Report: Google, Intel among Chinese hacker targets
- 14 December, 2011 10:34
Cyberspies from China have hit 760 companies, research institutions, ISPs and government agencies over the past decade, according to a Bloomberg article published Tuesday.
YEAR IN REVIEW: 2011's biggest security snafus
The Bloomberg story names a range of possible industrial espionage victims of China-based computer hacking, including technology companies such as Intel, HP, Yahoo and Salt Lake City-based iBahn, whose network services international travelers. Also on the list: Xerox division Associated Computer Systems, Volkswagen, Innovative Solutions & Support, MIT, the Italian Academic and Research Network, the California State University Network and Boston Scientific. The Bloomberg article also mentions Google, which in 2010 itself publicly disclosed an attack it indicated was likely tied to China.
The Bloomberg article doesn't detail the exact source of its information, other than to allude to "a senior U.S. intelligence officer." One named source for the article, Dmitri Alperovitch, head of his own firm Asymmetric Cyber Operations, says hackers launching a cyberattack from China broke into South Korean steel company POSCO in July 2006 at the time of a large business transaction related to a steel mill in China.
Additional allegedly hacked companies listed by Bloomberg but not attributed to named sources other than "intelligence data" include Danish technology company Thrane & Thrane, Abbott Laboratories, Wyeth (now part of Pfizer), Parkland Computer Center in Rockville, Md., Cypress Semiconductor, Research in Motion, Aerospace Corp. and Environmental Systems Research Institute.
Read more about wide area network in Network World's Wide Area Network section.
- Smart Cloud: Move Beyond monitoring to Holistic Management of Application Performance
- New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (Sponsored by McAfee)
- Cloud and Co-Location Solutions
- Choice and Control: Considerations for Developing Enterprise Cloud Strategies
- McAfee Whitepaper: Building the Business Case for Privacy
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- Are we ready for a mobile-first world?
- Smartphone chips could replace server processors in HPC, researchers say
Attack on Telenor was part of large cyberespionage operation with Indian origins: report
Box buys iOS app to improve its own
Growing mobile malware threat swirls (mostly) around Android
Barracuda Networks raises free capacity of Copy.com to 15GB
Coke gives peace a chance ( +16 photos)