THE new RED menace

Sausner, Rebecca
May 2007
Bank Technology News;May2007, Vol. 20 Issue 5, p27
Trade Publication
The article discusses the gravity of issues associated with the emergence of nation-state threat that China's cyber army poses to the U.S. national security. The author analyzes the implications of the China-based cyber threat on the country's financial institutions. Moreover, the article probes whether the threat is government sponsored or merely randomized act of crimeware. INSET: THE Taiwan SCENARIO.


Related Articles

  • Untitled. Anderson, Kent // Computer Weekly;10/7/2008, p6 

    The article discusses the issue concerning the growth of politically motivated computer crime in Great Britain. It indicates the assertion of the government regarding the move of the security and intelligence agencies to continue to protect the country from covert activity by foreign...

  • 'Hacktivism' Reigned in 2011: Verizon. Eddy, Nathan // eWeek;3/23/2012, p3 

    The article provides information on the "2012 Data Breach Investigation Report" released by telecommunication company Verizon regarding cyber-hacking. The report reveals that 58 percent of the data stolen in 2011 is accounted for hacktivism, while, 97 percent were avoidable. The report shows...

  • Cyber Antagonism Between Hacker Groups Develops new Challenges. Heicker√∂, Roland // Proceedings of the European Conference on Information Warfare & ;2010, p88 

    The rapid development of information technology does not only change the way to interact, communicate and distribute information between people and organisations. It also creates new possibilities for conducting antagonistic, criminal and hazardous activities by using the Internet. A qualified...

  • "Vast Scale of Cloud Hacking".  // International Journal of Micrographics & Optical Technology;2010, Vol. 28 Issue 3, p7 

    The article offers information on the survey on cloud hacking that was conducted to information technology (IT) participants on the Defense Readiness Condition (DEF CON) 2010 Hacker conference. It mentions that the survey was sponsored by Fortify Software Inc., in which 96% respondents believed...

  • Have You Been Hacked? Schiffer, Larry P. // TortSource;Fall2014, Vol. 17 Issue 1, p8 

    The article focuses on the issues of cybercrime and computer hacking. It explains how a computer hacker takes over multiple computers by installing malicious code. The author also offers tips on how to address the prevalence of hacking, such as having an up-to-date virus protection and other...

  • RED HACKERS, THE EAGLE UNION, AND UNIT 61398. Hesterman, Jennifer // Counter Terrorist;Feb/Mar2014, Vol. 7 Issue 1, p56 

    The article focuses on the growth of cyber-attacks as a primary domestic threat. Topics include the "Advanced Persistent Threat" report released by the American cyber-security firm Mandiant which concludes the involvement of the government of People's Republic of China (PRC) in the cyber-attack...

  • Understanding The Evil Hacker Mentality, and Defending Against It. McMurry, James // Orange County Business Journal;4/27/2015, Vol. 38 Issue 17, pC-48 

    The article discusses issues related to understanding the mentality of hackers and on how to prevent computer crimes. It highlights the association of the 17th century epic poem titled "Paradise Lost" by John Milton to the malicious hackers who breaks into computer networks and gain personal...

  • No Longer for Fun: Exploiting the Internet for Profit. Thomas, Vinoo // Siliconindia;Apr2008, Vol. 11 Issue 3, p36 

    The article discusses how hackers execute different types of Internet crimes as well as the tools that they use and cites preventive measures to thwart web hackers. Accordingly, the motive of attackers have changed from mere recognition and popularity to organizing crimes motivated by easy...

  • Keeping Advanced Persistent Threats At Bay. Maurya, Rajesh // PC Quest;Jan2014, p40 

    The article focuses on how to prevent and manage advanced persistent threats (APTs). Topics discussed include the significance of determining who is behind the APT attacks, determining the target of the attack, and options which can be applied to prevent and manage the attack. It also provides...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics