• Wednesday
  • October 22, 2014
  • Last updated: 11:59am
Hong Kong

Humidity 

UV 

Pollution 

Search Results

Results 1 - 10 of 360 for cyber espionage

Related topics matching your search

Search results

  1. Lifestyle - Technology - INTERNET SECURITY

    Ins and outs of a hacker's life is as dull as office work

    Posted Apr 21st 2013, 12:00am by STEPHEN THOMPSON

    ... China's efforts to collect intelligence and intellectual property seem to be greater than other countries, say cyber experts. Hackers advertise services including the sale of virtual assets, ...

    http://www.scmp.com/lifestyle/technology/article/1219329/ins-and-outs-hackers-life-dull-office-work
  2. Telecoms chief rejects cyber-attack claims

    Posted Oct 19th 2007, 12:00am by Shi Jiangtao

    ... Shi Jiangtao in Beijing A senior telecommunications official said that computer hackers- not their home countries- should be blamed for rampant cyber-attacks around the globe, and that the mainland's internet security has also been undermined by internet espionage. Information Industry Vice-Minister Lou Qinjian said yesterday on the sidelines of the 17th party congress ...

    http://www.scmp.com/article/612107/telecoms-chief-rejects-cyber-attack-claims
  3. New tactics to defeat cyber criminals

    Posted Mar 15th 2011, 12:00am by Chris Davis

    ... avenues for cyber attacks. As criminals step up their efforts to target smartphones and computer systems with hidden malware, Hong Kong's Computer Emergency Response Team (CERT) has been ... area where CERT expects to see cyber criminals step up activities. 'The basic goals of social engineering are the same as implanting malware. The aim is to gain unauthorised access ...

    http://www.scmp.com/article/740927/new-tactics-defeat-cyber-criminals
  4. Steps to keep viruses, worms and Trojan horses at bay

    Posted Nov 22nd 2010, 12:00am by Neil Runcieman

    ... by a sucker punch from any one- or combination- of those three cyber instruments of mischief, malevolence and malefaction is the computing equivalent of turning your back for 30 seconds on a briefcase ... the defence that only they are inconvenienced in the event of a cyber-attack are deluding themselves: cyber-criminals can hijack pre-invaded computers and networks of computers to act as repositories ...

    http://www.scmp.com/article/731245/steps-keep-viruses-worms-and-trojan-horses-bay
  5. Vulnerable companies should step up defences

    Posted Sep 05th 2011, 12:00am

    ... Network Box's real-time PUSH update technology provides round-the-clock monitoring and dedicated remote management, which protects against known and unknown cyber threats. Categories ...

    http://www.scmp.com/article/978146/vulnerable-companies-should-step-defences
  6. Cyberspace 'chaos' is scaring off business

    Posted Nov 30th 2004, 12:00am by Stuart Biggs

    ... for legitimate users and causing companies billions in lost business, according to a former White House counter-terrorism and cyber security chief. Richard Clarke, author of Against All Enemies, believes ... suggested that regular hackers involved in industrial espionage and denial-of-service attacks posed a more imminent threat in cyberspace than terrorists. 'Terrorists do [conduct] reconnaissance ...

    http://www.scmp.com/article/480098/cyberspace-chaos-scaring-business
  7. Beijing denies computer espionage

    Posted Apr 01st 2009, 12:00am by Staff Reporter

    ... Kristine Kwok Beijing dismissed reports of a mainland-based computer espionage network yesterday, calling them rumours spread by 'cold war ghosts' infected by the 'China threat' virus. Foreign Ministry spokesman Qin Gang was responding to a study which alleged that some mainland-based hackers had infiltrated computers of governments and private offices around ...

    http://www.scmp.com/article/675375/beijing-denies-computer-espionage
  8. Lifestyle - Technology - INTERNET

    Former USSR internet domain a haven for cyber-criminals

    Posted Jun 02nd 2013, 12:51am by AP

    ... Raphael Satter Former Soviet Union domain name has become a major haven for hackers and cyber-criminals The 'evil empire' is alive and living in cyberspace The Soviet Union ... counterpart. The Soviet domain has "lots of problems", Group-IB's Andrei Komarov said. "In my opinion more than half of cyber-criminals in Russia and former USSR use it." ...

    http://www.scmp.com/lifestyle/technology/article/1251688/former-ussr-internet-domain-haven-cyber-criminals
  9. Appeal to defend 'cyber sovereignty'

    Posted Jun 04th 2011, 12:00am

    ... Stephen Chen binglin.chen@scmp.com Two People's Liberation Army researchers have compared cyber warfare with nuclear warfare and described cyber defence as a crucial component of national defence. Ye Zheng and Zhao Baoxian, researchers at the PLA's Academy of Military Sciences, wrote in an article about cyber warfare in China Youth Daily yesterday that China would call ...

    http://www.scmp.com/article/969628/appeal-defend-cyber-sovereignty
  10. Freedom at the heart of cyber law battles

    Posted May 17th 2012, 12:00am

    ... that hold a citizen's private information can share it with one another or the government for cyber-security purposes. Firms sharing information would get complete liability protection: ... for any lawful purpose so long as there is a significant cyber security or national security purpose. The programme is permanent and will be reviewed only annually by the inspector general ...

    http://www.scmp.com/article/1001217/freedom-heart-cyber-law-battles

Pages

Login

SCMP.com Account

or