CariDotMy

 Forgot password?
 Register

ADVERTISEMENT

View: 2176|Reply: 7

NEWS : Germany Attacks China For Starting the Cyber-War!

[Copy link]
Post time 23-10-2007 08:58 PM | Show all posts |Read mode
- China tries to steal information using spyware programs

Thisis a pretty serious piece of accusation coming from Germany as HansElmar Remberg, vice president of the German Office for the Protectionof the Constitution, said in a conference that the Chinese authoritiestried to steal information using spyware programs installed on theircomputers. Besides the traditional spying methods, the Chinese government attacksGermany's computers every one or two days, the official sustainedaccording to Reuters. There were numerous security attacks over theGerman computers in the recent period, the local government claimingthe Chinese authorities are interested in obtaining details about theirministries.

"In our view, state Chinese interests stand behind these digitalattacks. Supporting this view is the intensity, structure and scope ofthe attacks, and above all the targets, which include (German)authorities and companies. Some people call this the Chinese cyber war.Across the world the People's Republic of China is intensivelygathering political, military, corporate-strategic and scientificinformation in order to bridge their technological gaps as quickly aspossible," Hans Elmar Remberg said for Reuters.

According to the German official, the Chinese authorities use Trojanhorses to invade their computers but they also rely on maliciouswebsites which attempt to hack the ministries' systems.

However, it seems like the Chinese government is not the only one whichtries to obtain secret information about Germany. Several othercountries such as Russia, Iran and Pakistan use traditional and digitalespionage to discover details about the German military system oreconomy.

"Russian intelligence agencies are making great efforts in Germany toget important information in the military fields, politics, economy andscience, using both open and conspiratorial methods," Remberg said forthe same source mentioned above. "The diplomatic representative officesand Chinese media agencies in Germany enable the hidden deployment ofintelligence agents."

http://news.softpedia.com/news/G ... ber-War-68994.shtml


[ Last edited by  bzzts at 23-10-2007 09:21 PM ]
Reply

Use magic Report


ADVERTISEMENT


Post time 23-10-2007 09:22 PM | Show all posts
ari tu china try hack pentagon. mmg berjaya. dan china tak curi file apa2. cuma saja nk bgtau diorang MAMPU.

tengok la nnt cemana GERMAN lawan CHINA ni sapa lagi terer...
Reply

Use magic Report

 Author| Post time 23-10-2007 10:23 PM | Show all posts

Reply #2 bzzts's post

meha rasa kalau China ni hack malaysia mesti petik jari je tapi kalau Indonesia mesti susah sikit meha ada terbaca kat satu article yang kat indonesia ni banyak expert kat sana
Reply

Use magic Report

 Author| Post time 24-10-2007 07:16 PM | Show all posts

United States

- When it comes to spam attacks

Securitycompany Sophos rolled out the report concerning the spam evolution inthe third quarter of the year, revealing that the United States won thefirst position with 28.4 points. This means that "almost one in threeof all the world's spam emails is being sent through a compromised US computer." SouthKorea comes in second place with a 5.2 percentage while China(including Hong Kong) is the third with 4.9 percent. The othercountries are Russia, Brazil, France and Germany. The last placesreveal that Romania with 2.3 percent and Mexico with 1.9 percent arethe countries which also sent a considerable amount of spam messages.

"It seems as though a major American spammer is arrested every otherweek at the moment, but despite these high-profile lawbreakers beingput away, the US continues to relay far more spam than any other nationon the planet," said Carole Theriault, senior security consultant atSophos.

"This level of activity can't be attributed solely to the slickoperations of a few cash-hungry criminals. The problem is there arethousands of spammers using many thousands of compromised zombiecomputers in the US. The only way we're going to reduce the problem isif US authorities invest a lot more in educating computer users of thedangers, while ensuring ISPs step up their monitoring efforts toidentify these compromised machines as early as possible."

The spam messages have always been a problem for the Internet consumersbecause every time a new campaign is started, thousands or evenmillions of unsolicited emails invade everyone's inbox. Even if a lotof companies designed more or less powerful spam filters, the spammersmanage to bypass them every time using latest generation techniqueswhich seem to become more and more dangerous for our emailcommunication activities.

For all the results provided by security company Sophos, click on this link.

http://news.softpedia.com/news/United-States-The-Most-Vulnerable-Country-69078.shtml
Reply

Use magic Report

Post time 30-10-2007 09:41 AM | Show all posts

Reply #3 Mehacomp_91's post

malaysia pon banyak expert..
kat porem ni pun ramai..
tapi semua low profile
Reply

Use magic Report

Post time 31-10-2007 09:31 PM | Show all posts
tuan rumah tu terrer.. saje je low profile.. china hack pentagon tu memang best r.. ancaman cyber makin besar... dah jadi cara berperang pulak nanti
Reply

Use magic Report

Follow Us
Post time 1-11-2007 10:32 AM | Show all posts
mane ade negara x de programmer hebat ... malaysia pun ade.. mungkin diorang sume dah keluar negara...
Reply

Use magic Report

Post time 9-11-2007 10:14 AM | Show all posts

Reply #7 metalique's post

ada..lagi dalam negara..
contohnya, aku la tu
Reply

Use magic Report


ADVERTISEMENT


You have to log in before you can reply Login | Register

Points Rules

 

ADVERTISEMENT



 

ADVERTISEMENT


 


ADVERTISEMENT
Follow Us

ADVERTISEMENT


Mobile|Archiver|Mobile*default|About Us|CariDotMy

13-12-2024 04:44 PM GMT+8 , Processed in 0.070062 second(s), 20 queries , Gzip On, Redis On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

Quick Reply To Top Return to the list