• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of things
    • Metaverse
    • Robotics
    • Security
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of things
  • Robotics
  • Security
  • Startups
  • Strategy
  • Technical

problems

Operation Aurora was a series of cyber attacks conducted by advanced persistent threats such as the Elderwood Group based in Beijing, China, with ties to the People’s Liberation Army. First publicly disclosed by Google on January 12, 2010, in a blog post, the attacks began in mid-2009 and continued through December 2009. The attack has been aimed at dozens of other organizations, of which Adobe Systems, Juniper Networks and Rackspace have publicly confirmed that they were targeted. According to media reports, Yahoo, Symantec, Northrop Grumman, Morgan Stanley and Dow Chemical were also among the targets. As a result of the attack, Google stated in its blog that it plans to operate a completely uncensored version of its search engine in China “within the law, if at all”, and acknowledged that if this is not possible it may leave China and close its Chinese offices. Official Chinese media responded stating that the incident is part of a U.S. government conspiracy. The attack was named “Operation Aurora” by Dmitri Alperovitch, Vice President of Threat Research at cyber security company McAfee. Research by McAfee Labs discovered that ‘Aurora’ was part of the file path on the attacker’s machine that was included in two of the malware binaries McAfee said were associated with the attack. “We believe the name was the internal name the attacker(s) gave to this operation,” McAfee Chief Technology Officer George Kurtz said in a blog post. According to McAfee, the primary goal of the attack was to gain access to and potentially modify source code repositories at these high tech, security and defense contractor companies.
[The SCMs] were wide open,
says Alperovitch. ‘No one ever thought about securing them, yet these were the crown jewels of most of these companies in many ways
much more valuable than any financial or personally identifiable data that they may have and spend so much time and effort protecting.”

Tweet
Share
Share
WhatsApp

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Jobs

  • Principal Data Scientist – Telecommute | Minnetonka Mills, MN, USA - August 14, 2022
  • Software Engineer | San Francisco, CA, USA - August 14, 2022
  • Senior Software Engineer | Phoenix, AZ, USA - August 14, 2022
  • Senior Software Engineer | Charlotte, NC, USA - August 14, 2022
  • Senior Software Engineer | Plano, TX, USA - August 14, 2022
More Jobs

Tags

AI Amazon analytics application Artificial Intelligence benefits BI Big Data business Cloud company Covid-19 Data design development DevOps engineer engineering environment experience future government Group health information Java knowledge machine learning mobile news platform public research security services share skills social social media software software engineer solutions strategy Systems technology

News

  • YouTube plans to launch streaming video service – WSJ
  • Exclusive-Inspired Entertainment in bid to buy slot machine maker PlayAGS – sources
  • China regulator says Alibaba, Tencent have submitted app algorithm details
  • With Alibaba stake cut, SoftBank’s Son cools toward China tech
  • EV startup Fisker explores higher production in 2023, U.S. manufacturing
More News

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • What Factors Determine the Success of Private Cloud?
  • Understanding StatefulSets in Kubernetes & When to Use Them
  • Dealing With Air Pollution in Data Centers
  • How AI/ML Based Applications Powered by Data Annotation Elevate Customer Experiences
  • Decoding Analytics In The E-Commerce Industry

Search

Tags

AI Amazon analytics application Artificial Intelligence benefits BI Big Data business Cloud company Covid-19 Data design development DevOps engineer engineering environment experience future government Group health information Java knowledge machine learning mobile news platform public research security services share skills social social media software software engineer solutions strategy Systems technology

Copyright © 2022 Datafloq
Privacy|Terms|Cookies

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!