Remove 2010 Remove Data collection Remove Hacking Remove Surveillance
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance.

article thumbnail

A chink in the armor of China-based hacking group Nickel

Malwarebytes

Microsoft has taken control of 42 web domains that a hacking group was using to try to breach its targets. Sadly, any setback to the Chinese hacking group or others will likely be temporary as the hackers will find and build new infrastructure to use in forthcoming attacks. An overview of Chinese hacking groups and their aliases.

Hacking 102
article thumbnail

Microsoft disrupts China-based hacking group Nickel

Malwarebytes

Microsoft has taken control of 42 web domains that a hacking group was using to try to breach its targets. Sadly, any setback to the Chinese hacking group or others will likely be temporary as the hackers will find and build new infrastructure to use in forthcoming attacks. An overview of Chinese hacking groups and their aliases.

Hacking 80