Apparently, it's not just China that's allegedly trying to hack into the databases of major Internet companies; if Google can be believed, Vietnam is trying the same trick. And disturbingly, the kind of soldiers -- IT security workers -- needed to counteract these attacks is at a premium.
Vietnam Denies Accusations of Hacking By Google
Just a little while after claiming to have problems with hackers in China, Google now claims that hackers from another country, this time Vietnam, have struck. The Chinese hackings were allegedly performed in an attack on dissenting points of view that clashed with the government, and the Vietnamese attacks are said to be of a similar nature.
The Chinese attack affected computers owned by several known human rights activists as well as some companies. The Aurora network is the group said to be behind these attacks, which were considered to be high in complexity. Luckily or unluckily, depending on how you want to view it, the Vietnamese attacks are not assumed to be from the Aurora group. They are also not as complex as the Chinese attacks.
The Vietnamese-based attacks have affected the computers around the world of people that speak Vietnamese. The amount of people affected is believed to be in the tens of thousands. The virus used was entrenched in software that presented itself to be used harmlessly as Vietnamese keyboard software.
The reason these specific people were targeted is not completely known. One theory, however, is that their machines were hacked after voicing opposition to bauxite mining in the nation, whether it be in blogs or on other, similar sites. The virus would allow its hackers to monitor such dissenting sites, and then issue denial of service attacks.
The Vietnamese government has vehemently denied the accusations from Google, saying that they do not support hacking. Google, however, has stated that the malware was traced to IP addresses located in Vietnam, further supporting their claims.
For more on this issue, visit PC World's item on the situation.
Cyberwarriors Currently at a Premium for Many Large Corporations
While the job hunt for many in the current downtrodden economy may be difficult, such is not the case for many Internet security experts, hackers, or “cyberwarriors.” In fact, this next generation of cyberwarriors, which are expected to protect the computer systems of many huge corporations as well as the U.S. government, are at such a premium that many are now participating in events to showcase their skills.
One such event was recently held at California State Polytechnic University in March, where several young budding cybersecurity experts battled against one another to impress prospective employers. Among the employers looking for the next wave of defense for their corporations are companies like Boeing and Microsoft.
This particular event was a mock hacking competition where some participants tried to hack into simulated corporate networks while others tried to keep them out. The event was not for entertainment, however, as some participants fielded job offers when it was over.
To get a sense of the increasing demand for cybersecurity workers, one only has to look at Boeing as an example. In 2004, Boeing employed only 100 such workers. That number has since ballooned to 2,000 workers, and it is sure to grow even more.
Several more events and competitions will be held in the future by companies like McAfee, Microsoft, and even the federal government, who need young talent to protect their vital infrastructure. Hopefully they will find what they are looking for, as the well-being of many depends on their protection.
To read more on the recruitment of cybersecurity workers, visit: http://www.bloomberg.com/apps/news?pid=20601100&sid=abmfWsuQyyk0
| DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware. |
More Web Hosting Security Articles
More By wubayou