BI’s Article search uses Boolean search capabilities. If you are not familiar with these principles, here are some quick tips.

To search specifically for more than one word, put the search term in quotation marks. For example, “workers compensation”. This will limit your search to that combination of words.

To search for a combination of terms, use quotations and the & symbol. For example, “hurricane” & “loss”.

Login Register Subscribe

China, Russia involved in state-sponsored data theft


HOLLYWOOD, Fla. — Any discussion of state-sponsored data theft “has to start with China,” a cyber security expert said Tuesday.

Chinese hackers used to concentrate on intellectual property theft such as trade secrets, said Grady Summers, chief technology officer at Milpitas, California-based technology security firm FireEye Inc.

But their focus has shifted, with recent attacks attempting to gather personal data such as individual medical records or salary histories. They're doing so because they want to know as much as possible about human targets and their potential vulnerabilities to compromise individuals for intelligence reasons.

Speaking Tuesday to the Property Casualty Insurers Association of America's annual meeting in Hollywood, Florida, Mr. Summers said that despite a recently announced agreement between China and the United States to end Chinese hacking, there has been no reduction in Chinese-based hacking activities.

“It's absolutely kept up,” he said.

Russia has been engaged in hacking as well, initially through criminal enterprises seeking to steal financial information. But with the outbreak of hostilities in Ukraine and other intentional confrontations, Russia is pivoting toward political targets, he said.

“Cyber tensions mirror real-world tensions,” Mr. Summers said.

Read Next

  • Top U.S. spy says skeptical about U.S.-China cyber agreement

    (Reuters) — The top U.S. intelligence official said he was skeptical that a new U.S.-China cyber agreement would slow a growing torrent of cyber attacks on U.S. computer networks, adding that his approach will be to "trust but verify."