U.S. And China Hacking Attacks: Can The Two Cooperate On Cyber Warfare?
The United States has finally called out China on its cyber attacks, and China has responded with ... something less than fury and a clenched fist. Considering China usually just reacts with denial, outrage and anger, we'll call this new development progress.
In a speech given to the Asia Society, President Barack Obama's National Security Advisor Tom Donilon singled out China as a cybersecurity threat and called on the country to acknowledge the problem and work with the United States to find a solution.
"We need a recognition of the urgency and scope of this problem and the risk it poses — to international trade, to the reputation of Chinese industry, and to our overall relations," Donilon said in his speech. "Second, Beijing should take serious steps to investigate and put a stop to these activities. Finally, we need China to engage with us in a constructive direct dialogue to establish acceptable norms of behavior in cyberspace."
"Increasingly, U.S. businesses are speaking out about their serious concerns about sophisticated, targeted theft of confidential business information and proprietary technologies through cyber intrusions emanating from China on an unprecedented scale," he explained. "The international community cannot afford to tolerate such activity from any country."
Usually, this kind of direct accusation would only compel China to issue harsh statements against the U.S. In fact, in February China declared that it is the victim of nearly 150,000 hacking attacks every month, with the U.S. behind more than 60 percent of them.
China's Foreign Ministry Spokeswoman Hua Chunying did reiterate that the country is against cyber attacks, but she also greeted the call to the table with an open mind.
"Cyberspace needs rules and cooperation, not wars. China is willing to have constructive dialogue and cooperation with the global community, including the United States," she said.
As with many global issues, this is an area that requires mutual respect and cooperation from both countries for the problem to be solved. There's no guarantee that talks will go anywhere, but the first step is to get both parties to the table. Suddenly, that looks like a distinct possibility.
FaceApp Privacy Concerns Resurrect Amid New Gender-Bending Feature Craze: Here's Why It's Safe [and Maybe Not]
Warning! Could the new Russian Faceapp be stealing your data?
Google Confirms Malicious Chrome Extensions With 30M Downloads That Steal User Data
Numerous Google Chrome extensions have been discovered to be stealing data of its users. If you've used any of them, it would be best if you secured your accounts.
Time to Shine! Tesla is Now Accepting Design Submissions for Its Upcoming Chinese-Made Small Electric Car
Elon Musk's Tesla is now accepting design submissions for its upcoming Chinese-made small electric cars. Tesla has made this announcement official via the company's WeChat account over in China and has invited all car designers to pass their own designs for the brand new vehicle
Stay Away from these 3 Fake VPN Apps!
Here are 3 fake VPN apps that hackers and scammers are using to access your computer: Beetle VPN, Buckler VPN, and
Hat VPN Pro!
China's All Set to Find 'Aliens' Using Their New Giant Radio Telescope In September
China has a giant radio telescope, it calls FAST and they intend to use it to find aliens. But can they?
MORE IN ITECHPOST
How To Build A Gaming PC For $450 In July 2020
What do you get when you combine a used pre-built PC and a graphics card? A great gaming PC for the price.
[Watch] NASA Announces Week Update: What Happened to the Artemis Program?
Could we be closer to getting to the moon? NASA provides updates on the progress.
[Guide, Tips] How to Play Marvel's Iron Man VR And Get All The Trophies
With the release of the Marvel's Iron Man VR, now even you can take to the skies and fly through canyons as you save civilians and blast bad guys along the way.
But playing the game is even trickier than it sounds.