Al-Jazeerah: Cross-Cultural Understanding

 

News, March 2010

 
www.ccun.org

www.aljazeerah.info

Al-Jazeerah History

Archives 

Mission & Name  

Conflict Terminology  

Editorials

Gaza Holocaust  

Gulf War  

Isdood 

Islam  

News  

News Photos  

Opinion Editorials

US Foreign Policy (Dr. El-Najjar's Articles)  

 

 

 

Editorial Note: The following news reports are summaries from original sources. They may also include corrections of Arabic names and political terminology. Comments are in parentheses.

 

China-US tensions temporarily relieved, both countries target of computer attacks

Expert says China-U.S.tensions temporarily relieved

WASHINGTON, March 2, 2010, (Xinhua) --

Tensions between the United States and China will be temporarily eased as two senior U.S. officials visit Beijing with hopes of patching up ties, an expert said Tuesday.

"The United States sent two senior diplomats to China because it is reluctant to see U.S.-China rifts spiraling out of control," said Pei Minxin, a senior associate of the China Program at the Carnegie Endowment for International Peace.

Except for the Iranian nuclear issue, the recent disputes between China and the United States will basically come to an end, Pei, who is also a professor of government at Claremont McKenna College in California, told Xinhua.

The visit "puts a comma to recent frictions between the two sides, but not a full stop," as disputes will continue to emerge, he said.

U.S. Deputy Secretary of State James Steinberg and National Security Council Senior Director for Asian Affairs Jeffrey Bader began their visit to Beijing on Tuesday and will stay there until Thursday before going to Japan.

The trip is mainly aimed at exchanging opinions with the Chinese side about the Iranian nuclear issue, and explaining the U.S. stance on such issues as selling weapons to Taiwan, President Barack Obama's meeting with the Dalai Lama and the Google case, he said.

In recent weeks, the two nations mainly communicated with each other through the media, which might lead to speculation and misunderstandings, said the expert, adding that face-to-face, high-level exchanges would always be more direct and effective.

Editor: Anne Tang

Interview: U.S. and China: major targets of computer attacks

By George Bao

LOS ANGELES, Mar. 2, 2010, (Xinhua) --

 The United States and China are two major countries with malicious computer activity, Vincent Weafer, Vice President of Symantec Security Response, the largest maker of personal computer security software in the world, told Xinhua in an interview.

He said cybercrime represents today's most prolific threat and cybercriminals are more determined than ever to steal confidential information. Attacks continue their shift away from noisy, large- scaled attacks to highly targeted silent attacks motivated by financial gain. They can be commercial entities breaking into competitors' records, or international crime rings stealing valuable data like credit card numbers and email passwords.

"Cyber attacks are increasingly sophisticated, better organized and specifically designed to silently steal data for profit or advantage. Fraud, intelligence gathering and gaining access to vulnerable systems are now the clear motivation behind today's attacks," he said.

"In 2009, 90 percent of threats observed by Symantec were targeting confidential information. We released the results of our 2010 Enterprise security study this week, which surveyed 2,100 enterprise CIOs, CISOs and IT managers around the world and our study shows that 75 percent of enterprises experienced cyber attacks," said Weafer.

"In the December 2009 Symantec Quarterly Intelligence Report we identified that the United States was the top country for malicious activity during this period, accounting for 18 percent of the global total and China was ranked third with 7 percent of the global total," said Weafer.

Malicious activity usually affects computers that are connected to high-speed broadband Internet because these connections are attractive targets for attackers. The top countries in this metric, including the United States and China, have extensively developed and growing broadband infrastructures. China passed the United States for the largest number of broadband subscribers for the first time in 2008, represented 21 percent of the worldwide broadband subscriber total, said Weafer.

"The key trends we observed in 2009, included the increasing problem of Rogue AV or misleading security applications. Symantec has identified 250 distinct misleading applications that pretend to be legitimate security software-quite convincingly so in many instances-but which actually provide little or no protection and can in reality infect a computer with the very malware it purports to protect against. From July 1, 2008, to June 30, 2009, Symantec received reports of 43 million rogue security software installation attempts," Weafer said.

According to Weafer, Botnets continued to rule the cyber security landscape in 2009 with the 10 major heavyweight spam- sending botnets, including Cutwail, Rustock and Mega-D, now controlling at least 5 million compromised computers.

He said Cutwail was a dominating force across both spam and malware in 2009, responsible for issuing 29 percent of all spam or 8,500 billion spam messages between April and November 2009. Symantec has observed that the majority of today's malware contains a bot command and control channel. Other key trends include the rise of attacks against both social networking sites and users of those sites became standard practice for criminals.

In 2009, 498 data breaches were reported, exposing more than 233 million records, according to the Identity Theft Resource Center. Well-meaning insiders represent the bulk of data loss incidents with 88 percent of all data loss incidents caused by insiders such as employees, according to The Ponemon Institute.

However other causes include attacks using targeted malware. One recent example is the Hydraq attack earlier this year that targeted specific companies for confidential information.

The threat leveraged a zero-day vulnerability in Internet Explorer and sophisticated social engineering tactics. It penetrated systems by infiltrating emails and IMs with malicious links and PDF attachments that contained malware. Once a system was compromised, it allowed the hacker to leverage the back door to steel information from the targeted organization, according to Weafer.

According to Weafer, there's also been a marked increase in " crimeware," or software used to conduct cybercrime. These tools fuel the black market including, botnets, keystroke loggers, spyware, backdoors, and Trojans. User-friendly toolkits such as Zeus tenable even novice hackers to create malware and botnets including the recently reported kneber bot-net.

In 2009, Symantec created more than 2.9 million new virus signatures and discovered more than 211 million distinct malware variants. To put this in prospective we've created more signatures in the past 15 months than in the past 18 years combined, said Weafer.

He said that last year the company launched its new reputation- based security, which was built to address the untold number of undetected threats created every day. This technology leverages the "wisdom" of tens of millions of Symantec users around the world to derive safety rating for every file on the Internet. It allows Symantec Security Response experts to compute the reputation of a program based on a number of different factors including the origin, the age of the program and its prevalence. In just six months we generated more than 177 billion reputation ratings, said Weafer.

Joris Evers, Director of Worldwide Public Relations at McAfee, another major player in computer security, told Xinhua that intellectual property has become a main target of cyberattacks, which means that information rich organizations and individuals will be a target.

"In our recent Virtual Criminology Report we highlighted that cyberwar has become a reality and five countries are at the forefront of arming themselves for cyberwar. These countries are the U.S., France, Israel, Russia and China," said Evers.

"In general we continue to see increased hacking activity around the world. For example, McAfee Labs had catalogued approx. 33.3 million pieces of malware at the end of 2009, compared to approx. 16.3 million at the end of 2008. That's 104 percent increase, or a doubling of malware in a year," said Evers.

He said attribution in cybercrime is very tough. Attackers can route their attacks through numerous computers and obfuscate their actual location, as a result it is always a challenge to pinpoint the source of a cyberattack.

"We do know that many computers in China are compromised due to lack of computer security and appropriate PC hygiene. In our Q4 Threat Report we noted that there are more 'zombie' computers in China than in any other nation with 12 percent of all zombie computers located in China. The U.S. is second with 9.5 percent. During the quarter we saw about 4 million new zombie PCs come online each month," said Evers.

Editor: Mu Xuequan



Fair Use Notice

This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.

 

 

 

 

Opinions expressed in various sections are the sole responsibility of their authors and they may not represent Al-Jazeerah & ccun.org.

editor@aljazeerah.info & editor@ccun.org