IDG News Service - China denied Thursday involvement in malware attacks designed to shut down the U.S. electrical grid in a time of war.
"The incident of attacks on the U.S. electrical grid from China and Russia simply does not exist," Chinese foreign ministry spokeswoman Jiang Yu told reporters, according to a transcript of the briefing.
"We hope the concerned media will cautiously handle groundless statements and especially critiques against China."
Widespread intrusions by cyberspies in countries, including China and Russia, have infected the U.S. power grid with software that could be used to halt its operation, a Wall Street Journal report said this week, citing unnamed U.S. national security officials.
The newest allegations of Chinese cyberespionage follow long-standing concern that a coordinated attack on the U.S. power grid could cripple its operation.
China produces the majority of the world's malware, but part of it could come from attackers in other countries, who often hide behind Chinese IP addresses.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts