Search results
1 – 6 of 6
These routers can compromise US critical infrastructure. This indicates that Chinese cyber operations are shifting from espionage to disruption.
Details
DOI: 10.1108/OXAN-DB285284
ISSN: 2633-304X
Keywords
Geographic
Topical
The market-oriented, technocratic approach that Li pursued contrasts with President Xi Jinping’s expansion of state control across sectors such as finance and prioritisation of…
Details
DOI: 10.1108/OXAN-DB283281
ISSN: 2633-304X
Keywords
Geographic
Topical
These have ranged from cyber-espionage campaigns such as the SolarWinds hack to disruptive attacks such as the Sony Pictures breach and the NotPetya and WannaCry malware attacks…
Details
DOI: 10.1108/OXAN-DB273098
ISSN: 2633-304X
Keywords
Geographic
Topical
This is the latest incident in which US tech firms have been confronted by non-US governments looking to assert control over how data is managed in their countries. For example…
Details
DOI: 10.1108/OXAN-DB196999
ISSN: 2633-304X
Keywords
Geographic
Topical
Amid rising economic and cybersecurity-related tensions between China and the Western economies, but also with regional neighbours, China’s growing cyber capabilities are…
Details
DOI: 10.1108/OXAN-DB264150
ISSN: 2633-304X
Keywords
Geographic
Topical
INT: Western move on Microsoft hack pressures China