Tag Cloud



Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

Web Scrubbing in China
Within days of China being pinpointed as the home of a massive hacking base, the BBC has alleged that China has been regularly blocking their radio and TV broadcasts and their Chinese-language website. A BBC news crew was detained by military personnel and had their video footage confiscated as ...
Posted 15 April 2013 by Jean-Loup Richet
Censorship’s Losing Battle in China
Recently, Brad Pitt was the latest celebrity to join up to China’s foremost micro-blogging platform, Sina Weibo, joining the likes of Selena Gomez, Paris Hilton, Emma Watson, and, strangely, London mayor Boris Johnson. Sina Weibo is in Mandarin, of course, but companies such as FansTang in the ...
Posted 27 February 2013 by Jean-Loup Richet
Recently, China has tightened its control over VPNs (virtual private networks), the systems that allowed many of its people to access banned sites. Basically, a VPN is a private network that sends and receives data through public systems. It remains private through a combination of dedicated co ...
Posted 21 January 2013 by Jean-Loup Richet
How Do You Define a Data Breach?
As I have promised in previous posts, I will continue to use this space to publish comments and letters we receive on our coverage. This most recent comment came from someone read our news item a few weeks ago about the recent spearphishing attack on the White House. Our reader noted: "Infos ...
Posted 19 October 2012 by Drew Amorosi
Cyberespionage: The Chinese State of Denial
Today I spoke with Roger Cressey, a cybersecurity and counterterrorism expert for both the Clinton and Bush administrations, and now a senior VP with Booz Allen Hamilton. I asked him if he was equally amused by the Chinese government’s continuous denials that hackers within its borders activel ...
Posted 16 November 2011 by Drew Amorosi
Showing 1 - 5 of 5 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×