China calls for cooperation, not war, in cyberspace
Chinese foreign minister denies claims that the country supported cyberattacks
IDG News Service - China's foreign minster on Saturday called on nations to cooperate on Internet security, rather than wage cyberwarfare, as he denied accusations in a recent report that the country's military was behind hacking attacks.
"Cyberspace needs not war, but rules and cooperation," said foreign minister Yang Jiechi during a press conference. "We oppose cyberspace becoming a new battlefield, and to using the Internet as a new tool to interfere in another country's internal affairs."
Yang is so far the highest Chinese official to comment on recent allegations that a large number of hacking attacks against foreign companies originated from China. The claims were detailed last month in a report by U.S. security firm Mandiant, which traced the cyber attacks to what it claimed is likely a Chinese military unit based in Shanghai.
During Saturday's press conference, Yang was asked for comment on the matter, and said the hacking allegations fail to stand up to scrutiny. "In terms of Internet security, China is a vulnerable group, and is one of the countries that faces the most severe cyber attacks," he said.
Yang added that China has continually promoted establishing a "peaceful and secure" Internet, and supported rules on the matter in the U.N. "I hope that the relevant parties will stop the irresponsible attacks and criticism, and instead take practical actions to promote mutual trust and cooperation," he said.
Chinese officials have continually disputed any involvement in cyber attacks, but the nation has often been named as the origin for high-profile hacking attempts. In 2011, security vendor McAfee also released a report claiming that a Chinese server provider had assisted hackers in stealing data from foreign companies.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Going Paperless? Here's What You Need to Think About As makers of some of the world's most popular PDF solutions, we often consult with businesses & governmental agencies that have the goal...
- The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control.
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
All Cybercrime and Hacking White Papers |