Free Republic 1st Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $21,517
Woo hoo!! And the first 24% is in!! Thank you all very much for your continuing support!!

Keyword: chinesehackers

Brevity: Headers | « Text »
  • EXCLUSIVE: Signs of OPM Hack Turn Up at Another Federal Agency

    06/23/2015 1:07:49 PM PDT · by 2ndDivisionVet · 5 replies
    NextGov ^ | June 22, 2015 | Aliya Sternstein
    The National Archives and Records Administration recently detected unauthorized activity on three desktops indicative of the same hack that extracted sensitive details on millions of current and former federal employees, government officials said Monday. The revelation suggests the breadth of one of the most damaging cyber assaults known is wider than officials have disclosed. The National Archives' own intrusion-prevention technology successfully spotted the so-called indicators of compromise during a scan this spring, said a source involved in the investigation, who was not authorized to speak publicly about the incident. The discovery was made soon after the Department of Homeland Security's...
  • NY Times says Chinese hacked paper’s computers

    01/30/2013 10:54:05 PM PST · by Olog-hai · 34 replies
    Associated Press ^ | Jan 31, 2013 1:29 AM EST
    The New York Times says Chinese hackers repeatedly penetrated its computer networks over the past four months, stealing reporters’ passwords and hunting for files on an investigation into the wealth amassed by the family of one of China's leaders. … The attacks coincided with a Times’ investigation into how the family and relatives of Premier Wen Jiabao built a fortune worth more than $2 billion. …
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
  • Domains Used in RSA Attack Taunted U.S.

    04/03/2011 5:15:43 PM PDT · by fours · 6 replies
    Krebs on Security ^ | March 30, 2011 | Brian Krebs
    Details about the recent cyber attacks against security firm RSA suggest the assailants may have been taunting the industry giant and the United States while they were stealing secrets from a company whose technology is used to secure many banks and government agencies. Earlier this month, RSA disclosed that “an extremely sophisticated cyber attack” targeting its business unit “resulted in certain information being extracted from RSA’s systems that relates to RSA’s SecurID two-factor authentication products.” The company was careful to caution that while data gleaned did not enable a successful direct attack on any of its SecurID customers, the information...
  • Google to enlist NSA to help it ward off cyberattacks (BS! Google records, pass to NSA)

    02/04/2010 10:16:44 AM PST · by max americana · 21 replies · 478+ views
    Washington (com)Post ^ | Feb 4, 2010 | Ellen Nakashima
    The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity. Under an agreement that is being finalized, the National Security Agency would help Google analyze a major corporate espionage attack that the firm said originated in China and targeted its computer networks, according to cybersecurity experts familiar with the matter. The objective is to better defend Google -- and its users -- from future attack. Google and the NSA declined to comment on the partnership. But sources with knowledge of the arrangement, speaking on the condition of anonymity,...
  • FBI hacked by China ! (Stopped Arrest Of Terrorism Suspects!)

    06/20/2009 9:44:13 PM PDT · by MindBender26 · 25 replies · 1,847+ views
    Wash Times ^ | Bill Gertz
    A recent computer intrusion that forced the FBI to shut down its computer network and disrupted FBI operations was traced to an e-mail containing malicious code that originated in China, according to FBI officials. The forced shutdown of the network affected one significant FBI operation -- the May 20 arrest of homegrown terrorism suspects in New York, said officials who spoke on condition of anonymity because they were not authorized to discuss the matter. "The Chinese shut down our network," said one FBI official familiar with assessments of the attack.
  • Day One: Obama faces Cold War threat, a warning from Israel... and an armed guard to go to the gym

    11/07/2008 4:05:12 AM PST · by COUNTrecount · 67 replies · 4,459+ views
    Daily Mail UK ^ | Nov.7, 2008 | David Gardner
    With barely time to savour his triumph, Barack Obama has been confronted with various international crises to test his mettle. The U.S. President-elect faces threats from Russia, Israel and Afghanistan as it emerged his election team's computers were hacked by a 'foreign entity' during the election. Officials at the FBI and the White House believe the hackers sought to gather information on the evolution of both his and Senator John McCain's policy positions with the idea of using that information in negotiations with the next administration. Obama technical experts later speculated the hackers were Russian or Chinese, and security ended...
  • Threat Matrix: June 2008

    06/02/2008 12:04:34 PM PDT · by nwctwx · 1,085 replies · 5,263+ views
    The Hunt for American al Qaeda The United States is turning up the heat in the hunt for the California boy turned al Qaeda operative, Adam Gadahn, who has been charged with treason and is believed to be hiding in Afghanistan. If caught and convicted, Gadahn could face the death penalty. The State Department along with the Department of Diplomatic Security announced the beginning of a publicity campaign in Afghanistan urging locals to provide any information on Gadahn's whereabouts, with a reward if the information leads to his capture. Radio advertisements with information concerning the $1 million reward have...
  • 2 lawmakers say computers hacked by Chinese

    06/11/2008 12:34:17 PM PDT · by NormsRevenge · 28 replies · 116+ views
    AP on ^ | 6/11/08 | Pete Yost and Lara Jakes Jordan - ap
    WASHINGTON (AP) - Two House members said Wednesday their Capitol Hill computers, containing information about political dissidents from around the world, have been hacked by sources apparently working out of China. Virginia Rep. Frank Wolf says four of his computers were hacked. New Jersey Rep. Chris Smith says two of his computers were compromised in December 2006 and March 2007. The two lawmakers are longtime critics of China's record on human rights. In an interview Wednesday, Wolf said the hacking of computers in his Capitol Hill office began in August 2006. He says a computer at a House committee office...
  • Chinese hackers target government

    02/10/2008 9:45:26 AM PST · by milestogo · 3 replies · 50+ views
    Chinese hackers target government CHINESE computer hackers have launched targeted attacks on classified Australian government computer networks. The cyber attacks has prompted an internal review of IT security, Fairfax newspapers report. The federal government will spend $70 million to improve IT security this year, a figure that could be increased after the recent spate of hackings. The attacks are thought to be part of an international espionage operation to glean intelligence from the western world. Australian intelligence figures are believed to be concerned at a growing level of industrial espionage. The attacks late last year are believed to have been...