Home » » Center Hacker & Cracker's Nest in China?

Center Hacker & Cracker's Nest in China?

Written By Unknown on Tuesday 20 April 2010 | 03:11

Cracker cyber attacks by the increasingly volatile in the virtual world. Symantec security bureau tried to analyze Nowhere the cracker is running its action and results, they want made a city in China as the world capital of the cracker. 

Shaoxing is a city in the land of the so-called Bamboo Curtain the origins of the world's largest cyber attacks. "Shaoxing is a city in the land of the Bamboo Curtain is Referred to as the origin of the World's Largest cyber attacks.

According to Symantec, of total cyber attack originated from China 21.3 per cent were carried out from Shaoxing.According to Symantec, of a total of cyber attacks originating from China's 21.3 per cent Were carried out from Shaoxing. China topped the origin of the global cyber attacks, with percentage of 28.2 percent. "China topped the origin of the global cyber-attacks, with a percentage of 28.2 next percent.Posisi occupied by Romania with 21.1 percent followed in succession by the American States, Taiwan and the United Kingdom. " The next position is Occupied Romania with 21.1 percent, followed in succession by the United States, Taiwan and the United Kingdom. Symantec explained, the cracker in China on a stakeout


with a target of cyber attacks such as human rights activists. Symantec Explained, the cracker in China on a stakeout with a target of cyber attacks activists.Ada Poor 'human rights is sponsored by the possible attack local government. It is possible this attack was sponsored by the local government. The attack was done by sending e-mails containing attachments


Danger.The attack was done by sending e-mails containing malicious attachments. If a computer user opens an attachment that seems suspicious, kodejahat mereka.Tujuan will infect the device primarily to gain access to sensitive data or an internal system to target specific individuals or companies, the ultimate goal is to gain access to sensitive data or an internal system to target specific individuals or companies, "the Symantec Explained.
Share this article :

0 komentar:

Post a Comment

 
Support : Indonesia Military Blog | World Military Blog |
Copyright © 2014. Indonesia Blogger - All Rights Reserved
Template Created by Mas Template
Proudly powered by Blogger