According to the head of the FBI, the Chinese hackers
special feature is aggressiveness with the
help of which they are trying to crack the security system of the United States.
China pursues an aggressive cyber war against the
United States, which is estimated to cost America billions of dollars. It was said
by FBI Director James Comey in the program CBS «60 Minutes» on the 5th
of October,2014. According to him, the American big companies can be divided
into two categories: those who had been under cyber attacks from China, and
those who do not know about that there are targets of cyber attacks from China.
The FBI Director reminded what had happened
on May this year, a landmark incident, when the American authorities first
charged in the industrial cyber espionage five officers of People's Liberation
Army (PLA).
Chinese hackers special features is aggressiveness with which they are
trying to crack the security system the United States. Chinese activity in the
field of industrial espionage, according to James Komi, is active because the technology to steal is much easier and cheaper than creating your
own. However, to detect the invasion of Chinese hackers is not difficult,
especially since they do not seek to disguise their presence: their strategy -
to make it clear that «they are everywhere.»
This year in October , JPMorgan Chase, one of the largest banks in the United
States, said that as a result of a hacker attack, which the bank reported two
months earlier, the data of 76 million individuals and 7 million businesses was
compromised. Then the hackers gained access to names, addresses, telephone
numbers and e-mail account of JPMorgan Chase holders .
United States Treasury Secretary Jack Lew declined to
comment this incident with JPMorgan Chase, citing the fact that this situation
is not the only or the renewed cause for concern. As the regular meeting of the
Minister of Finance with business leaders of the financial sector of the
American economy show, cybersecurity issues are under the control of their
daily living.
Source : securitylab.ru

No comments:
Post a Comment