Cyber War

The internet is a battleground between countries and criminals and no one is safe. On April 7, 2010, it was reported that the Yahoo email accounts of 10 Beijing-based foreign journalists and the IFJ’s Hong Kong-based coordinator were infiltrated during March. Source: Scoop

China is not the only player in this Cyber War. The German Police and Intelligence Agencies hired a company to create Trojans capable of capturing traffic from Skype and SSL, and the recording industry wants the right to hack into your computer and delete stolen MP3s.

After a Chinese fighter collided with an American surveillance plane in April 2001, Chinese hacker groups cyber-attacked American businesses causing millions of dollars in damage.

The Carders“, cyber-criminals that specialize in using a sophisticated and automated process to steal information from credit cards, have made off with billions.

ISBN: 978-0130332738

When the “Cult of the Dead Cow” gains access to a computer, they spy on you through your own webcam and microphone. Imagine what the “Dead Cows” see if that webcam is in your bedroom. Good thing they consider themselves “Dead”.

The American National Security Administration’s (NSA) Red Team is suspected of distributing malicious software across the web as illegal hackers, and they do it under the the protection of the law.  In 2008, an elite U.S. Military Unit shut down a Saudi-CIA Website that was seen as a threat to US security. Source: CBS News

China isn’t alone on this battlefield where anarchy rules, so why does China get more than its share of media attention?

See “Hacking from China – Maybe” http://wp.me/pN4pY-p8

Sign up for an RSS Feed for  iLook China

One Response to Cyber War

  1. […] When the “Cult of the Dead Cow” gains access to your computer, what do they […]

Comments are welcome — pro or con. However, comments must focus on the topic of the post, be civil and avoid ad hominem attacks.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: