• Thursday
  • November 27, 2014
  • Last updated: 7:57pm
Hong Kong

Humidity 

UV 

Pollution 

Refine Your Search

Sort by

Search Results

Results 1 - 5 of 5 for cyber espionage

Search results

  1. News - China - DIPLOMACY

    PLA condemns US as 'the real hacking empire'

    Posted May 08th 2013, 11:25am by Agencies and Minnie Chan

    ... espionage to fuel its military modernisation. The more angry the PLA gets, the more it means the Pentagon's report is professional and accurate Antony Wong Dong, Military Watcher ...

    http://www.scmp.com/news/china/article/1232847/pla-condemns-us-real-hacking-empire
  2. News - World - ESPIONAGE

    US jails Chinese engineer for taking files on missile guidance system to China

    Posted Mar 27th 2013, 12:00am by WASHINGTON POST

    ... cyber operations. But US authorities warn that this type of espionage can be just as damaging to national security and US business. "The reason this technology is on the State Department ... of Representatives committee that he was limiting access to Nasa for the citizens of several countries, including China, pending a full security review. In a classic espionage case, a 59-year-old former army ...

    http://www.scmp.com/news/world/article/1200439/us-jails-chinese-engineer-taking-files-missile-guidance-system-china
  3. Tiger Trap: America's Secret Spy War with China

    Posted Jun 26th 2011, 12:00am

    ... David Wilson Tiger Trap: America's Secret Spy War with China by David Wise Houghton Mifflin Harcourt Beijing poses more of an espionage threat to America than Moscow. That is, if you ... to the People's Republic. Beijing is America's banker, Wise notes. But some US-based Chinese espionage suspects who fall foul of the authorities are prosecuted and convicted. Wise reports ...

    http://www.scmp.com/article/971692/tiger-trap-americas-secret-spy-war-china
  4. Steps to keep viruses, worms and Trojan horses at bay

    Posted Nov 22nd 2010, 12:00am by Neil Runcieman

    ... by a sucker punch from any one- or combination- of those three cyber instruments of mischief, malevolence and malefaction is the computing equivalent of turning your back for 30 seconds on a briefcase ... the defence that only they are inconvenienced in the event of a cyber-attack are deluding themselves: cyber-criminals can hijack pre-invaded computers and networks of computers to act as repositories ...

    http://www.scmp.com/article/731245/steps-keep-viruses-worms-and-trojan-horses-bay
  5. Vulnerable companies should step up defences

    Posted Sep 05th 2011, 12:00am

    ... Network Box's real-time PUSH update technology provides round-the-clock monitoring and dedicated remote management, which protects against known and unknown cyber threats. Categories ...

    http://www.scmp.com/article/978146/vulnerable-companies-should-step-defences

Login

SCMP.com Account

or