Be the first to like this.
2 comment(s). Last comment by Junichiro 2020-06-19 15:50
Posted by Junichiro > 2020-06-19 15:50 | Report Abuse
Nothing new. The western press reports big headlines abt their networks being hacked. But they do not report abt them hacking other countries' networks.
This is what Snowden said :US 'hacks China networks'
After fleeing to Hong Kong, Edward Snowden told the South China Morning Post that the NSA had led more than 61,000 hacking operations worldwide, including many in Hong Kong and mainland China.
He said targets in Hong Kong included the Chinese University, public officials and businesses.
"We hack network backbones - like huge internet routers, basically - that give us access to the communications of hundreds of thousands of computers without having to hack every single one," Mr Snowden was quoted as saying.
No result.
1
Dragon Leong blog
2
THE INVESTMENT APPROACH OF CALVIN TAN
3
MQ Market Updates
4
Follow Kim's Stockwatch!
5
Good Articles to Share
6
Mercury Securities Research
7
Kenanga Research & Investment
8
#
Stock
Score
Stock Name
Last
Change
Volume
Stock Name
Last
Change
Volume
Stock
Time
Signal
Duration
Stock
Time
Signal
Duration
CS Tan
4.9 / 5.0
This book is the result of the author's many years of experience and observation throughout his 26 years in the stockbroking industry. It was written for general public to learn to invest based on facts and not on fantasies or hearsay....
teoct
480 posts
Posted by teoct > 2020-06-19 15:07 | Report Abuse
The “sophisticated state-based” cyber-attack Australian prime minister Scott Morrison warned about today...is not particularly sophisticated, according to experts.
But it is a wake-up call for businesses to keep their systems patched and secure, and to remain alert.
“[The state actor campaign] doesn’t look very sophisticated,” UNSW professor of cybersecurity Richard Buckland told our reporter Josh Taylor.
“It’s well-resourced in a large scale but I haven’t seen anything yet that’s super secret or super sinister. They’re using known techniques against known vulnerabilities and following known processes.”
https://www.theguardian.com/technology/2020/jun/19/australian-cyber-at...