Aurora: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 7: Line 7:
* Michael Joseph Gross, [http://www.vanityfair.com/culture/features/2011/09/chinese-hacking-201109 Enter the Cyber-dragon], Vanity Fair, September 2011
* Michael Joseph Gross, [http://www.vanityfair.com/culture/features/2011/09/chinese-hacking-201109 Enter the Cyber-dragon], Vanity Fair, September 2011
* Kim Zetter, [http://www.wired.com/threatlevel/2010/01/operation-aurora/, Google Hack Attack Was Ultra Sophisticated, New Details Show], Wired: Threat Level, Jan 14, 2010
* Kim Zetter, [http://www.wired.com/threatlevel/2010/01/operation-aurora/, Google Hack Attack Was Ultra Sophisticated, New Details Show], Wired: Threat Level, Jan 14, 2010
* David Drummond, [http://googleblog.blogspot.com/2010/01/new-approach-to-china.html A new approach to China], Google Official Blog, Jan 12, 2010
[[Category:Case Studies]]
[[Category:Case Studies]]

Revision as of 12:47, 8 August 2012

This page is currently under construction. Check back for updates soon.

Case Summary

Recommended Literature