If you like what I’m doing, please support me. I provide all the 300+ articles on Hacking Chinese for free, as well as Hacking Chinese Resources and Challenges. Supporters also get rewarded with extra content and other bonuses. You can check the details on my Patreon page: Support Hacking...
Welcome to Hacking Chinese! Hi! My name is Olle Linge (凌雲龍), and I’ve been learning and teaching Chinese formore than 15 years. Hacking Chinese is here to support and inspire you on your Chinese learning journey! How can I assist you today?
Unlocking Chinese is meant both for students who have no experience learning Chinese and those who have studied a bit, but found it confusing or didn’t know what to do. If you know how to pronounce Mandarin, can have a basic conversation and read simple text messages in Chinese, this cou...
Chinese hacking group attacks India with Word exploitThe article reports on the statement of the cyber security leader FireEye regarding the attacks of the Indian targets by a Chinese hacking gr...
where the safety of networks is just as important as the power of words. ⚡ Threat of the Week U.S. Treasury Sanctions Chinese and North Korean Entities — The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) leveled sanctions against a Chinese cybersecurity company (Sich...
Private hacking contractors are companies that steal data from other countries to sell to the Chinese authorities. Over the past two decades, Chinese state security’s demand for overseas intelligence has soared, giving rise to a vast network of these private hackers-for-hire companies that have ...
The Chinese embassy in Washington did not respond to questions from Reuters. Asked for comment, the U.S. Cybersecurity and Infrastructure Security Agency said it was aware of the CrowdStrike report and would continue to work closely with U.S. carriers. "This report ref...
Chinese Hacking of the USSchneier on Security
How Chinese APT hackers stole Lockheed Martin F-35 fighter plane to develop its own J-20 stealth fighter aircraft [VIDEO] View All Vulnerabilities MotW Bypassed: Zero Warning, Full Control – New WinRAR Flaw Silently Bypasses Windows Security New Vulnerability in GCP Cloud Run Shows Why Least Pri...
A Chinese hacking operation is back with new malware attack techniques and has switched its focus to conducting espionage on western corporations, having previously targeted organisations and individuals in Taiwan, Tibet, and the Philippines. Dubbed KeyBoy, the advanced persistent threat actor has been...