China calls for cooperation, not war, in cyberspace
Chinese foreign minister denies claims that the country supported cyberattacks
IDG News Service - China's foreign minster on Saturday called on nations to cooperate on Internet security, rather than wage cyberwarfare, as he denied accusations in a recent report that the country's military was behind hacking attacks.
"Cyberspace needs not war, but rules and cooperation," said foreign minister Yang Jiechi during a press conference. "We oppose cyberspace becoming a new battlefield, and to using the Internet as a new tool to interfere in another country's internal affairs."
Yang is so far the highest Chinese official to comment on recent allegations that a large number of hacking attacks against foreign companies originated from China. The claims were detailed last month in a report by U.S. security firm Mandiant, which traced the cyber attacks to what it claimed is likely a Chinese military unit based in Shanghai.
During Saturday's press conference, Yang was asked for comment on the matter, and said the hacking allegations fail to stand up to scrutiny. "In terms of Internet security, China is a vulnerable group, and is one of the countries that faces the most severe cyber attacks," he said.
Yang added that China has continually promoted establishing a "peaceful and secure" Internet, and supported rules on the matter in the U.N. "I hope that the relevant parties will stop the irresponsible attacks and criticism, and instead take practical actions to promote mutual trust and cooperation," he said.
Chinese officials have continually disputed any involvement in cyber attacks, but the nation has often been named as the origin for high-profile hacking attempts. In 2011, security vendor McAfee also released a report claiming that a Chinese server provider had assisted hackers in stealing data from foreign companies.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cybercrime and Hacking White Papers | Webcasts