Comments Subscribe to Personal Liberty News Feed Subscribe to Personal Liberty
 

China Tops List Of Sources Of Cyber-Espionage Attacks In 2012

NEW YORK (UPI) — China was the main source of cyber-espionage attacks in 2012, with Chinese IP addresses accounting for 30 percent of data breaches worldwide, a report says.

Ninety-six percent of those attacks were made for online espionage purposes, the 2013 Data Breach Investigation Report prepared by Verizon said.

China was the only Asian country on the top 10 threat origins list, the report released Monday said.

Romania came in second at 28 percent of the 2012 data breaches and the United States was third with 18 percent, the report added.

The vast majority of attacks from China were linked to cyber-espionage-related motivations, in contrast to the other countries on the list whose data breaches were mostly financially motivated, it said.

“This may mean that other threat groups perform their activities with greater stealth and subterfuge, but it could also mean that China is, in fact, the most active source of national and industrial espionage in the world today,” the report said.

However, a Verizon official said, the high number of data breaches attributed to China doesn’t necessarily mean it is the most active perpetrator of cyber-espionage activities.

The number could be because Internet regulation in China is not as strict as other countries, attracting criminals to use it as a base of hacking activities, Patrick Lum, senior consultant at Verizon Business, told ZDNet Asia.

“We are not going with the ‘China is bad and scary’ message. Rather, it’s certainly big and an important part of the entire picture, and it is definitely an up and coming [trend] in the security landscape,” Lum said.

UPI - United Press International, Inc.

Since 1907, United Press International (UPI) has been a leading provider of critical information to media outlets, businesses, governments and researchers worldwide.

Facebook Conversations

Join the Discussion:
View Comments to “China Tops List Of Sources Of Cyber-Espionage Attacks In 2012”

Comment Policy: We encourage an open discussion with a wide range of viewpoints, even extreme ones, but we will not tolerate racism, profanity or slanderous comments toward the author(s) or comment participants. Make your case passionately, but civilly. Please don't stoop to name calling. We use filters for spam protection. If your comment does not appear, it is likely because it violates the above policy or contains links or language typical of spam. We reserve the right to remove comments at our discretion.

Is there news related to personal liberty happening in your area? Contact us at newstips@personalliberty.com

Bottom
close[X]

Sign Up For Personal Liberty Digest™!

PL Badge

Welcome to PersonalLiberty.com,
America's #1 Source for Libertarian News!

To join our group of freedom-loving individuals and to get alerts as well as late-breaking conservative news from Personal Liberty Digest™...

Privacy PolicyYou can opt out at any time. We protect your information like a mother hen. We will not sell or rent your email address to anyone for any reason.