Apr 14 2009

China Denies Role In US Grid Hacks

Slatterz writes “The Chinese government is denying any involvement in the reported infiltration of US electric grid systems. Xinhua news agency quoted Chinese foreign ministry spokesperson Jiang Yu as saying that any sort of involvement from China in the incident “doesn’t exist at all.” The denial follows a report in the Wall Street Journal which claimed that agents from China and Russia along with several other countries had infiltrated the computer systems charged with managing electricity in the US and left behind software payloads which could be used to control or disable electric grids in the US.” Bruce Schneier is skeptical about the whole story.

Read more of this story at Slashdot.

Share

Apr 11 2009

The Net — Democratic Panacea Or Autocratic Tool?

Alex writes “On April 6, 10,000 protesters organized in Moldova against the nation’s Communist leadership by utilizing new media like Twitter and Facebook, demonstrating the ever-increasing potential of the Internet as a democratic and liberating tool. But in the current Boston Review, Evgeny Morozov critiques the view that the internet will inevitably democratize autocratic regimes like China, Russia and Iran. He argues that the Net’s democratic effects are not inherent, and that autocratic regimes have been successful in controlling electronic media to disseminate their ideology. Will the net ultimately spread American democracy, or just American entertainment?”

Read more of this story at Slashdot.

Share

Apr 11 2009

China Denies Cyberattacks on U.S. Power Grid

A government spokeswoman denies reported attacks from China and Russia ever occurred.

Share

Apr 11 2009

Rockstar Games Develops Connection Between Flash Gaming, Nintendo DS

An anonymous reader writes “It’s been a long-talked-about but never fully realized aim of developers, publishers and format holders to create a game that runs on multiple platforms, but connects and exchanges assets between them — e.g. you play a game as an FPS on a console/PC but control it as an RTS on mobile devices. Now, Rockstar Games seems to have cracked it, on a small scale, with news that a new Flash game will allow PC gamers to generate in-game cash — true to form for GTA-creator Rockstar, it’s through ‘money laundering’ — that is then transferred to its new Nintendo DS title, Chinatown Wars. GameSpy’s online technology seems to be responsible for this latest gimmick, but most interesting is the idea that this could allow an interface between platforms like the iPhone and consoles as well. How long until an indie developer creates an MMO that has different interfaces for PC and mobile?”

Read more of this story at Slashdot.

Share

Apr 8 2009

US Electricity Grid Reportedly Penetrated By Spies

phantomfive worries about a report in the Wall Street Journal (“Makes me want to move to the country and dig a well”) that in recent years a number of cyber attacks against US infrastructure have been launched over the Internet: “Cyberspies have penetrated the US electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials. The spies came from China, Russia, and other countries, these officials said, and were believed to be on a mission to navigate the US electrical system and its controls. The intruders haven’t sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war.”

Read more of this story at Slashdot.

Share

Apr 1 2009

Google offers China one million free songs

Chinese music-lovers will be offered more than one million songs for free after Google launched a free music download site in China this week in a bid to tackle the internet piracy menace in China.

Share

Mar 30 2009

IBM Tries To Patent Offshoring

Ian Lamont writes “IBM has filed a patent application that covers offshoring employees. Application 20090083107, dated March 26, 2009, is a ‘method and system for strategic global resource sourcing.’ Figure 2 gives a pretty good idea of what’s involved — it shows boxes labelled ‘Engineer,’ ‘HR,’ and ‘Programmer’ with crossing arrows pointing to cylinders labelled ‘India,’ ‘China,’ and ‘Hungary.’ The article speculates that IBM may apply the methodology to its own staff — it reportedly plans to lay off thousands of employees and has even started a program to have IBM workers transfer to other countries at local wages.”

Read more of this story at Slashdot.

Share

Mar 30 2009

Google Launches Free, Legal Music Downloads in China

Wired is reporting that Google has a launched a new music download service in China to better compete with the leading search company there, Baidu.com. Offering some 350,000 songs, a number set to rise to somewhere in the neighborhood of 1.1 million in the coming months, the library includes both Chinese and foreign artists signed by Sony Music, EMI, and Universal Music. Proponents of the new service are also hoping it will combat illegal music downloads simply by offering higher quality songs for download. There are no immediate plans to expand this service beyond China.

Read more of this story at Slashdot.

Share

Mar 28 2009

Vast Spy System Loots Computers in 103 Countries

Researchers said that the spying, which infiltrated the offices of the Dalai Lama, was controlled from computers based almost exclusively in China.

Share

Mar 28 2009

Vast Electronic Spying Operation Discovered

homesalad writes “Researchers in Toronto have discovered a huge international electronic spying operation that they are calling ‘GhostNet.’ So far it has infiltrated government and corporate offices in 103 countries, including the office of the Dalai Lama (who originally went to the researchers for help analyzing a suspected infiltration). The operation appears to be based in China, and the information gained has been used to interfere with the actions of the Dalai Lama and to thwart individuals seeking to help Tibetan exiles. The researchers found no evidence of infiltration of US government computers, although machines at the Indian embassy were compromised. Here is he researchers’ summary; a full report, ‘Tracking “GhostNet”: Investigating a Cyber Espionage Network’ will be issued this weekend.” A separate academic group in the UK that helped with the research is issuing its own report, expected to be available on March 29. Here is the abstract. They seem to be putting more stress on the “social malware” nature of the attack and ways to mitigate such techniques.

Read more of this story at Slashdot.

Share