week.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Is China Really the 80th-Most-Corrupt Country on Earth?

Is China Really the 80th-Most-Corrupt Country on Earth? | Chinese Cyber Code Conflict | Scoop.it
Chinese web users think Transparency International's latest rankings are far too lenient.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

‘Imported From Detroit’ Is a Good Idea in China, if Only…

‘Imported From Detroit’ Is a Good Idea in China, if Only… | Chinese Cyber Code Conflict | Scoop.it
If Apple and General Electric can shift some production out of China and back to America, then why not Ford, General Motors and Chrysler? CRT auto analyst Michael Dunne explains.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

“Strong army” Xi: The other side of China’s reformer

“Strong army” Xi: The other side of China’s reformer | Chinese Cyber Code Conflict | Scoop.it
Much has been made this week of Xi Jinping’s “southern tour”.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Trend Micro Predictions for 2013 and Beyond: Threats to Business, the Digital Lifestyle, and the Cloud | Security Intelligence Blog | Trend Micro

Trend Micro Predictions for 2013 and Beyond: Threats to Business, the Digital Lifestyle, and the Cloud | Security Intelligence Blog | Trend Micro | Chinese Cyber Code Conflict | Scoop.it
Trend Micro releases its forecast for 2013 and beyond.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Joomla sites misused to deploy malware - The H Security: News and Features

Joomla sites misused to deploy malware - The H Security: News and Features | Chinese Cyber Code Conflict | Scoop.it
For weeks, unknown criminals have exploited a known hole in the widely used Java Content Editor to take control of web servers via automated attacks.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Russian space research org targeted by mystery malware attack • The Register

Russian space research org targeted by mystery malware attack • The Register | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

New Findings Lend Credence to Project Blitzkrieg — Krebs on Security

New Findings Lend Credence to Project Blitzkrieg — Krebs on Security | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Hacker shocked at ease of entry

Hacker shocked at ease of entry | Chinese Cyber Code Conflict | Scoop.it
The hacker who stole the personal details of thousands of Australian military personnel used a simple technique that would fail to breach most modern security systems.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Power grid operators attacked via DDoS - The H Security: News and Features

Power grid operators attacked via DDoS - The H Security: News and Features | Chinese Cyber Code Conflict | Scoop.it
In November, unknown attackers crippled the internet infrastructure of 50Hertz, a power grid operator that runs transmission networks in Northern and Eastern Germany; however, no critical infrastructures are believed to have been affected...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Cybercriminal Campaigns Will Rely Even More on the Cloud in 2013, Experts Say - Softpedia

Cybercriminal Campaigns Will Rely Even More on the Cloud in 2013, Experts Say - Softpedia | Chinese Cyber Code Conflict | Scoop.it
Cybercriminal Campaigns Will Rely Even More on the Cloud in 2013, Experts Say
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Mitigating DDoS Attacks: A Global Challenge

Mitigating DDoS Attacks: A Global Challenge | Chinese Cyber Code Conflict | Scoop.it
On December 5, 2012, Public Interest Registry moderated an expert panel on "Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape." The panel included representatives from Symantec, Afilias, Google, Neustar, VeriSign and the...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Healthcare Information Security is in Critical Condition | Security Bistro

Healthcare Information Security is in Critical Condition | Security Bistro | Chinese Cyber Code Conflict | Scoop.it
News and analysis of the latest cyber attacks, security threats, network security, mobile security, data protection and much more.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

China ‘lacks leverage’ over North Korea

China ‘lacks leverage’ over North Korea | Chinese Cyber Code Conflict | Scoop.it
Beijing lacks leverage over North Korea and will block moves for strong new sanctions for fear of weakening its position further, Chinese state media said on Thursday following Pyongyang’s rocket launch....
more...
Scooped by Red-DragonRising
Scoop.it!

The Path to Legal Reform Without Revolution

The Path to Legal Reform Without Revolution | Chinese Cyber Code Conflict | Scoop.it
Few people have pushed for legal reform in China as persuasively or courageously as He Weifang, an outspoken and well-known legal scholar at the Beijing University Law School.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Microsoft Retools in Fight Against China Pirates

Microsoft Retools in Fight Against China Pirates | Chinese Cyber Code Conflict | Scoop.it
For pirates in China, where illegal software sales greatly outmatch legal ones, a new version of Windows typically means a new treasure ship to plunder. Microsoft is hoping it can stop the theft this time around.
more...
No comment yet.