Benvenuto, ospite! [ Registrati | Login

A proposito di circlelook9

Descrizione:

The uS Just Called out China for Hacking. Here's What You Need To Know

What is crucial: How much of a matter that the US and its allies accuse China of widespread cyberspace misdeeds?


BF The Biden Foundation believes this is a huge deal. For one thing, until now , the Biden administration has been more focused on Russian hacking than Chinese hacking, which makes it more visible the risk of criminal Chinese cyber activity. Another reason is that while previous US administrations were willing to call out China hacking, it's interesting that the US got so many countries and allies involved this time.


This is the first time that NATO has condemned Chinese cyberattacks. There are many countries in NATO that have complicated relationships with China that they don't want to upset, so cybersecurity experts say it's an achievement for the US in that it was in a position to present a united front. This coordinated accusations also set the stage for future sanctions.


What's important? What is important: CNN official said that China's activities encompass cyber-extortion, cyber-jacking, and the theft of crypto from victims around world for financial gain. How serious are these activities?


BF: As we've seen with meatpacking and oil pipelines, ransomware is a really significant issue right now that can have devastating effects in the event that the appropriate precautions aren't taken. Crypto-jacking, which is the use of malicious software to take a computer's resources and quietly generate cryptocurrency, isn't known, but it shows how clever hackers can be in making money from their victims.


Monday's Biden administration described the hackers as "criminal contract hackers" who hack for Beijing but also for personal profit.


What's important: Biden stated that he doesn't intend to place sanctions on China as his team continues to investigate the scope of Beijing's actions. What's the process for these investigations and why does it take so long?


BF: Hackers can employ cloud-based servers as well as virtual private networks and other techniques to hide their true location, making it difficult to trace cyberattacks back to its source. Experts generally have to use sophisticated forensic methods that include analysing code fragments and looking for patterns -- to come up with an educated guess as to which organizations could be responsible for an attack. Even then, officials typically deny their claims by stating how certain they are.


In this case, US officials said they have a high degree of conviction that Chinese state-sponsored hackers are responsible for the Microsoft Exchange hacks and other malicious cyber activities.


What is crucial is: What vulnerabilities have the cyberattacks against America exposed?


BF This is the same security vulnerabilities that information security experts warn about. According to the Department of Homeland Security, Chinese hackers have tried to conduct surveillance on targets in defense and aerospace, government, education health care manufacturing, and other key sectors of the economy. In many instances, Chinese hackers are accused of trying to steal trade secrets and intellectual property -- and as part of this week's announcement the Justice Department indicted several more suspect Chinese hackers for doing just that.


What is important to be aware of to move forward?


BF: US officials are urging companies and organisations to keep their systems and software up-to-date and to create emergency plans in the event that they do become hacked. They also urge them to have offline backups that they can use to recover from ransomware attacks, without paying their hackers.
Wow is life

From a policy standpoint, keep an eye out for possible further punitive measures from the US and its allies against China and any effects that may have on the critical and complex economic relationship between China and the US.

Siamo spiacenti, non sono stati trovati annunci.