The favored tactic apparently is used to attack Internet gateways as opposed to using APTs, or advanced persistent threats, which entails gaining access through compromised systems.
The report released by the Commission on the Theft of American Intellectual Property last week has come under fire again, this time for suggesting that companies lock files and cripple computers in the event of unauthorized access.
While sufficient time and diligence may help increase the likelihood of finding the correct attacker, just because the track passes through an IP address from China does not automatically mean it was the source of a cyberattack.
Let businesses strike back at online attackers and allow them to retrieve stolen information from the origin networks. This summarizes one of the recommendations outlined in "The IP Commission Report," put together by the Commission on the Theft of American Intellectual Property.
For a highly readable overview of the $45 million ATM heist that was revealed last week, take a look at an article by Adrianne Jeffries at The Verge . Jeffries connects the dots between the dozens of thieves who simultaneously ripped off ATMs around the world and the computer hackers who are suspected of setting up the scam.
A security researcher has outlined a scary scenario in which a simple smartphone or tablet could be used to redirect planes mid-flight. In fact, researcher Hugo Teso of German IT consultancy N.Runs has even created an Android app that he says allows a virtual plane to be redirected from a Samsung Galaxy smartphone.
Security researchers from Qualys have sounded the alarm on thousands of wireless IP cameras that could be remotely hijacked.
Applications written in certain languages and programming frameworks are more likely to be riddled with certain types of vulnerabilities than others, says Veracode. The application security firm noted that the software industry's inability to reduce security flaws is fueling a situation where mediocre hackers are able to find and exploit such flaws with relative ease.
AnhLab says that the unidentified hackers made used of stolen IDs and passwords to launch some of the attacks, including exploiting existing mechanisms for delivering new software and security updates
Last week's disclosure by The New York Times that Chinese hackers had infiltrated its computer systems offers a sharp lesson in cyber defense. Instead of kicking out the hackers when they were first discovered, the company kept an eye on them long enough to follow their trail.