-
zsesay
at September 16,2015
Wow, this is very serious. It seems as if Chinese, if not stopped, would one day shut the world down. A lot of these hackers are originated from China. I think technology should have a constitution and policies in place that would protect hacking into another country, the government of that country should be penalized. This way, all countries would work diligently to catch these bad people. It is interesting that despite all the effort to stop these hackers, they have new ideas everyday.
-
jhilldog77
at September 17,2015
It seems as if the key to stopping these types of hacks is to eliminate back doors and security vulnerabilities -particularly on Windows OS. A constant battle for sure to stay one step ahead of the hackers as they continue to get more sophisticated with their methods and techniques. GUI hacking tools are making it much easier as well for the hackers to execute with ease.
-
sagarwa9
at September 17,2015
This video just proves how important it is to have some basic knowledge of security so that you don't become prey to such incidents where you end up revealing crucial information to a hacker unknowingly.
-
ycheng8
at September 21,2015
It seems like APTs are really dangerous. The hacker can utilize not only this application but also other tools to steal lots of information from the victim. This video makes me feel likes that the Chinese hackers attacked other countries for specific purpose, especially for Taiwan.
-
sliu23
at September 21,2015
This video shows us that the people is a critical component for a security system. No matter how solid the security system is, if there is someone cheated by the phishing e-mail from the adversary, the system is exploited. Of course, the system in the video is not much secure. Therefore, besides spending plenty of resource on the security technique application or development, system administrators also need to pay more attention on the security awareness training on employees.
Moreover, I noticed that the attacker in this video use the phone number and IP address which could exploit his location and identity to login the Gmail. Does this kind of behavior come from his carelessness or arrogance? It is unwise for a normal hacker to exploit himself in such way even for a national sophisticated hacker.