CUHK: No detection of hacking into HKIX

The Chinese University of Hong Kong said Thursday that its IT backbone and the Hong Kong Internet exchange (HKIX) have never been hacked, in response to a comment by US whistleblower Edward Snowden -- during an interview with SCMP -- that the university has been one of the NSA's hacking targets since 2009.

The HKIX -- live since 1995 as a layer-two settlement-free Internet exchange point --is operated by the Information Technology Services Center (ITSC) of the CUHK. "The university hasn't detected any form of hacking to the network which has been running normally," said a university spokeswoman. "Every effort's made to protect the university's backbone network as well as the HKIX--our ITSC closely monitors the exchange round-the-clock to ensure normal operation and defends against network threats. ""

HKIX serves more than 100 organizations in Hong Kong including telcos, mobile broadband service providers, and those from the academic community.

Cisco switches deployed at HKIX

The CUHK has deployed Cisco switches at HKIX for some years-- including Cisco Nexus 7018 and Cisco Catalyst 6513. At press time, the vendor's Hong Kong office hasn't commented on Snowden's claim, but a spokesperson said the company is preparing a statement.

Snowden was also quoted by the SCMP as saying that public officials, businesses, and students in Hong Kong are also NSA's hacking targets. According to the report, he believes that the NSA has hundreds of targets in Hong Kong and on the mainland.

Responding to Computerworld Hong Kong's inquiry, the Office of the Government CIO (OGCIO) said the government has no reported hacking incidents involving data leakage on its computer systems.

Tags intrusionsecurityChinese University of Hong Kong

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Audit Management Solutions

Manage the complete audit lifecycle from audit universe identification and risk assessment to management/board reporting and quality assurance.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.