{"id":408661,"date":"2010-03-09T15:43:31","date_gmt":"2010-03-09T20:43:31","guid":{"rendered":"http:\/\/www.gearlive.com\/news\/article\/q110-google-china-hackers-source-code\/"},"modified":"2010-03-09T15:43:31","modified_gmt":"2010-03-09T20:43:31","slug":"google-china-hackers-stole-valuable-source-code","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/408661","title":{"rendered":"Google: China Hackers Stole Valuable Source Code"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/assets.gearlive.com\/blogimages\/Google-China2.jpg\" alt=\"Google China\" class=\"border\" style=\"float: right; margin: 5px 5px;\" width=\"194\" height=\"287\" \/>According to McAffee CTO George Kurtz the cyber-attacks that occurred in January targed a small number of employees who controlled source code management systems.&nbsp; These source code management systems handle the myriad changes that developers make as they write software, the breach of which can have a cascade effect across multiple levels of <a href=\"http:\/\/www.gearlive.com\/news\/tag\/google\" rel=\"tag\">Google<\/a> and as many as 30 other business targeted in the January attacks.&nbsp; Aside from being awesome and using &#8216;cyber-attack&#8217; in a sentence, I also have some valuable source-code for sale at rock-bottom prices; check out my store at &#8216;CyberNinjaAssassinCassanova138&#8217; on eBay.\n<\/p>\n<p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<br clear=\"all\" \/><\/p>\n<p><strong>Tags:<\/strong><br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/china\" rel=\"tag\">china<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/crimes\" rel=\"tag\">crimes<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/cyber+attack\" rel=\"tag\">cyber attack<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/george+kurtz\" rel=\"tag\">george kurtz<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/google\" rel=\"tag\">google<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/hack\" rel=\"tag\">hack<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/hacking\" rel=\"tag\">hacking<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/internet\" rel=\"tag\">internet<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/mcafee\" rel=\"tag\">mcafee<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/source+code\" rel=\"tag\">source code<\/a>,<br \/>\n\t\t<a href=\"http:\/\/www.gearlive.com\/news\/tag\/theft\" rel=\"tag\">theft<\/a>,\t\t\t\t\t\t\t\t<\/p>\n<div style=\"background:#FFCC66; padding:5px; margin-top:5px;\">\n<a href=\"http:\/\/www.gearlive.com\/news\/article\/q110-google-china-hackers-source-code\/\" title=\"Google: China Hackers Stole Valuable Source Code\">Google: China Hackers Stole Valuable Source Code<\/a> originally appeared on <a href=\"http:\/\/www.gearlive.com\/\" title=\"Gear Live\">Gear Live<\/a> on Tue, March 09, 2010 &#8211; 12:43:31\n<\/div>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/0jrDN5ZTg68WzQrBEz9bAsxRUQE\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/0jrDN5ZTg68WzQrBEz9bAsxRUQE\/0\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/0jrDN5ZTg68WzQrBEz9bAsxRUQE\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/0jrDN5ZTg68WzQrBEz9bAsxRUQE\/1\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.gearlive.com\/~ff\/rss_2?a=4AwIPtCG4zc:Lp3oBGmCR4Q:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/rss_2?i=4AwIPtCG4zc:Lp3oBGmCR4Q:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.gearlive.com\/~ff\/rss_2?a=4AwIPtCG4zc:Lp3oBGmCR4Q:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/rss_2?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/rss_2\/~4\/4AwIPtCG4zc\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to McAffee CTO George Kurtz the cyber-attacks that occurred in January targed a small number of employees who controlled source code management systems.&nbsp; These source code management systems handle the myriad changes that developers make as they write software, the breach of which can have a cascade effect across multiple levels of Google and [&hellip;]<\/p>\n","protected":false},"author":5521,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-408661","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/408661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/5521"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=408661"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/408661\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=408661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=408661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=408661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}