Aurora: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 7: | Line 7: | ||
* Michael Joseph Gross, [http://www.vanityfair.com/culture/features/2011/09/chinese-hacking-201109 Enter the Cyber-dragon], Vanity Fair, September 2011 | * Michael Joseph Gross, [http://www.vanityfair.com/culture/features/2011/09/chinese-hacking-201109 Enter the Cyber-dragon], Vanity Fair, September 2011 | ||
* Kim Zetter, [http://www.wired.com/threatlevel/2010/01/operation-aurora/, Google Hack Attack Was Ultra Sophisticated, New Details Show], Wired: Threat Level, Jan 14, 2010 | * Kim Zetter, [http://www.wired.com/threatlevel/2010/01/operation-aurora/, Google Hack Attack Was Ultra Sophisticated, New Details Show], Wired: Threat Level, Jan 14, 2010 | ||
* David Drummond, [http://googleblog.blogspot.com/2010/01/new-approach-to-china.html A new approach to China], Google Official Blog, Jan 12, 2010 | |||
[[Category:Case Studies]] | [[Category:Case Studies]] |
Revision as of 12:47, 8 August 2012
This page is currently under construction. Check back for updates soon. |
Case Summary
Recommended Literature
- Wikipedia entry
- Michael Joseph Gross, Enter the Cyber-dragon, Vanity Fair, September 2011
- Kim Zetter, Google Hack Attack Was Ultra Sophisticated, New Details Show, Wired: Threat Level, Jan 14, 2010
- David Drummond, A new approach to China, Google Official Blog, Jan 12, 2010