Open Backdoors, Broken Windows, and Tainted Chips: A Brief History of the Ongoing Microsoft-China War

When I visited China in 2000, you could buy the newest pirated version of Windows almost anywhere. In fact, you’d be considered stupid if you bought the licensed version. After all, how many Chinese were rich enough, at that time, to afford it? Would you pay a couple of month’s salary for a computer program? … Continue reading Open Backdoors, Broken Windows, and Tainted Chips: A Brief History of the Ongoing Microsoft-China War

Amazon and eBay Stop Sale of Samsung Galaxy 4 Clone: Chinese-Made Star N9500 Found to Contain Pre-Installed Dangerous Spyware

Yesterday, Ebay reported it would no longer be selling the popular Chinese-made Star N9500 smartphone after German security firm, G Data, discovered dangerous pre-installed spyware on the device. Amazon initially refused to comment on the story but, this morning, when I tried to access the page featuring the device, I found that it had been … Continue reading Amazon and eBay Stop Sale of Samsung Galaxy 4 Clone: Chinese-Made Star N9500 Found to Contain Pre-Installed Dangerous Spyware

Made in USA, Remade in China: Part 1: Chinese Cyber Intimidation Spreads Beyond Its Borders

I have a simple way to assess the freedom of the country you’re in. Go to the capital city, stand in a visible public place, and make a speech criticizing the current leadership. If nothing happens besides your getting a few critical remarks from onlookers, you’re in a free country. If, however, you are arrested, … Continue reading Made in USA, Remade in China: Part 1: Chinese Cyber Intimidation Spreads Beyond Its Borders

Mandiant Webinar Highlights the Difficulty of Dealing with the Latest Varieties of Cyber Attacks

In the latest Mandiant webinar, consultants Chris Oetting and Mike Middleton explained the difficulty of restoring an organization’s network after it has suffered a serious cyber attack. About 30% of recent cyber attacks that Mandiant has responded to involve organizations that have been compromised by attackers employing backdoors. These are programs installed surreptitiously on a … Continue reading Mandiant Webinar Highlights the Difficulty of Dealing with the Latest Varieties of Cyber Attacks

Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

There are three main reasons for hacking. One is for financial gain, one is for acquiring protected information, and the third is to achieve some political objective. The second reason for hacking, that of acquiring protected information, is often used, at a later time, to achieve financial gain, but its motivation is somewhat different than … Continue reading Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks