Jump to content

Search the Community

Showing results for tags 'china'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges
    • Bug Bounty
    • Programare
    • Reverse engineering & exploit development
    • Mobile phones
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Sugestii
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Cumparaturi online's Test
  • Web Development's Forum

Categories

There are no results to display.

There are no results to display.

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 10 results

  1. nextseeker

    Firma import marfa China

    .
  2. The United States expressed concern Friday over reports China has used a powerful censorship tool dubbed “Great Cannon” to attack websites around the world. Researchers reported in April that the “Great Cannon” is an online attack system used to hijack web traffic and enforce the country’s broad censorship of information online. The system was used to shut down websites aimed at helping Chinese bypass the country’s extensive online restrictions known as the “Great Firewall,” experts said. “We are concerned by reports that China has used a new cyber capability to interfere with the ability of worldwide internet users to access content hosted outside of China,” State Department spokesman Jeff Rathke said following a question about the program. Rathke said the cyber attack manipulated Chinese web traffic and “and turned it into malicious traffic directed at US sites.” “We have asked Chinese authorities to investigate this activity and provide us with the results of their investigation,” he said. Experts at the University of Toronto reported on the Great Cannon last month, noting denial of service attacks carried out by the system. The report supported claims by an activist organization which said China was seeking to shut down its online service that offer ways to access content from blocked websites. Great Cannon gives China cyberattack capabilities similar to the US National Security Agency’s Quantum program, revealed in documents leaked by former NSA contractor Edward Snowden, experts said. sursa: US 'Concerned' Over Reported Chinese Global Censorship Tool
  3. Aerosol

    Level 1 (Elite)

    Proxy Level 1 (Elite) IP Port Type Country Area City Last update(ago) 8080 High Anonymous UNITED STATES MASSACHUSETTS WAKEFIELD 239:48:04 3128 High Anonymous - - - 239:58:53 87 High Anonymous UNITED STATES MARYLAND GERMANTOWN 242:24:15 8080 High Anonymous UNITED STATES TENNESSEE NASHVILLE 242:25:15 80 High Anonymous UNITED STATES ARIZONA TEMPE 242:25:15 87 High Anonymous UNITED STATES MARYLAND GERMANTOWN 242:25:15 3129 High Anonymous - - - 243:25:54 87 High Anonymous UNITED STATES MARYLAND GERMANTOWN 245:09:26 87 High Anonymous UNITED STATES MARYLAND GERMANTOWN 245:09:26 8080 High Anonymous - - - 245:09:26 80 High Anonymous - - - 245:28:27 8080 High Anonymous - - - 245:28:27 8080 High Anonymous - - - 245:29:28 82 High Anonymous - - - 245:37:30 8080 High Anonymous INDONESIA JAKARTA RAYA (DJAKARTA RAYA) JAKARTA 245:37:30 8080 High Anonymous - - - 245:41:31 8080 High Anonymous UNITED STATES - - 245:41:31 8080 High Anonymous - - - 245:41:31 8080 High Anonymous UNITED STATES CALIFORNIA MOUNTAIN VIEW 245:41:31 80 High Anonymous UNITED STATES ARIZONA TEMPE 245:58:34 8080 High Anonymous UNITED STATES WISCONSIN SUN PRAIRIE 245:58:34 80 High Anonymous NETHERLANDS NOORD-HOLLAND AMSTERDAM 245:58:34 8080 High Anonymous UNITED STATES TENNESSEE NASHVILLE 246:38:35 8080 High Anonymous CANADA ONTARIO OTTAWA 246:39:36 8080 High Anonymous INDONESIA JAKARTA RAYA (DJAKARTA RAYA) JAKARTA 246:39:36 8080 High Anonymous - - - 246:39:36 80 High Anonymous - - - 246:39:36 80 High Anonymous UNITED STATES OREGON ROSEBURG 246:39:36 8080 High Anonymous - - - 246:39:36 8080 High Anonymous BANGLADESH DHAKA DHAKA 246:39:36 8080 High Anonymous CANADA ONTARIO OTTAWA 246:40:37 8080 High Anonymous UNITED STATES CALIFORNIA MOUNTAIN VIEW 246:40:37 8080 High Anonymous - - - 246:40:37 8080 High Anonymous CANADA ONTARIO OTTAWA 246:40:37 8080 High Anonymous - - - 246:40:37 8080 High Anonymous - - - 246:40:37 80 High Anonymous UNITED STATES WISCONSIN MILWAUKEE 248:38:39 80 High Anonymous UNITED STATES PENNSYLVANIA PITTSBURGH 248:38:39 80 High Anonymous - - - 248:38:39 80 High Anonymous UNITED STATES MASSACHUSETTS CAMBRIDGE 248:38:39 80 High Anonymous UNITED STATES VIRGINIA CHARLOTTESVILLE 248:38:39 80 High Anonymous UNITED STATES PENNSYLVANIA PITTSBURGH 248:38:39 80 High Anonymous ARGENTINA - - 248:38:39 80 High Anonymous BRAZIL - - 248:38:39 80 High Anonymous UNITED STATES MARYLAND BALTIMORE 249:47:10 8080 High Anonymous KOREA, REPUBLIC OF KYONGGI-DO SONGNAM 249:47:10 80 High Anonymous INDONESIA - - 249:51:14 80 High Anonymous GERMANY BERLIN BERLIN 249:51:14 80 High Anonymous - - - 250:03:25 8081 High Anonymous CHINA GUANGDONG GUANGZHOU 250:11:33 80 High Anonymous - - - 250:16:38 80 High Anonymous BELGIUM BRUSSELS BRUSSELS 250:17:39 8080 High Anonymous THAILAND - - 250:17:39 8080 High Anonymous KOREA, REPUBLIC OF KYONGGI-DO SEOUL 250:18:40 80 High Anonymous INDIA - - 250:18:40 80 High Anonymous - - - 250:19:41 61249 High Anonymous - - - 250:19:41 80 High Anonymous BAHRAIN - - 250:19:41 80 High Anonymous UNITED STATES NEW YORK NEW YORK 250:20:42 80 High Anonymous - - - 250:21:43 80 High Anonymous BAHRAIN - - 250:34:53 80 High Anonymous JAPAN TOKYO TOKYO 250:34:53 80 High Anonymous LATVIA - - 250:35:54 82 High Anonymous CHINA - - 250:50:06 6515 High Anonymous - - - 250:50:06 80 High Anonymous BAHRAIN - - 250:52:08 80 High Anonymous ECUADOR - - 250:53:09 80 High Anonymous SPAIN - - 250:53:09 80 High Anonymous KAZAKHSTAN - - 250:53:09 20459 High Anonymous - - - 250:54:10 80 High Anonymous ISRAEL TEL AVIV RAMAT GAN 250:57:14 8080 High Anonymous - - - 250:58:15 80 High Anonymous - - - 250:58:15 80 High Anonymous UNITED STATES CALIFORNIA SUNNYVALE 250:58:15 80 High Anonymous - - - 250:59:16 8080 High Anonymous - - - 251:02:19 80 High Anonymous CHINA SHANGHAI SHANGHAI 251:02:19 80 High Anonymous CHINA BEIJING BEIJING 251:03:20 80 High Anonymous FRANCE PAYS DE LA LOIRE NANTES 251:03:20 80 High Anonymous - - - 251:03:20 80 High Anonymous TURKEY AYDIN AYDIN 251:03:20 80 High Anonymous - - - 251:03:20 80 High Anonymous - - - 251:03:20 80 High Anonymous BAHRAIN AL MANAMAH MANAMA 251:04:21 8080 High Anonymous SAUDI ARABIA - - 251:04:21 9000 High Anonymous - - - 252:21:08 9980 High Anonymous CHINA GUANGDONG SHENZHEN 252:22:09 8080 High Anonymous TAIWAN T'AI-PEI TAIPEI 252:22:26 1998 High Anonymous CHINA BEIJING BEIJING 252:22:26 1998 High Anonymous - - - 252:22:26 8080 High Anonymous ETHIOPIA - - 252:41:10 808 High Anonymous INDIA DELHI NEW DELHI 252:42:11 8080 High Anonymous - - - 254:54:07 1998 High Anonymous - - - 254:54:29 808 High Anonymous - - - 254:54:29 8080 High Anonymous VENEZUELA DISTRITO FEDERAL CARACAS 255:00:44 6666 High Anonymous CHINA BEIJING BEIJING 255:00:44 8081 High Anonymous BRAZIL S?O PAULO S?O PAULO 255:00:44 80 High Anonymous EGYPT - - 255:00:44 80 High Anonymous CHINA BEIJING BEIJING 255:01:45 80 High Anonymous - - - 255:03:49 8118 High Anonymous - - - 255:03:49 80 High Anonymous UNITED STATES TEXAS FT. WORTH 255:04:50 80 High Anonymous GERMANY - - 255:05:51 8080 High Anonymous INDIA MADHYA PRADESH INDORE 255:05:51 80 High Anonymous NIGERIA - - 255:06:53 4263 High Anonymous - - - 255:07:55 80 High Anonymous UNITED STATES VIRGINIA MC LEAN 255:07:55 8080 High Anonymous UNITED