Slideshow: 10 ways the Chinese Internet is different from yours This slideshow complements our interview with James Fallows, national correspondent for The Atlantic Monthly, who has experienced "The Great Firewall of China" firsthand.What follows is a list of the differences between the Internet, as seen in the U.S. vs. China. China denies cyber spy network charges China on Tuesday denied suggestions it could be involved in a cyberespionage ring that attacked computers worldwide from servers mostly based in the country. China becoming the world's malware factory With China's economy cooling down, some of the country's IT professionals are turning to cybercrime, according to a Beijing-based security expert. Cyber espionage from state governments? Don't be surprised The report "Tracking GhostNet: Investigating a Cyber Espionage Network," a collaborative effort by consultancy SecDev Group and the Munk Centre for International Studies at the University of Toronto, says it traced ... Chinese high-tech spy case inches closer to trial Did software engineer Hanjuan Jin steal thousands of confidential documents from Motorola to share with the People's Republic of China? The strange and complex case is expected to go to trial in Chicago. Yet another government attempt at cybersecurity The timing of two cybersecurity bills just introduced by Sen. John D. Rockefeller, IV (D.-W.Va.), Sen. Olympia Snowe (R.-- Maine) and Sen. Bill Nelson (D.-Fla.) seems a bit funny. It is not so much that they were introduced on April Fools¿ Day; more importantly, they were introduced before the widespread review of U.S. cybersecurity ordered by President Obama is completed by Melissa Hathaway. IT Was Ready for A Conficker Attack An expected April 1 activation of the Conficker.c worm passed without incident, calming widespread fears that the Internet was in danger of attack. The Sound of Y2k Can you hear it? Amid the deafening silence that was the the Conficker nonevent of April Fools' Day, you should be able to detect an echo from the past. It started as a quiet murmur, but over time, it will build to a crescendo that could make Conficker the most dangerous malware IT has ever seen. April giveaways galore Cisco Subnet and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment