In
a strange kind of step, announced U.S. Secretary of State John Kerry
for the establishment of a working group in cooperation with China to
work on the fight against cyber crime.
The agreement comes after several mutual accusations between the two countries Bashot penetrate several operations carried out by entities affiliated or supported for both countries.
The network quoted by Reuters and U.S. Secretary of State saying that cyber crimes affecting the financial sectors and expenses and the transfer of funds and therefore affected all aspects of life in the developed countries as a result of use of electronic networks,
and added that each
state interest in protecting its people and their rights and their
infrastructure.The agreement comes after several mutual accusations between the two countries Bashot penetrate several operations carried out by entities affiliated or supported for both countries.
The network quoted by Reuters and U.S. Secretary of State saying that cyber crimes affecting the financial sectors and expenses and the transfer of funds and therefore affected all aspects of life in the developed countries as a result of use of electronic networks,
The previous incidents suggest the Chinese government to spy on United States Aguetsaaa using several methods technique, and that CIA did not hesitate to spy on China.
At the end of last February, revealed the Chinese Defense Ministry for a range of evidence and details about the penetration attacks on Internet sites affiliated, and then accused the United States of America and campaign responsible for two-thirds of those attacks.
The Chinese Internet sites have been exposed to more than 144 thousand attempt to penetrate a month, and the ministry says that 63% of those threats come from a U.S. IP numbers.
And at the same time last October spoke of an American newspaper in a report for the Chinese attacks threaten sensitive networks of computers in the White House, including those in which codes maintained private nuclear issues.
The White House has confirmed officially for attacks but downplayed its importance as phishing attempts to unclassified computer networks.
No comments:
Post a Comment