KINGDOM - - 255:08:56 80 High Anonymous - - - 255:08:56 80 High Anonymous FRANCE ALSACE STRASBOURG 255:09:57 80 High Anonymous SPAIN - - 255:13:01 443 High Anonymous SWEDEN - - 255:13:01 6745 High Anonymous UNITED KINGDOM - - 255:15:03 8080 High Anonymous UNITED STATES TEXAS SAN ANTONIO 255:15:03 80 High Anonymous - - - 255:15:03 80 High Anonymous - - - 255:17:05 80 High Anonymous INDIA DELHI DELHI 255:20:09 1998 High Anonymous - - - 255:20:31 80 High Anonymous CHINA BEIJING BEIJING 255:21:10 18186 High Anonymous CHINA BEIJING BEIJING 255:22:44 80 High Anonymous RUSSIAN FEDERATION - - 255:24:13 8909 High Anonymous CHINA - - 255:24:13 8080 High Anonymous CHINA SHANDONG SHANGHAI 255:26:15 8080 High Anonymous - - - 255:27:08 8080 High Anonymous - - - 255:28:08 8909 High Anonymous - - - 255:28:18 8080 High Anonymous AUSTRIA WIEN VIENNA 255:29:19 80 High Anonymous KUWAIT - - 255:29:19 80 High Anonymous VENEZUELA DISTRITO FEDERAL CARACAS 255:29:19 8080 High Anonymous KOREA, REPUBLIC OF - - 255:31:21 80 High Anonymous POLAND - - 255:31:21 80 High Anonymous GERMANY - - 255:32:22 80 High Anonymous BRAZIL S?O PAULO S?O PAULO 255:32:22 8080 High Anonymous - - - 255:32:22 80 High Anonymous KAZAKHSTAN - - 255:32:22 8080 High Anonymous VENEZUELA - - 255:32:22 80 High Anonymous - - - 255:32:22 80 High Anonymous - - - 255:32:22 2000 High Anonymous INDONESIA - - 255:32:22 80 High Anonymous - - - 255:32:22 80 High Anonymous - - - 255:32:22 80 High Anonymous - - - 255:32:22 8088 High Anonymous UKRAINE MISTO KYYIV KIEV 255:32:22 8080 High Anonymous KENYA - - 255:32:22 80 High Anonymous - - - 255:32:22 80 High Anonymous - - - 255:32:22 8090 High Anonymous CHINA BEIJING HENAN 255:32:22 80 High Anonymous BOLIVIA - - 255:32:22 8090 High Anonymous CHINA GUANGDONG GUANGZHOU 255:32:22 Source
  4. As a Chinese living outside of China, I frequently visit Chinese websites, many of which use advertising and visitor tracking provided by Baidu, the largest search engine available in China. As I was browsing one of the most popular Chinese infosec community in China, zone.wooyun.org, at around 12:00pm GMT+8, my browser suddenly started to pop up JS alerts every 5 seconds. Baidu’s traffic hijacked to DDoS GitHub.com | Insight-labs
  5. China finally admits it has special cyber warfare units — and a lot of them. From years China has been suspected by U.S. and many other countries for carrying out several high-profile cyber attacks, but every time the country strongly denied the claims. However, for the first time the country has admitted that it does have cyber warfare divisions – several of them, in fact. In the latest updated edition of a PLA publication called The Science of Military Strategy, China finally broke its silence and openly talked about its digital spying and network attack capabilities and clearly stated that it has specialized units devoted to wage war on computer networks. An expert on Chinese military strategy at the Center for Intelligence Research and Analysis, Joe McReynolds told TDB that this is the first time when China has explicit acknowledged that it has secretive cyber-warfare units, on both the military as well as civilian-government sides. CHINESE CYBER WARFARE UNITS According to McReynolds, China has three types of operational military units: Specialized military forces to fight the network -- The unit designed to carry out defensive and offensive network attacks. Groups of experts from civil society organizations -- The unit has number of specialists from civilian organizations – including the Ministry of State Security (its like China’s CIA), and the Ministry of Public Security (its like FBI) – who are authorized to conduct military leadership network operations. External entities -- The unit sounds a lot like hacking-for-hire mercenaries and contains non-government entities (state-sponsored hackers) that can be organized and mobilized for network warfare operations. According to experts, all the above units are utilized in civil cyber operations, including industrial espionage against US private companies to steal their secrets. CHINESE CYBER UNIT 61398 In 2013, American private security firm Mandiant published a 60-page report that detailed about the notorious Chinese hacking group 'Unit 61398', suspected of waging cyber warfare against American companies, organizations and government agencies from or near a 12-story building on the outskirts of Shanghai. The UNIT 61398 also targeted a number of government agencies and companies whose databases contain vast and detailed information about critical United States infrastructure, including pipelines, transmission lines and power generation facilities. MOST WANTED CHINESE HACKERS Last year, the United States filed criminal charges against five Chinese military officials, named Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui, for hacking and conducting cyber espionage against several American companies. The alleged hackers were said to have worked with the PLA’s Unit 61398 in Shanghai. Among spying on U.S companies and stealing trade secrets, they had also accused for stealing information about a nuclear power plant design and a solar panel company’s cost and pricing data. Source
