Vulnerabilities / Threats
1/25/2010
04:30 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

China Denies Attacking Google

Officials in China call claims that the government had a role in the cyber attack on Google and other companies "groundless."

China's government on Monday denied involvement with the cyber attack reported by Google earlier this month and defended its regulation of the Internet.

In an interview with the state-run news organization Xinhua on Sunday, an unidentified spokesperson for the Chinese Ministry of Industry and Information Technology said that "[The] accusation that the Chinese government participated in cyber attack, either in an explicit or inexplicit way, is groundless and aims to denigrate China."

While Google has not accused the Chinese government of direct involvement in the cyber attacks that affected it and some 33 other companies, its decision to stop cooperating with Chinese censorship rules has been widely seen as a stand against the challenging business environment faced by foreign companies in China.

Some security researchers have been less diplomatic, claiming that the attacks show signs of the involvement of Chinese state entities.

China meanwhile insists that it is the biggest victim of hacking attacks.

Last week, U.S. Secretary of State Hillary Clinton spoke at length on the importance of Internet freedom and noted that last year, China, Tunisia, and Uzbekistan "stepped up their censorship of the Internet."

She asked U.S. businesses to support the U.S. government's effort to oppose censorship. "[W]e are urging U.S. media companies to take a proactive role in challenging foreign governments' demands for censorship and surveillance," she said. "The private sector has a shared responsibility to help safeguard free expression. And when their business dealings threaten to undermine this freedom, they need to consider what's right, not simply what's a quick profit."

Getting businesses to put principles above profit may prove difficult. Microsoft CEO Steve Ballmer has criticized Google's threat to leave China as an irrational business decision. He has referred to the situation as the "Google problem" rather than a challenge faced by any foreign business trying to operate in China.

According to Reuters, Microsoft chairman Bill Gates apparently shares that view, stating in an interview on Good Morning America that "The Chinese efforts to censor the Internet have been very limited."

In a statement on an official Chinese government Web site, a government spokesperson said, "China is willing to cooperate and exchange opinions on issues about Internet development and management with other countries, but opposes firmly to any defiance of Chinese laws, or intervening Chinese domestic affairs under the pretense of 'Internet management' regardless of the truth."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.