Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 3000 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

China denies role in Canada government hack

February 18 2011

The Chinese government is denying any involvement in a reported cyberattack on the Canadian government, which was ultimately traced to a Chinese server.

The Chinese government is firmly opposed to hacking and other criminal acts, Foreign Ministry Spokesman Ma Zhaoxu said. China is also a victim of computer hacking, he said. "The allegation that China supports hacking is groundless," he said.

The Canadian Broadcasting Corporation (CBC) reported Wednesday that authorities were forced to shut down Internet access to thousands of workers in the Canadian government's Finance Department and Treasury Board, after attackers "posing as the federal executives, sent emails to departmental technical staffers, conning them into providing key passwords unlocking access to government networks," the CBC said.

The purpose of the attack was apparently to steal documents that contained classified government information.

Victims were also tricked into opening maliciously encoded documents, using a well-known technique called spear-phishing. With spear-phishing, the attacker does some research ahead of time and then picks a small number of victims, sending them a believable looking document, a memo about an upcoming event, sent from a company executive for example, in the hopes that the victim will open this malicious attachment and their computer would be hacked.

The hacked computer is then used as a jumping-off point for computer-based espionage, as the hackers prowl through the victim's network in search of data.

This technique has been used successfully against US government agencies and contractors for years now, according to security experts. Many believe these spear-phishing attacks to be part of a concerted espionage effort by the Chinese government, but this is nearly impossible to prove. China is often used as a path for all types of cyberattacks and it is possible that the attacker in this latest incident simply routed traffic through Chinese servers.

The Canadian government learned it had been compromised in January, the CBC reported. The office of Canadian Prime Minister Stephen Harper could not immediately be reached for comment.

Sours From

View more news

 
  Most Popular
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html