Error
  • JUser::_load: Unable to load user with id: 67

Featured Articles

Intel refreshes CPU roadmap

Intel refreshes CPU roadmap

Intel has revealed an update to its CPU roadmap and some things have changed in 2015 and beyond. Let’s start with the…

More...
Hands on: Nvidia Shield Tablet with Android 5.0

Hands on: Nvidia Shield Tablet with Android 5.0

We broke the news of Nvidia's ambitious gaming tablet plans back in May and now the Shield tablet got a bit…

More...
Nokia N1 Android tablet ships in Q1 2015

Nokia N1 Android tablet ships in Q1 2015

Nokia has announced its first Android tablet and when we say Nokia, we don’t mean Microsoft. The Nokia N1 was designed…

More...
Marvell launches octa-core 64-bit PXA1936

Marvell launches octa-core 64-bit PXA1936

Marvell is better known for its storage controllers, but the company doesn’t want to give up on the smartphone and…

More...
Nvidia GTX 970 SLI tested

Nvidia GTX 970 SLI tested

Nvidia recently released two new graphics cards based on its latest Maxwell GPU architecture, with exceptional performance-per-watt. The Geforce GTX 970…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Friday, 30 November 2007 10:42

China denies it is world hacker

Written by

Image

McAfee earns no friends in Beijing


A report by computer security company, McAfee, which claims that China is the most aggressive hacker in the world, has been hotly denied by Beijing.

The report indicated that China was the world's most aggressive offender in probing for holes in other nations' Internet security and that it is at the forefront of a cyber cold war.

But China's Foreign Ministry spokesman, Liu Jianchao, said at a briefing that his country has also been attacked by hackers of other countries, thus, the Chinese government attaches great importance to and participates in international law enforcement cooperation in this area. Liu refused to reveal which countries were targeting China.

McAfee said about 120 countries are developing cyber attack strategies and most are merely testing them to determine the risks involved in certain tactics.
Last modified on Sunday, 02 December 2007 20:09

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments