• Thursday
  • September 18, 2014
  • Last updated: 2:43pm
Hong Kong




Search Results

Results 1 - 10 of 183 for cyber espionage

Related topics matching your search

Search results

  1. Steps to keep viruses, worms and Trojan horses at bay

    Posted Nov 22nd 2010, 12:00am by Neil Runcieman

    ... by a sucker punch from any one- or combination- of those three cyber instruments of mischief, malevolence and malefaction is the computing equivalent of turning your back for 30 seconds on a briefcase ... the defence that only they are inconvenienced in the event of a cyber-attack are deluding themselves: cyber-criminals can hijack pre-invaded computers and networks of computers to act as repositories ...

  2. No thrills, but spy saga a timely reminder

    Posted Jul 10th 2010, 12:00am by Staff Reporter

    ... by the latest counter-espionage coup. Ten Russian agents have returned home in a spy swap after living seemingly ordinary suburban lives as couples in the US, with jobs, garden homes, cars and even ... blend of cold war spycraft, including invisible ink and buried money, and cyber-age technology, such as coded internet texts and laptops with special software that swapped messages as agents ...

  3. ICAC's questionable acts under fire for years

    Posted Nov 20th 2010, 12:00am by Martin Wong

    ... Martin Wong The ICAC has been at the forefront of the fight against corruption in the city for more than three decades. But it has often used controversial tactics in its pursuit of graft suspects, at times prompting criticism from the courts. In the most ...

  4. Chain of commands

    Posted Sep 26th 2010, 12:00am by Paul Moon, Paul Mooney

    ... of deniability'. Since last year, IWM has published two reports on cyber-espionage networks: 'Tracking GhostNet: Investigating a Cyber Espionage Network' and 'Shadows in the Cloud: An investigation into cyber espionage 2.0.' GhostNet is the name investigators have given to a network of more than 1,200 compromised computers in 103 countries, including foreign affairs ministries, ...

  5. American report takes lid off China's hacking capital

    Posted Mar 26th 2010, 12:00am by Staff Reporter

    ... connections the company processed. The report, titled 'The Nature of Cyber Espionage,' said more than a quarter of those targeted attacks- described as malicious e-mails sent in small ... Bien Perez An in-depth study by a US-based internet security firm has revealed that there may be more targeted cyber attacks originating from China than previously uncovered. Analysts ...

  6. Code breaking

    Posted Jun 09th 2010, 12:00am by Chris King

    ... Compiled by Chris King Speaking in riddles If you have something to tell someone and you don't want anyone else to know what it is, you can use a code. A code is information that has been disguised. You need a 'key' to work out what it mean ...

  7. Surveillance watchdog review long overdue

    Posted Dec 03rd 2010, 12:00am by Staff Reporter

    ... In 2006 Hong Kong was on the verge of a constitutional crisis after the courts expressed outrage over the lack of legal procedures regulating wiretaps and covert surveillance, sparking a chaotic few months as the government rushed a bill through the legis ...

  8. Leaks could wreck trust in governments, Chinese experts say

    Posted Nov 30th 2010, 12:00am by Ivan Zhai

    ... Ivan Zhai Chinese diplomacy and international relations experts described the release of classified US embassy cables from the whistle-blowing website WikiLeaks as a 'diplomatic September 11', with the potential impact on Chinese diplomacy still ...

  9. Lost moral high ground in the 'war on terror'

    Posted Nov 02nd 2010, 12:00am by Staff Reporter

    ... Last month, the United States received praise from international human rights organisations for invoking the Leahy agreement- a law named after a Democratic senator which forbids military assistance to foreign armed forces suspected of committing, encoura ...

  10. Long battle promised to stamp out cyber dissent

    Posted Dec 31st 2010, 12:00am by Shi Jiangtao

    ... Shi Jiangtao in Beijing Cyber security remains a major challenge for mainland authorities, who often find themselves caught in a dilemma between clamping down on increasingly vocal ... Analysts said such crackdowns were often carried out on the pretext of protecting minors from cyber pornography, combating internet viruses and fraud, or other content deemed unhealthy. The number ...




SCMP.com Account