Cyber Attacks a Constant for Australia

By

It seems all we read in tech news these days is the proliferation of cyber attacks, especially those involving big companies. From Sony’s nearly two-month long outage to Google’s Gmail security breach, it’s no wonder officials are trying to crack down and get to the bottom of it.

The U.S. is not the only one keeping tabs on the many attacks. In fact, Australian attorney-general says that cyber attacks are so frequent that their public and private networks are always under constant threat.

Robert McClelland, attorney-general, said “The position of the Australian government has not identified the source is suspected of espionage.”

“The reality is undoubtedly espionage can be made by other countries, organized criminals and even by business rivals.”

McClelland said it was “undoubtedly” beneficial to remain in Australia to develop and deploy, cyber threats, as he announced the forthcoming White Paper on the Australian Internet Security, which will be published in 2012.

“The security agencies are finding malicious activity is increasing at a point where systems of government and the private sector are under constant threat,” he said in a speech to business leaders on Cybercrime.

AFP reported that the computers of Australia's prime minister, foreign and defense ministers were all suspected of being hacked in March, with China under suspicion.

Beijing has dismissed the allegations as “groundless and made out of ulterior purposes.”

China is getting a lot of the blame this week, and Google was the one to point the finger.

Hundreds of Gmail passwords have been compromised from accounts, which include American politicians, and so Google is putting the blame on an already strained relationship with China.

China, however, says it is not to blame for the hack.

Foreign Ministry spokesman Hong Lei called it unacceptable for Google to blame China for trying to steal the email account passwords of senior U.S. government officials, Chinese activists and journalists.

The allegations that the Chinese government is supporting hacking are baseless, said Hong, and stem from what he says are ulterior motives. He added the Chinese government highly values Internet safety and monitors the Internet.

Google said, “This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists.”

With the frequency of cyber attacks on governments and large corporations on the rise, military establishments like Pentagon are looking to take urgent measures. Sources suggest that Pentagon has already finished drafting its first official computer sabotage strategy after the recent breach at Google.

The Pentagon has maintained that cyber attacks on the country will be treated as an act of war. Sending a clear message to the Chinese perpetrators, Pentagon officials went on to suggest that US could opt for military retaliation. The Wall Street Journal quoted an official as saying, “If you shut down our power grid, maybe we will put a missile down one of your smoke stacks”.

Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2011, taking place Sept. 13-15, 2011, in Austin, Texas. ITEXPO offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. To register, click here.




Michelle Amodio is a TechZone360 contributor. She has helped promote companies and groups in all industries, from technology to banking to professional roller derby. She holds a bachelor's degree in Writing from Endicott College and currently works in marketing, journalism, and public relations as a freelancer.

Edited by Jennifer Russell

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More