Access your Pro+ Content below.
Leverage Google Attacks to Improve Cybersecurity
This article is part of the Information Security magazine issue of January/February 2010
For years, we've heard expert types tell us about targeted attacks against business units or even specific individuals inside an organization. We hear about reconnaisance done against these targets with hackers scouring messageboards, discussion forums, LinkedIn, Facebook and other places where people dump all the minutae about their lives. The experts' anecdotes are rich in speculation about the profiles organized attackers build against companies in order to craft their malicious messages and lure targets into their traps. But despite all this cloak-and-dagger color from the experts, there had yet to be a high-profile example of such an attack made public until Google decided to share details about its intimate experiences with the Chinese. It's no secret that China, whether through a state-sponsored operation or run by a criminal element there, has been stealing U.S. corporate, government and military secrets for a long time. Hacking is a cultural pastime in China and they've been passing time going through fighter jet plans,...
Features in this issue
Massachusetts 201 CMR 17.00 and Nevada's data protection law establish new standards for personal data protection
Learn how endpoint data loss prevention technology complements network DLP and secures data that users interact with on laptops, mobile and portable storage devices.
Disaster recovery plans, DLP solutions, and regulatory compliance are top enterprise priorities, according to Information Security's Priorities 2010 survey
Secure coding and vulnerability scanning could mitigate many Web application attacks
Columns in this issue
IT and security managers often make the mistake of being consumed with a specific risk or threat to the detriment of security
Security experts Bruce Schneier and Marcus Ranum debate the possibility of eliminating anonymity on the Internet.
China's hacker attacks against Google's infrastructure, including Gmail accounts of human rights activists as well as Google's source code, should be used to educate enterprises about the reality of cyberespionage from nation states and organized criminals.