  6. Recently a mobile-security firm Bluebox claimed that the brand new Xiaomi Mi4 LTE comes pre-installed with spyware/adware and a "forked" vulnerable version of Android operating system on top of it, however, the company denies the claim. Xiaomi, which is also known as Apple of China, provides an affordable and in-budget smartphones with almost all features that an excellent smartphone provides. On 5th March, when Bluebox researchers claimed to have discovered some critical flaws in Mi4 LTE smartphone, Xiaomi issued a statement to The Hacker News claiming that "There are glaring inaccuracies in the Bluebox blog post" and that they are investigating the matter. RESEARCHERS GET TROLLED BY CHINESE SELLERS Now, Xiaomi responded to Bluebox Labs by preparing a lengthy denial to their claims and said the new Mi4 smartphone purchased by Bluebox team in China (known as the birthplace of fake smartphones) was not an original Xiaomi smartphone but a counterfeit product. This means, Mi4 LTE smartphone owned by Bluebox are tempered by the local Chinese shops itself. What the Heck! Chinese get trolled by Chinese. XIAOMI DECLINES BLUEBOX CLAIMS Xiaomi provided a detailed step-by-step explanation on each and every fact and figure: Hardware: Xiaomi hardware experts have analysed the internal device photos provided to the company by Bluebox and confirmed that the physical hardware is markedly different from the original Mi 4 smartphone. IMEI number: Xiaomi after-sales team has confirmed that the IMEI on the device from Bluebox is a cloned IMEI number which has been previously used on other counterfeit Xiaomi devices in China. Software: Xiaomi MIUI team has also confirmed that the software installed on the device from Bluebox is not an official Xiaomi MIUI build. The company assured its customers that their devices neither come rooted, nor have any malware pre-installed. Contrary to Bluebox claims, the company also assured its customers that the MIUI used in their products is true Android, which means MIUI follows exact Google's Android CDD (Compatibility Definition Document), and passes all Android CTS tests to make sure a given device is fully Android compatible. Declining to Bluebox finding, Xiaomi released the following statement in an email to The Hacker News: Source
  7. Beijing has rejected President Obama's criticism of its plan to make tech companies put backdoors in their software and share their encryption keys if they want to operate in China. On Monday, Mr Obama told the Reuters news agency he had "made it very clear" China had to change its policy if it wanted to do business with the US. But Beijing said it needed the powers to combat terrorism and tackle leaks. It also suggested the West was guilty of having double standards. "The legislation is China's domestic affair, and we hope the US side can take a right, sober and objective view towards it," said Chinese foreign ministry spokeswoman Hua Chunying. "On the information-security issue, there was a [recent] media revelation that a certain country embedded spying software in the computer system of another country's Sim card maker, for surveillance activities. This is only one out of the recently disclosed cases. "All countries are paying close attention to this and taking measures to safeguard their own information security, an act that is beyond any reproach." The case she was referring to involved allegations that US cyber-spies had hacked a Dutch Sim card manufacturer in order to help decrypt their targets' communications. At another press conference, parliamentary spokeswoman Fu Ying drew attention to the fact that the US government had imposed restrictions on Chinese companies including Huawei and ZTE. And she suggested that Beijing's proposals were in line with the same kind of access to internet correspondence sought by the US and British governments. "We will definitely continue to listen to extensive concerns and all the parties' views, so we can make the law's formulation more rigorous," she added. The rules are part of a proposed counter-terrorism law set to be discussed by China's annual parliament session, the National People's Congress (NPC), which opens on Thursday. 'Paranoid espionage' President Obama's comments had followed the publication of a fresh draft of the proposed law, which was made public last week. It "would essentially force all foreign companies, including US companies, to turn over to the Chinese government mechanisms where they can snoop and keep track of all the users of those services", the US leader said. "As you might imagine tech companies are not going to be willing to do that," he added. Microsoft, Cisco, Oracle and IBM are among firms that would potentially be affected. While the comments by Chinese officials were measured, the government's press service, Xinhua, was more critical. It accused the US leader of arrogance and hypocrisy, noting that the FBI had criticised Apple and Google last year for building encryption into their smartphone operating systems, and again drew attention to allegations about the US National Security Agency's activities made public by the whistleblower Edward Snowden. "With transparent procedures, China's anti-terrorism campaign will be different from what the United States has done: letting the surveillance authorities run amok and turn counter-terrorism into paranoid espionage and peeping on its civilians and allies," Xinhua wrote. "Contrary to the accusations of the United States, China's anti-terror law will put no unfair regulatory pressures on foreign companies, because the provisions will apply to both domestic and foreign firms." Insecure systems The Conservative party has indicated it wants to expand the UK's cyber-spies' surveillance powers it if wins the May election. US firms, including Microsoft, are hoping to boost profits by selling their services to China "Our manifesto will make clear that we will... use all the legal powers available to us to make sure that, where appropriate, the intelligence and security agencies have the maximum capability to intercept the communications of suspects while making sure that such intrusive techniques are properly overseen," Home Secretary Theresa May told Parliament in January. One expert said it should be no surprise that the West was finding it difficult to prevent China seeking greater cyber-surveillance powers of its own, but added there were good reasons to fear its proposals. "Either behind the scenes or increasingly openly, the US and UK are justifying similar behaviour for their own purposes, but are extremely concerned when China asks for its own capabilities," said Dr Joss Wright, from the Oxford Internet Institute. "But what we don't want to see is a world in which internet-based products and services are riddled with backdoors by every state that says it needs to act against terrorism. "A backdoor is always a concern because the moment it can be exploited, you have an insecure system by default, and that could make everyone less safe." Source
  8. Chinese hackers have launched a wave of man-in-the-middle (MITM) attacks capable of stealing emails, contacts and passwords is targeting Microsoft Outlook users in the country. Greatfire.org, a group that reports on and works to combat Chinese government online censorship and surveillance, reported uncovering the campaign this week. "On January 17, we received reports that Microsoft's email system, Outlook (which was merged with Hotmail in 2013), was subjected to a MITM attack in China," read the Greatfire threat advisory. "This form of attack is especially devious because the warning messages users receive from their email clients are much less noticeable than the warning messages delivered to modern browsers." The attack reportedly uses a bogus certificate to push a malicious alert to Outlook users that siphons information from the victim's account if it is opened. "Users will only see an abrupt pop-up warning when the client tries to automatically retrieve messages. Users will then be able to tap on a 'continue' button and ignore the warning message," explained the advisory. "If users do click on the 'continue' button, all of their emails, contacts and passwords will be logged by the attackers." The number of affected Outlook users remains unknown, although a Microsoft spokesperson confirmed to V3 that the firm is aware of the attacks. "We are aware of a small number of customers impacted by malicious routing to a server impersonating Outlook.com. If a customer sees a certificate warning, they should contact their service provider for assistance," they said. Greatfire believes that the Chinese government is responsible for the attacks, citing similarities to previous attacks it believed were state sponsored. "Because of the similarity between this attack and previous, recent MITM attacks in China on Google, Yahoo and Apple, we once again suspect that Lu Wei and the Cyberspace Administration of China have orchestrated this attack," it said. "If our accusation is correct, this new attack signals that the Chinese authorities are intent on further cracking down on communication methods that they cannot readily monitor." The attack on Apple's iCloud occurred at the end of 2014 and was serious enough for CEO Tim Cook to fly to China. F-Secure security advisor Sean Sullivan told V3 that the Outlook attacks follow a similar pattern to the iCloud campaign and warned business users visiting China to be extra cautious. "This case appears similar to the move against iCloud back in October. Any business person travelling or working in China should use a VPN (or other measures) to access their email - or else pay very careful attention to warning messages," he said. "If you're doing business in China, be very mindful of the situation. I'd even recommend using separate hardware for the trip." Jason Steere, director of technology strategy at FireEye, mirrored Sullivan's sentiment, pointing out that, even if focused on monitoring Chinese citizens alone, the attacks could cause trouble for Western professionals visiting the country. "I suspect this attack is more about gathering intel on Chinese citizens - using international mail systems to communicate information that they could not do with a Chinese web platform due to censorship," he told V3. "However, many other people are collateral damage with information exposed that I'm sure they would prefer not to be picked up. "Anything sent or received, such as usernames, passwords, holidays, journalist sources, new stories, personal information etc, would all have been exposed during the time of the attack. "All of that information can be collected and used for intel, surveillance etc." The attack on Outlook comes less than a month after Chinese authorities began blocking local access to Google services including Gmail. Prior to the Google blockade the Beijing government mounted a mass censorship campaign that cut off access to thousands of websites, applications and cloud services in November 2014. Source
  9. The Twitter accounts of the New York Post and United Press International (UPI) have been hacked with fake tweets on economic and military news. In one post, the Pope was quoted on UPI's Twitter feed as saying that "World War III has begun". Meanwhile, the New York Post's account said that hostilities had broken out between the United States and China. It is the latest hack of a high-profile social media account, four days after US military command was compromised. UPI, which is based in Washington, confirmed in a statement that both its Twitter account and news website had been hacked. Six fake headlines were posted on its Twitter account and a breaking news banner was added to a fake story about the Federal Reserve on its homepage, the statement added. A tweet on the New York Post's account said the USS George Washington, an aircraft carrier, was "engaged in active combat" against Chinese warships in the South China Sea. A Pentagon official said the tweet about hostilities with China was "not true", AFP reports. The tweets have all since been deleted. The New York Post says it is investigating the hack. It comes just days after US President Barack Obama unveiled proposals to strengthen cyber security laws after a spate of attacks on high-profile US targets, including the Pentagon Twitter feed and Sony Pictures. The Twitter account of the US military command was suspended last Monday following an attack by hackers claiming to support Islamic State. In November hackers also released reams of confidential data stolen from Sony Pictures, and in recent years cyber criminals have attacked other US companies such as Home Depot and Target. A number of media organisations, including AFP and the BBC, have also been subjected to cyber attacks over the past two years. Source
  10. By Anna Leach After China, the world’s biggest source of global data theft comes from inside the European Union, said a report published Tuesday. Verizon Communications Inc.’s Data Breach Report 2013 found that more than a quarter of the world’s data thieves operated in Romania. Some 28% of the hackers behind 47,000 data breaches investigated by Verizon were working from Romania. That was second only to China with 30%. By contrast only 18% of data thieves were acting out of the U.S. said the company. In a wide-ranging report, Verizon found that the majority of data thieves are not high-tech espionage agents, but rather petty criminals hacking for money and using rudimentary skills. Three quarters of all data thefts analyzed were financially-motivated and less than 1% used techniques that Verizon classed as high-tech. The focus on cash not politics meant that private businesses, not government, were the main target, with under 5% of attacks analysed targeting the public sector. Data thieves took all sorts of corporate information, said Verizon’s global investigation manager Dave Ostertag. “Thieves steal corporate information for a variety of purposes,” he said. “If you steal quarterly earnings statements prior to announcement, that has value to someone. If you have a process that your competitors don’t have — that process makes you more efficient or you have a larger market share because of that process, that has value.” The theft of intellectual property has become an increasing problem, especially for small business in the technology and science sectors: “Smaller companies used to say ‘we don’t have to worry about a data breach’, that’s not true any more,” said Mr. Ostertag. “When we look at espionage, it’s not just defense contractors and the government, it’s boutique engineering firms that might specialize in say aerospace, or might specialize in undersea [engineering], with maybe a hundred employees or less. These type of companies are victims too. “It might be a small firm that’s got a piece of information that might be valuable to a competitor or to a state.” Even when hacking is state-affiliated — and 19% is according to the report — it may be targeting a private business for commercial purposes rather than state bodies. Verzion’s Data Breach Report 2013 is based on 47,000 incidents investigated by their security arm Verizon Risk for their clients in 2012. Some 621 breaches were analyzed in more detail. The report also draws in data from Verizon’s 19 partners on the report including the Danish Intelligence Service, Carnegie Mellon University, Deloitte and the U.S. Department of Homeland Security. The source: After China, Romania is Biggest Source of Data Theft Says Report - Tech Europe - WSJ Hai ca stiu ca poti. Inca putin si locul 1 e doar al tau. Romania nu duce lipsa de "baieti" si asta se vede!
×