Feeds

China outraged by US cyberspying fingering

'Well, I never!' – indignant Chinese official

Internet Security Threat Report 2014

China is none too impressed with being fingered by the US as a major source of cyber espionage.

The Office of the National Counterintelligence Executive (ONCIX) reported to Congress yesterday that both China and Russia were home to spies who hacked into US government and business networks to get access to its economic super-secrets.

The report did admit that just because an attack had come from an IP address within a country didn't mean you could necessarily say that country was responsible, but the naming and shaming nonetheless annoyed Beijing.

A Chinese Foreign Ministry spokesman scorned the report in a daily news briefing today and said China wanted to help with cyber-security as much as the next country.

"Online attacks are notable for spanning national borders and being anonymous. Identifying the attackers without carrying out a comprehensive investigation and making inferences about the attackers is both unprofessional and irresponsible," Hong Lei said, according to a Reuters report.

"I hope the international community can abandon prejudice and work hard with China to maintain online security," Hong added.

According to the report, "US corporations and cyber-security specialists" have reported an "onslaught of computer network intrusions originating from IP addresses in China", and they often allege that Chinese companies or the government are behind these attacks.

However, it acknowledges that the "intelligence community has not been able to attribute many of these private sector data breaches to a state sponsor", often because the incident isn't reported until ages after it has happened. ®

Intelligent flash storage arrays

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.