Connor Livingston Connor Livingston is a tech blogger who will be launching his own site soon, Lythyum. He lives in Oceanside, California, and has never surfed in his life. Find him on Twitter, Facebook, and Pinterest.

China used a cyber super weapons to take down GitHub

47 sec read

Remember that prolonged cyberattack that GitHub suffered last month, the one that was suspected to have been conducted by the Chinese government? Well, researchers are suggesting that this wasn’t an ordinary attack, it was the first target for what’s being called the Great Cannon, a type of cyber super weapon that China has developed using technology similar to what the NSA uses. 

GitHub experienced a prolonged outage in March, and reports indicated that the site was targeted by the Chinese government because the GreatFire advocacy group uses it to host anti-censorship tools that undermine the Great Firewall. But the service wasn’t brought down by a simple distributed denial of service attack — it was the first target of what researchers call the “Great Cannon.” Citizen Lab reports that the Great Cannon is similar to, but separate from, the Great Firewall. It works by intercepting unencrypted traffic headed toward servers in China, redirecting the traffic to the government’s intended target, and using it to overwhelm whomever’s on its receiving end of its blast. The researchers say the Great Cannon represents “a significant escalation in state-level information control” because it might normalize the “widespread use of an attack tool to enforce censorship by weaponizing users.” China now has both a wall to keep out its enemies and a cannon to obliterate its targets.

Source
Avatar of Connor Livingston
Connor Livingston Connor Livingston is a tech blogger who will be launching his own site soon, Lythyum. He lives in Oceanside, California, and has never surfed in his life. Find him on Twitter, Facebook, and Pinterest.

Obama wants $19 billion to improve America’s cyber security

Cyber attacks have grown to become one of the most-important issues in the United States, with both corporations and government agencies suffering from them in...
Avatar of Brian Molidor Brian Molidor
55 sec read

A hacker managed to steal information from the DHS…

Motherboard reported on Sunday that a hacker managed to get their hands on the personal information of about 30,000 employees for the DHS and FBI,...
Avatar of Alfie Joshua Alfie Joshua
57 sec read

The Java plug-in is finally going to meet its…

It’s been more than two decades since Oracle decided to start plaguing web browsers with its Java plug-in, but it looks like it’s time for Oracle...
Avatar of Chastity Mansfield Chastity Mansfield
58 sec read

Leave a Reply

Your email address will not be published. Required fields are marked *