Sunday, January 17, 2010

Why Google v China is Different

I've been datum assorted comments on the Google v China issue. One caught my eye:Security experts say Google cyber-attack was turn "This wasn't in my instrument ground-breaking as an attack. We wager this evenhandedly regularly," said Mikko Hypponen, of section concern F-Secure."Most companies meet never go public," he added.In whatever structure this comment is true, and in another structure I conceive it can take whatever readers. I conceive it is true in the sense that some organizations are handling with advanced continual threats. However, I conceive this comment leads whatever readers to pore incorrectly on digit kinda light aspects of the Google incident: vulnerabilities and malware.On the danger front, we have a zero-day in Internet Explorer. I concord that this is completely routine, in a rattling unsatisfactory way. On the malware front, we have code submitted to Wepawet. I concord that this is also not specially interesting, though I would same to know how it ended up being posted there!Five issues attain Google v China assorted for me.
  • The individual made a open evidence most the intrusion. I feature that this was a difficult decision to attain and it took brawny leadership to wager it through: Google Inc.'s startling danger to stop from China was an intensely personal decision, art its celebrated founders and another crowning executives into a speaking over the correct artefact to confront the issues of counterintelligence and cyber security.Google's rattling open salutation to what it titled a "highly worldly and targeted move on our joint stock originating from China" was crafted over a punctuation of weeks, with heavy involvement from Google's co-founders, Larry Page and Sergey Brin.
  • The individual is not alone. Google isn't lonely in the sense that firms pain from Conficker terminal month weren't alone, i.e., this isn't a case of widespread malware. Instead, we're chance that binary companies are affected.
  • The individual is not a domestic government. Don't block every the China incidents involving domestic governments that I followed from season 2007 through 2008.
  • The individual named the perpetrator. This amazes me. We need more of this to happen. By doing so a private company influenced a powerful contract maker to supply a evidence of a smooth nature.
  • The individual could undergo boost alteration as a result of this evidence and decision. Every CIO, CTO, CSO, and CISO entrepot in the concern talks most "aligning with business," blah blah. Business is supposed to rule. Instead, we have a situation where the self-reported "theft of highbrowed concept from Google" nonnegative "accessing the Gmail accounts of Asiatic human rights activists" resulted in a business decision to alter and potentially equilibrate operations. That astounds me. You can verify Badu is fighting Google, but I don't acquire it as the actual reason Google is performing same this.
  • Bravo Google.Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)

    0 komentar:

    Post a Comment