Non-government-approved attacks stole personal data from China citizens. Popular in-country sites found to have little if any protection for user data. China, everybody’s go-to suspect when it comes to IT security, is finally acknowledging its own problems with hacking. Beijing has also started a campaign to crack-down on non-government-approved Chinese hackers who stole personal data from 100 million people last week. Irony is a dish best served … with mu shu pork and maybe a side order of white rice. Sometime between Dec. 21 and 26 hackers infiltrated the databases of many of China’s most popular blogging, shopping, social networking, and gaming sites, according to a report by Caixin Online. The hackers subsequently published more than 100 million usernames, passwords, and email addresses. The leaked files claimed to have information from websites including Tianya (tianya.cn), social networking sites Renren and Kaixin001, the Twitter-clone Sina Weibo, IT development site CSDN.net and online gaming sites like 17173.com and duowan.com. Many if not all of these sites – including the IT development site – stored users’ information in plain text. Best quote from the story: China’s Ministry of Industry and Information Technology … denounced the slew of hackings, saying they “infringed on internet users’ legal rights.” The official Xinhua news agency quoted Shi Xiaohong, VP of anti-virus company Qihoo 360, as saying the leak was the result of companies neglecting to encrypt users’ passwords and account information. Caixin also cited legal experts told that the massive leak also revealed shortcomings in Chinese internet security law and online ID theft protections. Nice to know that even if the Chinese are ahead of us in hacking they’re worse than we are at protecting customer info. (“Chinese internet security law”? Isn’t that an oxymoron?) In response to all this the government has begun an anti-phishing campaign to protect users’ bank accounts. The nation’s 10 biggest search engines have agreed to always display websites of banks appear first in searches. By doing this the government hopes to limit the numbers of people visiting fake sites and falling for phishing scams. How, exactly, this will protect users from companies which don’t take any security measures is anyone’s guess. At what point will the government decide that security efforts shouldn’t only be used to monitor online chat rooms for people discussing things it doesn’t want discussed. Hacking isn’t just for thieves, after all. PacketStorm notes in its report: As well as criminal hackers, many activists are turning to the web to make protests more visible. The website of Mengniu, a firm at the centre of a tainted milk scandal, was vandalised and its homepage image replaced with text that read “Do you have a conscience?” Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe