Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Computing
DDoS Protection Powered By Verisign
Average Rating:
Rate this article:  
China Denies Its Army Is Behind Hack Attacks

China Denies Its Army Is Behind Hack Attacks
By Jennifer LeClaire

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

"Attribution is, of course, very difficult to obtain for cyber-attacks, which can be routed through compromised servers around the world," said security expert Richard Wang. "While the Chinese deny the claims in the Mandiant report, it would be naive to assume that any major government, Eastern or Western, has not extended its espionage capabilities."
 



The New York Times and The Wall Street Journal are pointing fingers of accusation at China in the wake of hacking incidents. China is pointing back.

China is responding to a damaging report from security firm Mandiant. The report suggests APT1, a prolific cyber-espionage group that has conducted attacks on a number of victims since at least 2006, is likely sponsored by the Chinese government and is one of the most persistent of China's threat actors.

Groundless Criticism?

Ministry of National Defense spokesman Geng Yansheng said China had been the victim of cyber-attacks that have originated in the United States, and that Mandiant mischaracterized China's activities, according to a New York Times report.

"Chinese military forces have never supported any hacking activities," Geng said at a press briefing. "The claim by the Mandiant company that the Chinese military engages in Internet espionage has no foundation in fact."

Hong Lei, a spokesman for China's Foreign Ministry, also briefed the press on Tuesday. According to China.org.cn, he said cyber-crime is an international problem and should be solved through international cooperation on the basis of mutual trust and respect.

"Groundless criticism is irresponsible and unprofessional, and it will not help to solve the problem," he said. "China has called on the international community to make a code of conduct for cyberspace on the basis of the submission and make joint efforts to build a peaceful, secure, open and cooperative cyberspace."

Who's Naive Now?

So who is right? Are U.S. companies overreacting or is China covering secret operations against the U.S.? Or both?

Richard Wang, manager at SophosLabs U.S., said Mandiant put together a convincing case that one of the cyber-attack groups it follows is linked to the Chinese government.

"Attribution is, of course, very difficult to obtain for cyber-attacks, which can be routed through compromised servers around the world," he said. "While the Chinese deny the claims in the Mandiant report, it would be naive to assume that any major government, Eastern or Western, has not extended its espionage capabilities into the online realm."

Meanwhile, he continued, it is important to remember that although the report mentions a significant number of attacks over several years, that is tiny compared with the thousands of attacks daily from common cyber-criminals.

"Advanced persistent threats (APTs) are comparatively few and far between. If you are in a high-risk industry such as aerospace or defense, or tasked with securing government systems, then APTs should be on your list of concerns," Wang said. "However, for less frequently targeted industries, focusing too much on APT at the expense of your day-to-day network security is not a wise strategy."
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Computing
1.   UPS Stores Hit by Data Breach
2.   Acer Desktop Box Rides Chrome Wave
3.   VMware Buys CloudVolumes' V-Apps
4.   Feds OK IBM-Lenovo x86 Server Deal
5.   Target Data Breach Cost: $148 Million


advertisement
China Puts Microsoft Under the Lens
Official anti-monopoly probe launched.
Average Rating:
Feds OK IBM-Lenovo x86 Server Deal
Makes Lenovo a player for data centers.
Average Rating:
Acer Desktop Box Rides Chrome Wave
Chromebox targets schools, small biz.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Find Malicious Android Apps Can Hack Gmail
A new study just out shows that a weakness in the Android as well as the Windows Phone and Apple's iOs mobile operating systems can be used to steal sensitive, personal information from users.
 
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 

Mobile Technology Spotlight
Screen Shortage Briefly Puts Brakes on iPhone 6
RAM? Check. Antenna switch? Check. Screen? Oops. Parts suppliers for Apple have found themselves facing a shortage of screens for the new iPhone 6 as next month's release date for the new smartphone looms.
 
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 
Samsung, B&N Target Amazon with Nook Tablet
They've seen the enemy and it is Amazon. So Samsung and Barnes & Noble are teaming up to combat their common foe with a 7-inch tablet that blends Samsung’s tech, Nook’s content and e-reader platform.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.