Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Google has previously reported that its traffic has been interfered with in China, but has never gone so far as directly accusing the authorities.
However, as complaints over technical glitches and performance issues mount from both end users and advertisers, Google has upped its rhetoric.
"There is no technical issue on our side. We have checked extensively," Google said in a statement quoted by several newspapers. "This is a government blockage carefully designed to look like the problem is with Gmail."
The accusation comes in the wake of a government crackdown aimed at disrupting the so-called “Jasmine Revolution” - a group of online dissidents following in the footsteps of protesters in the Middle East - which Google claims has included online attacks against activists and the online services they use.
“We’ve noticed some highly targeted and apparently politically motivated attacks against our users,” Google said in blog post at the time.
“We believe activists may have been a specific target. We’ve also seen attacks against users of another popular social site. All these attacks abuse a publicly-disclosed MHTML vulnerability - with the Internet Explorer browser affected.”
Google considers these attacks particularly serious because they exploit an entire web service, rather than targeting end-user computers.
“The abuse of this vulnerability is interesting because it represents a new quality in the exploitation of web-level vulnerabilities,” the company said. “To date, similar attacks have focused on directly compromising users' systems, as opposed to leveraging vulnerabilities to interact with web services.”
This article originally appeared at pcpro.co.uk
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.