

The number of state-sponsored attacks is increasing in impressive ways, due to the commitment of governments to cyber technology.Īccording to the last report of F-Secure related to H2 2012, one of the most interesting phenomena observed in the period is the changing of techniques for cyber espionage campaigns.

The report revealed that Chinese cyber exploitation capabilities last year were “improving significantly.” But while the US has as many enemies as allies, all of us in the cyber era are potential victims. government, military, industrial, and nongovernmental computer systems,” “In 2012, Chinese state-sponsored actors continued to exploit U.S. industry and a range of government and military targets face repeated exploitation attempts by Chinese hackers, as do international organizations and nongovernmental groups including Chinese dissident groups, activists, religious organizations, rights groups, and media institutions.”

China Economic and Security Review Commission revealed that “U.S. The Chinese government is considered the biggest aggressor in cyber espionage, while US networks are the privileged targets of cyber attacks that hit every sector, from media to military.Ī report published in 2012 by the U.S. Profit, power and protest are the main motivations behind the attacks, radically affecting a user’s approach to the web and its perception of security.Ĭybercrime, governments, and groups of hacktivists tend to lean toward the spread of malicious agents that have the capacity to silently infiltrate their targets, stealing confidential information from them. Network surveillance appliances, communication cracking techniques, malware and “social network poisoning” are just a few of the methods adopted for political, economic or criminal intents. The technologies used to spy on victims, and the motivations behind them vary.
