China calls for cooperation, not war, in cyberspace
Chinese foreign minister denies claims that the country supported cyberattacks
IDG News Service - China's foreign minster on Saturday called on nations to cooperate on Internet security, rather than wage cyberwarfare, as he denied accusations in a recent report that the country's military was behind hacking attacks.
"Cyberspace needs not war, but rules and cooperation," said foreign minister Yang Jiechi during a press conference. "We oppose cyberspace becoming a new battlefield, and to using the Internet as a new tool to interfere in another country's internal affairs."
Yang is so far the highest Chinese official to comment on recent allegations that a large number of hacking attacks against foreign companies originated from China. The claims were detailed last month in a report by U.S. security firm Mandiant, which traced the cyber attacks to what it claimed is likely a Chinese military unit based in Shanghai.
During Saturday's press conference, Yang was asked for comment on the matter, and said the hacking allegations fail to stand up to scrutiny. "In terms of Internet security, China is a vulnerable group, and is one of the countries that faces the most severe cyber attacks," he said.
Yang added that China has continually promoted establishing a "peaceful and secure" Internet, and supported rules on the matter in the U.N. "I hope that the relevant parties will stop the irresponsible attacks and criticism, and instead take practical actions to promote mutual trust and cooperation," he said.
Chinese officials have continually disputed any involvement in cyber attacks, but the nation has often been named as the origin for high-profile hacking attempts. In 2011, security vendor McAfee also released a report claiming that a Chinese server provider had assisted hackers in stealing data from foreign companies.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts