TechnoNews

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, January 31, 2013

The primary goal of the attackers to access Gmail accounts of Chinesehuman rights activists.

Posted on 2:47 PM by Unknown
First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses - including the Internet, finance, technology, media and chemical - are both committed. We are currently in the process of the release of the company, and we are also working with the relevant U.S. authorities. />
Second, we have evidence to suggest that the primary goal of the attackers to access Gmail accounts of Chinese human rights activists. Based on our investigation so far we believe their attack failed (VGP-BPL8, VGP-bpl8a, VGP-BPS9) to achieve this goal. Only two Gmail accounts appear are accessed, and information on account activity (such as the date account was created) and subject line, rather than limited to the content of emails themselves. />
third parties as part of this investigation but independent of the attack on Google, we discovered that the accounts of dozens of US-, China and Europe-based Gmail users advocates of human rights in China that seem to regularly access a third party. These accounts have not been accessed through a security breach at Google, but most likely via phishing or malware placed on the users' computers (VGP-BPS9 / B, VGP-BPS9 / s, VGP- BPS9). />
We got the information from this attack to make infrastructure and architectural improvements that enhance security for Google and for our users to use. In terms of individual users, we would advise that provides reputable anti-virus program and anti-spyware on their computers, to install patches for their operating systems and update their web browsers. Always be careful when out on the links in instant messages and emails, or when asked to provide personal information like passwords online. You can read more here about our cyber-security recommendations. People can learn more about the type of attack (to read this Report to Congress (PDF VGP-BPS9 / B, vgp-BPL9, VGP-BPS10) by the US-China Economic and Security Review Commission see PP 163 -.) and a related study (PDF) for the Commission, Nart Villeneuve's blog and this presentation on the GhostNet spying incident prepared.
We /> unusual step of sharing information about these attacks with a broad audience not just because of the security and human rights implications of what we put unearthed, but also because the information It goes in the middle of a much bigger global debate about freedom of speech. In the last two decades, the economic reform program in China and its people business flair freed hundreds of millions of Chinese out of poverty. Indeed, this great nation is in the midst of much economic development VGP-BPS10 / B, VGP-BPS10 / s, vgp-bps10a and development in the world today. />
We launched Google.cn in January 2006 in the belief that the benefits of increased access to information for people in China and a more open Internet outweighed our discomfort in agreeing to censor some results. By the time we made clear that "we will carefully monitor conditions in China, including new laws and other restrictions on our services. If we determine that we are able to achieve the objectives outlined we are free to rethink our approach (VGP-bps10a / b, vgp-bpl10) China.
Email ThisBlogThis!Share to XShare to Facebook
Posted in Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Space with windows
    Whatever may retail space, one of the most important parts of your design, window space. The right place dressed from the very beginning, an...
  • Germany tops the European list of Cybercrime for maximum active bot
    Germany all the other European countries in cybercrime. In 2010 alone, Symantec discovered 286 million new global threats for businesses and...
  • Wireless Networking Equipment, A useful Guide
    Do you want to set up a wireless network? Imagine what kind of equipment is required for your wireless network? It is a very useful guide fo...
  • IT Disaster Recovery Quick Start Guide
    If you've ever spent a few days in the hope of recovering nerves vital data, you know that if your technology is not available, your bus...
  • Development delayed
    Every child follows a particular path of growth and development called milestone in the development. Developmental delay occurs when childre...
  • Remove PrivacyRight - Easy PrivacyRight from your computer
    What PrivacyRight? /> PrivacyRight rogue anti-spyware program. This means PrivacyRight a false application that pretends itself as a anti...
  • Science and Technology Interface
    The most important consideration should be the integration of science and technology. We have established the boundaries between science an...
  • Voltage controlled oscillator Fine-tuning of the Communication Systems division
    The technological world, communication Contact the geographical boundaries easier and faster help is not as easy as it sounds. Understand...
  • Nintendo developing
    If you look at the whole picture, you notice the gaming industry is a factor only for a short time, since the '70s. It took about a deca...
  • Features of E-Mail Encryption: Why do you use email encryption software
    In case depends on email for business, make sure that e-mail archiving software installed in your community. This plan can shield all the in...

Categories

  • Computing
  • Hardware
  • Internet
  • IT Management
  • Mobile Tech
  • Security
  • Servers
  • Software
  • Technology

Blog Archive

  • ▼  2013 (181)
    • ►  June (15)
    • ►  May (31)
    • ►  April (33)
    • ►  March (32)
    • ►  February (29)
    • ▼  January (41)
      • The primary goal of the attackers to access Gmail ...
      • How to improve your chipping?
      • Mobile phone deals? Best choice to get into Hi-Tec...
      • Advantages of the Linux Operating System: Paper
      • Hi-Tech Smartphone HTC Desire
      • IIPM and GIDF collaboration
      • Secured Loan
      • Law Enforcement Surveillance Equipment - staging u...
      • Moncler Collaboration With Style brand
      • No operating system found Error Fix
      • Within the practice chipping
      • Secure your wireless network solution
      • What is Robotic Automation?
      • Cloud Data Center? Introduction of Cloud Data Storage
      • RAM Memory - Utility and Importance
      • Windows 7? A leader of the operating system
      • What Committed Server?
      • Science of Body Language
      • "Secret Service"
      • Collaborative approach to requirements management
      • Handheld XRF Analyzer: A Reliable Detector Lead
      • Internet marketers for Internet Web
      • MEMS oscillators difference: The Competitive Advan...
      • The HTC Sensation XL has a number of alternative w...
      • Open Source Vs. Commercial e-learning software
      • Marketing on the Internet
      • Different Technologies in Web Technology
      • CRM Integration for Impeccable Data Resource Manag...
      • Upgrade laptop hardware
      • Internet Marketing with Social Media
      • PC Support for malware
      • Green Data Centers? Revelation Mass Data Management
      • Nintendo developing
      • Science and Technology Interface
      • Acer Aspire Acer S3 and Tech Support
      • Voltage controlled oscillator Fine-tuning of the C...
      • A Disaster Recovery Plan - Part 1
      • Tablet Review Heel Traumeel
      • Data Center Provider for all your Data Management ...
      • Helpful Pet Meds for your sick animals
      • Battery Maintenance
  • ►  2012 (45)
    • ►  December (45)
Powered by Blogger.

About Me

Unknown
View my complete profile