By the way, the US commerce dept. computers are under attack….



Shouldn’tthis and this get more news coverage? US Commerce Department computers (specifically a bureau responsible for export licenses) is under cyber attack from hackers based in China. The Bureau in question is the Bureau of Industry and Security…. which handles “U.S. exports which have both commercial and military applications”…. They’ve been targetted by various rootkits among other malwares and in early September were forced to cut off internet access (yes that’s around a MONTH ago).


There’s no evidence any of the bureaus data has been compromised, but they say that there is evidence pointing to state sponsored hacking….. so essentially state sponsored Chinese hackers are targetting a SENSITIVE portion of the Commerce Department. Computers are being replaced because of concerns of BIOS-hidden rootkits and internet access has been limited to workstations that are quarantined seperate from the working LAN.

Not too long ago I recall typing about the Titan Rain hack attacks that seemed to be originating from China as well. The reports at that time didn’t seem to address Chinese government involvement (although I may not recall correctly.) It’s interesting to note one person quoted as saying we’ve lost 3-4 cyber battles with the Chinese at this point….

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove Cyber Security | Cyber Security Removal Guide Cyber Security is a rogue antivirus application. It is in the same family as totalsecurity (total security Removal Guide) and SystemSecurity. This software installs through web popups and trojan horse activity makes false claims about your system being compromised by viruses and other security problems, hijacks we browser activity claiming......
  • How to Remove Internet Security 2010 | Internet Security 2010 Removal Guide Internet Security 2010 is the name of a rogue antivirus application that is one of the more recent to be making the rounds. It will typically install itself on your system through the use of other malware. These rogue antivirus applications typically will pop up warnings and alerts about the......
  • The great firewall of China The great firewall of China may be just an illusion in technical terms. This article describes the details of how things work.... Basically when "banned content" is detected, both ends of the connection are sent a flood of tcp reset packets. Which (if both sides are designed to pay attention......
Blog Traffic Exchange Related Websites
  • Why Choose The Best Web Browser For Online Security Web browser is the prime software to connect yourself to the world wide web. Now most of the companies are increasingly putting more and more services on their website and ask their customer to take active part online. Secured browser means keeping your computer free from the virus, spyware and......
  • Taking Care of Rare Coins Rare coins can be an incredibly important part of any coin collection, as they provide interest, intrigue, and pride to the collection itself. Some people will only have a few of these coins in their collection, while others will have a wealth of these coins. Whether you have one rare......
  • Stakes are high for U.S., China during Clinton visit     When Hillary Clinton visits Beijing this week, her Chinese hosts will closely watch her body language and parse her every word. Her first trip here as the U.S. secretary of state comes in the shadow of the global financial crisis, the pressing North Korea nuclear issue and a......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site