China Reveals Its Cyberwar Secrets

A high-level Chinese military organization has for the first time formally acknowledged that the country’s military and its intelligence community have specialized units for waging war on computer networks.

China’s hacking exploits, particularly those aimed at stealing trade secrets from U.S. companies, have been well known for years, and a source of constant tension between Washington and Beijing. But Chinese officials have routinely dismissed allegations that they spy on American corporations or have the ability to damage critical infrastructure, such as electrical power grids and gas pipelines, via cyber attacks.

Continue reading

Los Angeles creates ‘Cyber Intrusion Command Center’

LOS ANGELES, Oct 30 (Reuters) – Los Angeles Mayor Eric Garcetti, citing warnings by President Barack Obama and National Intelligence Director James Clapper about the threat of attacks on computer networks, on Wednesday announced the creation of the city’s first “Cyber Intrusion Command Center.”

The command center, which will be operated with the assistance of the FBI and Secret Service, will be staffed by cyber security experts who will scan the city’s computer networks for threats and quickly respond to breaches, according to the mayor’s office. Continue reading

Chinese military unit said to resume cyber spying

The clandestine army unit, known as Unit 61398, “went quiet for a while — they changed the nature of their activities, they removed some of the tools that they had been using inside of different companies,” said Richard Bejtlich of Mandiant, which specializes in defending companies from cyber attacks and purging malware from computer networks that have been breached. Continue reading

Cyber-attackers penetrate Reserve Bank networks

The Reserve Bank of Australia’s computer networks have been repeatedly and successfully hacked in a series of cyber-attacks to infiltrate sensitive internal information, including by ­Chinese-developed malicious software.

The RBA is sufficiently concerned about these risks that it has had a private security firm carry out “penetration testing”, or authorised hacking, of its computer networks to assess the integrity of its digital defences. Continue reading