Text message spam is best ignored, but when a security researcher followed a trail of deception laid out on Apple's iMessage he became the proud owner of cheap designer accessories from China.
If you haven't gotten spam on your Apple iMessage, count yourself lucky. Spam has been ballooning on the tech giant's mobile messaging service, security researchers at CloudMark say. In May, iMessage spam made up more than 40 percent of all mobile spam. Landesman, anti-spam researcher, confirmed his suspicion that the spam came from China after buying the advertised designer-label knock-offs. They were all shipped from China.
Read moreChinese authorities are attacking users who are connecting to Apple's iCloud website in what appears to be a surveillance push to steal users' login credentials, according to a Chinese censorship monitoring group.
After the new iPhone 6 went on sale in China, connections to iCloud.com were hijacked and stripped of the usual encryption that prevents hackers and government spies from intercepting the username and password typed by someone connecting to the site. This is another example of what is technically known as a "man-in-the-middle" (MITM) attack. China has been accused of intercepting connections with a MITM attack against Github, Google, and, more recently, Yahoo.
Read moreTo infiltrate foreign networks and gain access to sensitive systems, the NSA has been using the tactics of “physical subversion” – deploying undercover agents in Chinese, German, South Korean and possibly even American companies.
Past reports on the National Security Agency have typically depicted a government organ that hacks other systems or works with private corporations to bypass their own encryption protections, but the latest report based on files leaked by Edward Snowden suggests the agency could be embedding operatives into foreign, as well as domestic, “commercial entities.”
Read moreThe search engine that protects your privacy by not tracking your searches has been blocked in China. DuckDuckGo has garnered kudos among privacy advocates because it allows you to search for items on the Web anonymously.
Unlike Google and other search engines, the site doesn't collect personal information, so it cannot share any data about you with law enforcement or other authorities. In addition to its core website, the company also offers mobile apps for iOS and Android users. Search engines face unique challenges in trying to carve out business in China where the government demands that certain information be blocked from its citizens.
Read moreChina is looking to launch its own operating system, an initiative that the government reportedly hopes will make its information systems more secure. Ni Guangnan, of the Chinese Academy of Engineering, the country's state-run engineering arm, says the new Chinese operating system could be launched as early as October.
Details regarding the underpinnings of the operating system have yet to be revealed, but the move was reportedly spurred by the end of support of Windows XP and the ban on Windows 8 in China. The government also launched an anti-monopoly probe against Microsoft earlier this year.
Read moreAccording to the experts, the devices retrieved messages and photos, even though the backup feature was off. Information security experts of many countries have criticized the Chinese telecommunication equipment suppliers for installing backdoors in their products, that’s why the Chinese company Xiaomi, which is engaged in production of smartphones, was sued.
In the judicial claim the Chinese manufacturer was accused of secretly taking users‘ personal information and then sending SMS, files from gallery, the list of contacts, IMEI, IMSI and so on to servers in Beijing. Besides, data were copied without owner‘s permission even thus the backup feature was disabled.
Read moreA Chinese official said Thursday that Canada should withdraw its accusation that China was behind the hacking of Canada's top technology development organization.
"It is irresponsible for the Canadian side to make groundless accusations against China when there is no credible evidence," Foreign Ministry spokesman Qin Gang said. "We are strongly opposed to that." Canada's Treasury Board said on Tuesday that a "highly sophisticated Chinese state-sponsored actor" hacked into the National Research Council, which partners with private industry to bring new technologies to market. The government said one of Canada's spy agencies detected the cyberattack and the council's computers were isolated as a precaution.
Read moreCanada accused China on Tuesday of hacking into the computers of its research and development arm, which Beijing strongly denied.
China partners each year with thousands of Canadians firms to roll out new technologies, and took advantage of this arrangement to engage in a cyber attack, Ottawa said. "Recently, the government of Canada, through the work of the Communications Security Establishment, detected and confirmed a cyber intrusion on the IT infrastructure of the National Research Council of Canada by a highly sophisticated Chinese state-sponsored actor," said a government statement.
Read moreAccording to the Chinese mass media charges, information security could suffer. At the same time Apple representatives claim that user‘s location data are only on his device and can't be saved on iTunes or iCloud.
Apple denies Chinese statement, broadcasted on China Central Television (CCTV) about surveillance over users. The "Frequent Locations" function caused many questions. According to the Chinese mass media, the information gathered by Apple can reveal the entire country's economic situation and even state secrets. In turn, Apple‘s technical support declares that the "Frequent Locations" function doesn't track your smartphone.
Read moreOffice equipment carries out attacks to an internal network by means of SMB protocol.
Malicious software is set on Chinese scanners for the purpose of information plunder. Several scanners–spies were sold by many companies, including the well known company of equipment production. Some versions of malicious software blocked system work, and abducted data on finance, data on clients, and about deliveries. Stolen information was given to the company producer. Information security specialist considers that the company producer who sold infected scanners could be connected with criminals who made attack to the Google Company, called Aurora.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland