Google corteja a China tras años de enfrentamiento a través del juego del go – El Mostrador

Google, el buscador más popular de internet y una de las mayores empresas del mundo, está bloqueado en China desde 2010, pero esta semana la compañía estadounidense ha intentado ganarse de nuevo a las autoridades del país con más internautas del mundo con algo tan sorprendente como un torneo de un juego mental.

Fuente: Google corteja a China tras años de enfrentamiento a través del juego del go – El Mostrador


China’s new cybersecurity law sparks fresh censorship and espionage fears | World news | The Guardian

Legislation raises concerns foreign companies may need to hand over intellectual property and help security agencies in return for market access

Fuente: China’s new cybersecurity law sparks fresh censorship and espionage fears | World news | The Guardian


El pionero satélite cuántico chino que puede revolucionar las comunicaciones del mundo – El Mostrador

Se trata de un millonario y ambicioso proyecto apodado QUESS, que pone al gigante asiático a la cabeza de una revolución tecnológica: crear nuevas redes de comunicación globales a prueba de hackeos.

Fuente: El pionero satélite cuántico chino que puede revolucionar las comunicaciones del mundo – El Mostrador


China’s scary lesson to the world: Censoring the Internet works – The Washington Post

BEHIND THE FIREWALL: How China tamed the Internet | This is part of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

Fuente: China’s scary lesson to the world: Censoring the Internet works – The Washington Post


China: When big data meets big brother – FT.com

When browsing the internet in China, be sure to avoid logging on between 2am and 4am, steer clear of websites offering quick loans and beware of changing your mobile phone handset too often. A good rule of thumb is to order curtains for your office,

Fuente: China: When big data meets big brother – FT.com


Hackers take down Lenovo website – FT.com

Hackers take down Lenovo website – FT.com.

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. http://www.ft.com/cms/s/0/77843ec2-bd5f-11e4-b523-00144feab7de.html#ixzz3SzdZG1cE

 

February 26, 2015 2:45 am

Hackers take down Lenovo website

 

A pedestrian walks past the Lenovo Group Ltd. flagship store on Qianmen Street in Beijing, China, on Tuesday, Nov. 11, 2014. Lenovo Chief Executive Officer Yang Yuanqing has expanded in computer servers and mobile phones, including the $2.91 billion purchase of Motorola Mobility, to help combat a shrinking personal-computer market. Photographer: Tomohiro Ohsumi/Bloomberg©Bloomberg

Lenovo’s website has been hacked, less than a week after the personal computer maker was forced to disable controversial software that left users of its laptops vulnerable to cyber attacks.

On Thursday, the group – the world’s largest PC manufacturer by unit sales – said that users trying to visit its website had been redirected to another site by hackers.Hacker collective Lizard Squad had claimed credit for the attack via Twitter, where it also posted internal Lenovo e-mails discussing Superfish, the advertising software that the PC maker disabled on its products last week.

Lizard Squad has previously claimed credit for cyber attacks on Sony’s PlayStation network and Microsoft’s Xbox Live network. On Thursday, it also boasted of an attack on Google’s Vietnamese website.

Lenovo said it had taken its website down and was also investigating “other aspects” of the attack.

Later on Thursday morning, visitors to lenovo.com on Thursday morning received a message stating: “The Lenovo site you are attempting to access is currently unavailable due to system maintenance.” It was restored on Thursday afternoon.

Last week, Lenovo acknowledged that its consumer division had sold laptops pre-installed with controversial advertising software called Superfish that potentially left its computers open to being hacked. It said it had stopped installing Superfish on new units in January and disabled the software on existing machines.

Computer experts had warned of a security hole in the software that hackers could exploit to eavesdrop on a user’s web-browsing behaviour.

 


Lenovo admits to software vulnerability – FT.com

Lenovo admits to software vulnerability – FT.com.

 

Last updated: February 19, 2015 7:00 pm

Lenovo admits to software vulnerability

 

Lenovo Group Ltd. signage is displayed near laptops in an arranged photograph at a Lenovo store in the Yuen Long district of Hong Kong, China, on Friday, May 23, 2014. Lenovo, the world's largest maker of personal computers, reported a 25 percent jump in fourth-quarter profit as its desktop models and mobile devices gained global market share. Photographer: Brent Lewin/Bloomberg©Bloomberg

Lenovo, the world’s largest computer manufacturer by unit sales, has been forced to disable controversial software that left users of its laptops vulnerable to hacking attacks.

The software Superfish, which was pre-installed on Lenovo’s devices, was billed as a free “visual search” tool. But Lenovo used it to inject adverts into web pages.

More controversially, however, computer experts have discovered that Superfish contains a major security hole that hackers can potentially exploit to eavesdrop on a user’s web-browsing behaviour.

Users have been raising concerns about Superfish on Lenovo’s own online forums since September, complaining that the software is putting additional advertising into web pages without their permission.

Computer manufacturers often pre-install so-called “adware” into their laptops and PCs in exchange for payment by the software makers, which in turn make money from advertisers.

Lenovo said its customers were given a choice about whether to use the product.

However, Graham Cluley, an independent security expert, said the way in which Lenovo had installed the adware was “cack-handed, and could be exploited by a malicious hacker to intercept the traffic of innocent parties”.

While there is no evidence that hackers have exploited the vulnerability, Mr Cluley said: “If you have Superfish on your computer you really can’t trust secure connections to sites any more.”

 


Chinese Android phones contain in-built hacker 'backdoor' | Technology | The Guardian

Chinese Android phones contain in-built hacker ‘backdoor’ | Technology | The Guardian.

Coolpad
 Smartphones from Chinese manufacturer Coolpad found to have malware pre-installed. Photograph: Coolpad

Smartphones from a major Chinese manufacturer have a security flaw that was deliberately introduced and allows hackers full control of the device.

The “CoolReaper” backdoor was found in the software that powers at least 24 models made by Coolpad, which is now the world’s sixth-biggest smartphone producer according to Canalys.

The flaw allows hackers or Coolpad itself to download and install any software onto the phones without the user’s permission.

“The operator can simply uninstall or disable all security applications in user devices, install additional malware, steal information and inject content into the users device in multiple ways,” according to a report on the malware by security firm Palo Alto Networks (Pan).


Televisión china acusa al iPhone de amenazar la seguridad nacional – BioBioChile

Televisión china acusa al iPhone de amenazar la seguridad nacional – BioBioChile.


Yutaka Tsutano (CC)

Yutaka Tsutano (CC)

Publicado por Carolina Reyes | La Información es de Agencia AFP
Los teléfonos iPhone vendidos por el estadounidense Apple son una amenaza para la seguridad nacional de China debido a su dispositivo de geolocalización, afirmó la televisión pública CCTV.

Al hacer posible, simplemente con activar un parámetro del smartphone, seguir a una persona, el teléfono de Apple puede ser utilizado para recopilar “datos muy sensibles”, explicó Ma Ding, directora del Instituto de seguridad de internet de la Universidad de seguridad pública del pueblo.

Por ejemplo, “si el usuario es un periodista, se pueden conocer los lugares a los que fue, en donde hizo entrevistas, y se puede incluso saber sobre qué temas trabaja, políticos o económicos”, detalló Ma Ding durante un largo reportaje transmitido en la televisión pública el viernes.

Según Ma, la geolocalización de millones de usuarios de iPhone hace posible obtener informaciones sobre las condiciones de vida o la economía de un país, e incluso sobre “secretos de Estado”.

Sin embargo, varios internautas chinos acusaron a la televisión de Estado de concentrarse únicamente en los iPhone, y en su sistema operativo iOS d’Apple, ignorando los peligros potenciales de otros teléfonos inteligentes.

“Casi todos los smartphones fabricados en China funcionan con Android (el sistema operativo de Google) ¿Es más seguro? CCTV ignora deliberadamente esto y engaña al mundo”, opinó un internauta.


EEUU alerta sobre el “efecto desalentador” de la piratería – BioBioChile

EEUU alerta sobre el “efecto desalentador” de la piratería – BioBioChile.

 

AFP PHOTO LOIC VENANCEAFP PHOTO LOIC VENANCE

 

Publicado por Gabriela Ulloa | La Información es de Agencia AFP

 

El secretario de Estado norteamericano, John Kerry, denunció el jueves en Pekín el “efecto desalentador” de la piratería en Internet para las empresas estadounidenses, tras dos días de reuniones de alto nivel con responsables chinos.

“Los casos de ciberrobo han perjudicado nuestro negocio y amenazan la competitividad de nuestra nación”, alertó Kerry duramente durante la sesión de clausura.

“La pérdida de la propiedad intelectual a través del ciberespionaje tiene un efecto desalentador en la innovación y en la inversión”, añadió el secretario de Estado.

Washington acusó en mayo a cinco militares chinos de piratear compañías estadounidenses.

Este era uno de los asuntos del sexto Diálogo Estratégico y Económico anual entre las dos potencias económicas mundiales.

China insiste también en que es una víctima de la piratería y acusa a Washington de hipocresía, en referencia a los programas de espionaje estadounidenses alrededor del mundo.

Las informaciones filtradas por el ex asesor de la agencia de inteligencia estadounidense NSA, Edward Snowden, apuntan a un espionaje generalizado de Estados Unidos en China.

El consejero de Estado chino Yang Jiechi dijo que la ciberseguridad era “una amenaza y un reto común para todos los países”.

“El ciberespecio no debería convertirse en una herramienta para dañar los intereses de otros países”, alertó Yang.

A pesar de las peticiones de Estados Unidos, Pekín no estaba de acuerdo en reanudar un grupo de trabajo sobre ciberseguridad suspendido después de estas acusaciones sin precedentes.


House intelligence chair says Edward Snowden backs Russian expansionism | World news | theguardian.com

House intelligence chair says Edward Snowden backs Russian expansionism | World news | theguardian.com.

• Mike Rogers stands by claim that Snowden had Russian help
• Chinese telecoms giant Huawei condemns ‘NSA infiltration’

huawei
A rack server is seen at the Huawei stand at the 2014 CeBIT technology trade fair in Hanover, Germany. Photograph: Nigel Treblin/Getty Images

The chairman of the House of Representatives intelligence committee, Mike Rogers, on Sunday stood by his claim that the former National Security Agency contractor Edward Snowden, who last year provided thousands of secret documents to media outlets including the Guardian,had been helped by Russia.

On Saturday, in the latest disclosure from such documents, the New York Times and the German magazine Der Spiegel reported that the NSA had obtained sensitive data form the Chinese telecommunications giant Huawei.

Asked on NBC’s Meet the Press if he had been irresponsible in making such a charge without evidence, Rogers said: “First of all, I see all the evidence and intelligence, from everything in the activities leading up to this event to very suspicious activity during the event. When you talk to the folks leading the investigation they cannot rule it out.

“No counter-terrorism official in the United States does not believe that Mr Snowden … is not under the influence of Russian intelligence services. We believe he is, I certainly believe he is today.

“For the investigators, they need to figure out when did that influence start. Was he interested in co-operating earlier than what the timeline would suggest?”

Rogers also sought to link Snowden’s actions to Russia’s occupation of Crimea and concerns over the massing of Russian troops on Ukraine’s eastern border.

He said: “He [Snowden] is under the influence of Russian intelligence officials today [and] he is actually supporting, in an odd way, the brazen brutality and expansionism of Russia. He needs to understand that and I think Americans need to understand that in its proper context.”

Elsewhere on Sunday, Huawei defended its independence and said it would condemn any infiltration of its servers, if reports of such activities by the NSA were true.

“If the actions in the report are true, Huawei condemns such activities that invaded and infiltrated into our internal corporate network and monitored our communications,” Huawei’s global cyber security officer, John Suffolk, told Reuters.

Defending Huawei’s independence and security record and saying it was very successful in 145 countries, Suffolk added: “Corporate networks are under constant probe and attack from different sources – such is the status quo in today’s digital age.”

In October 2012, Rogers presided over the release of a Houseintelligence committee report which said US firms should avoid doing business with Huawei and another Chinese telecoms company, ZTE, because they posed a national security threat.

At the time, he said in comments broadcast by CBS: “Find another vendor [than Huawei] if you care about your intellectual property; if you care about your consumers’ privacy and you care about the national security of the United States of America.”

The New York Times said one goal of the NSA operation against Huawei, code-named “Shotgiant”, was to uncover any connections between the company and the Chinese People’s Liberation Army. But it also sought to exploit Huawei’s technology and conduct surveillance through computer and telephone networks Huawei sold to other countries.

If ordered by the US president, the NSA also planned to unleash offensive cyber operations, the newspaper said.

The paper said the NSA gained access to servers in Huawei’s sealed headquarters in Shenzhen and got information about the workings of the giant routers and complex digital switches the company says connect a third of the world’s people.


Dos millones de personas vigilan internet en China – BioBioChile

Dos millones de personas vigilan internet en China – BioBioChile.


Jakub Krechowicz (SXC)

Jakub Krechowicz (SXC)

Publicado por Denisse Charpentier | La Información es de Agencia AFP

Unos dos millones de personas trabajan en la vigilancia y en la censura de internet en China, afirmó un diario de la prensa oficial que revela aspectos de este ejército secreto.

Muchas de estas personas disponen de un programa que permite seleccionar, con palabras claves, un enorme volumen de mensajes que circulan en las redes sociales chinas, precisó el diario Noticias de Pekín, en un artículo publicado el jueves.

Los “policías de la red”, pagados por los órganos de propaganda del gobierno y del Partido Comunista, así como por los sitios comerciales, se encargan de evitar que las redes sociales sirvan de espacio para criticar el régimen comunista o perturbar el orden establecido.

Sin embargo, a pesar de su gran número, estos agentes no pueden impedir que informaciones y comentarios no deseados por las autoridades chinas sean finalmente publicados y compartidos en la red.

El trabajo consiste en “vigilar y obtener información concerniente a los clientes”, indicó al diario uno de estos trabajadores, que rechaza la imagen de “agente secreto en línea”.

Las autoridades chinas refuerzan actualmente el control de las informaciones difundidas en las redes sociales.

Según una directiva recientemente adoptada por el poder, en el caso de que un microblog considerado ofensivo sea visto por 5.000 personas, su autor puede ser encarcelado.

Asimismo, los internautas chinos autores de un mensaje difamatorio compartido al menos 500 veces se arriesgan a una pena de tres años de prisión.