No kidding. Chinese hackers, possibly from the China’s military, repeatedly penetrated the computer networks of “The New York Times (NYT)”, one of the biggest and most respected U.S. newspapers, over the past four month. Cyberwar on The New York Times!!!
The attacks, which began in mid-September in retaliation, since the newspaper published an exposé on how the family and relatives of Premier Wen Jiabao built a fortune worth more than US$2.7 billion.
The hackers breached the network sometime around Sept. 13, accessed e-mails of reporters and stole the corporate passwords for every Times employee. Over 53 computers were attacked, along with email accounts of the bureau chief in Shanghai David Barboza, along with the New Delhi bureau chief, Jim Yardley.
In a dramatic announcement New York Times says, “After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.”
The newspaper also added, “The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.”
In response to allegations that the Chinese military was behind the attacks, Chinese Foreign Ministry spokesman called the Times’ accusations groundless and reiterated the government’s position that China also has been hacked repeatedly.
“To rashly jump to conclusions based on investigation results which have not been proved by evidence is totally irresponsible behavior,” the spokesman, Hong Lei, said at a routine daily media briefing. “China is also a victim of cyber-attacks. Chinese laws specifically stipulate that cyber-attacks are prohibited.”
Symantec Corporation has put out a rather awkward press release OR you can say it an endorsement: “Advanced attacks like the ones the New York Times described in the following article, underscore how important it is for companies, countries and consumers to make sure they are using the full capability of security solutions.
The advanced capabilities in our endpoint offerings, including our unique reputation-based technology and behavior-based blocking, specifically target sophisticated attacks.
Turning on only the signature-based anti-virus components of endpoint solutions alone are not enough in a world that is changing daily from attacks and threats.
We encourage customers to be very aggressive in deploying solutions that offer a combined approach to security. Anti-virus software alone is not enough.”Recommended posts:
- A Tough Fight to Win: Microsoft files lawsuits against Malicious Advertising
Microsoft is now taking the legal route to take on developers of scareware applications. The company has filed lawsuits against five companies which they claim indulge in such practices.
- Disable Java Now – Hackers could install malicious software
The U.S. Department of Homeland Security is advising computer user to temporarily disable the disable Oracle Corp’s Java software on their computers to avoid potential hacking attacks. The Department …
- New in Apple: Logic Pro 9.0.1, Logic Express 9.0.1 and MainStage 2
Apple issued an update to iTunes for both Mac and Windows users. The newest version is now iTunes 9.0.1.
Main Stage 2.0.1:
This update improves overall performance and provides numerous fixes an…
- Is Flame, Flamer, or sKyWIper really such an amazingly advanced cyber-weapon?
In a most destructive cyber-attack on Iran since the notorious Stuxnet virus, a high-ranking Iranian military official confirmed Iran’s oil industry was briefly attacked by a data-mining virus called …
- Top Best PC System Utilities Software for your business
1) System Mechanic – Make your old PC run like new. Keep your new PC running fast and problem-free. System and registry clutter will degrade your computer’s performance, leading to crashes, longer boo…
- How Obama and Bush accelerated The Stuxnet Attacks (Olympic Games) On Iranian Natanz Plant?
It looks like, Stuxnet cyberattacks, developed by U.S. and Israeli agencies, was designed to gain access to the industrial computer controls in Iran’s Natanz nuclear plant. And it shows U.S. President…
Nasdaq quotes delayed at least 15 minutes, all others at least 20 minutes.
Markets are closed on certain holidays. Stock Market Holiday List
By accessing this page, you agree to the following
Press Release Service provided by PRConnect.
Stock quotes supplied by Telekurs USA
Postage Rates Bots go here