Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Computing
Fiercely productive scanners
Average Rating:
Rate this article:  
Why Chinese Hackers Might Be Targeting U.S. Media
Why Chinese Hackers Might Be Targeting U.S. Media

By Jennifer LeClaire
February 3, 2013 8:36AM

    Bookmark and Share
"The New York Times attack -- which apparently is tied to an investigation into the massive accumulation of wealth by one of China's most powerful officials, with the not-so-subtle suggestion that these were ill-gotten gains -- suggests a cause and effect coupled with an unprecedented level of cover-up," said analyst Rob Enderle. "If true, that would be ironic."
 



If the revelation that Chinese hackers infiltrated computer systems at The New York Times -- and stole passwords for employees -- was not disturbing enough, The Wall Street Journal followed up with troubling news of its own.

Indeed, The Journal reported that it also had been hacked. And the paper also pointed a finger at Chinese hackers trying to monitor the publication's China coverage.

The Journal reports that hackers broke into its network through computers in its Beijing bureau. A spokeswoman for Dow Jones & Co., the newspaper's publisher, said the Journal performed a network overhaul to beef up security Thursday.

"Chinese hackers for years have targeted major U.S. media companies with hacking that has penetrated inside newsgathering systems, several people familiar with the response to the cyberattacks said. Tapping reporters' computers could allow Beijing to identify sources on articles and information about pending stories," The Journal said. "Chinese authorities in the past have penalized Chinese nationals who have passed information to foreign reporters."

China Denies Attacks

The New York Times attack is related to China, The Times believes, because of the timing. The attacks came as the paper published an investigative report about the relatives of China Prime Minister Wen Jiabao. Printed Oct. 25, the report detailed how his family had amassed a fortune worth several billion dollars.

"It's part of this overall story that the Chinese want to know what the West thinks of them," Richard Bejtlich, chief security officer with the computer-security company Mandiant Corp., which was hired by The New York Times to investigate its breach, told The Journal. "What slant is the media going to take on them? Who are their sources?"

The Chinese government denies any involvement with the hacks. China's Defense Ministry issued a statement:

"Chinese law forbids hacking and any other actions that damage Internet security. The Chinese military has never supported any hacking activities. Cyberattacks are characterized by being cross-national and anonymous. To accuse the Chinese military of launching cyberattacks without firm evidence is not professional and also groundless."

'Would Be Ironic'

Alex Horan of Core Security told us on Thursday that he believed The New York Times was not the only U.S. target. He was right. For more analysis, we caught up with Rob Enderle, principal analyst at the Enderle Group. He told us increasingly there is a question of both how active the Chinese military's cyber spying efforts are and who actually controls them.

"The New York Times attack -- which apparently is tied to an investigation into the massive accumulation of wealth by one of China's most powerful officials, with the not-so-subtle suggestion that these were ill-gotten gains -- suggests a cause and effect coupled with an unprecedented level of cover-up," Enderle said.

"Now that could be partially because China doesn't want to appear like a country run by criminals but, if true, that would be ironic because getting caught creates the impression that this is exactly what has happened."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Computing
1.   Google Street View Unravels CAPTCHAs
2.   Android Gets Chrome Remote Desktop
3.   IBM Adds Disaster Recovery to SoftLayer
4.   Mark Hurd's 5 Keys to Market Success
5.   How To Beat the Heartbleed Bug


advertisement
Don't Reset Passwords for Heartbleed?
Added caution needed to ensure security.
Average Rating:
Last Fixes Tuesday for XP, Office 2003
Microsoft closing out support for two.
Average Rating:
Tech 101: What Is Open Source?
Foundation of countless applications.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
 
Canadian Teen Arrested for Heartbleed Hack
One week after the OpenSSL Heartbleed vulnerability was unveiled, Canadian authorities have made the first arrest -- a London, Ontario teenager -- connected to exploiting the security hole.
 
IBM Offers Security, Disaster Recovery as SoftLayer Service
New disaster recovery and security services for SoftLayer clients are being added by IBM. Big Blue said the new capabilities will speed cloud adoption by alleviating concern over business continuity.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.
 

Mobile Technology Spotlight
Google Releases Chrome Remote Desktop App for Android
You're out on a sales call, and use your Android mobile device to grab a file you have back at the office on your desktop. That's a bit easier now with Google's Chrome Remote Desktop app for Android.
 
Amazon 3D Smartphone Pics Leaked
E-commerce giant Amazon is reportedly set to launch a smartphone after years of development. Photos of the phone, which may feature a unique 3D interface, were leaked by tech pub BGR.
 
Zebra Tech Buys Motorola Enterprise for $3.45B
Weeks after Lenovo bought Motorola Mobility’s assets from Google for $2.91 billion, Zebra Technologies is throwing down $3.45 billion for Motorola’s Enterprise business in an all-cash deal.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.