Obama says China cyber attacks “not acceptable” ahead of state visit

US and Chinese diplomats hold “frank” exchange following cyber breaches

US and Chinese diplomats have met to discuss cyber security issues just days after President Barack Obama said cyber attacks against America are "not acceptable".

The senior government officials' meeting comes before China's president, Xi Jinping, is due to visit Washington later this month.

China's Communist party secretary for political and legal affairs, Meng Jianzhu, met with the president's national security adviser, Susan Rice.

The White House said the pair had a "frank and open exchange about cyber issues", among other topics, after Obama said on Friday that cyber attacks from China were "not acceptable".

He added: "There comes a point at which we consider this a core national security threat and will treat it as such."

China has been blamed for repeated cyber attacks against the US government as well as American firms, including the New York Times which produced a mirror site allowing Chinese readers to read its stories despite the Great Firewall of China blocking access to the regular site.

Other attacks rumoured to have emanated from China include a hack on the US government's Office of Personnel Management, which resulted in the leak of 21.5 million people's personal details in July.

Stolen information includes the health details, financial statuses, criminal records and social security numbers of current and past US government workers and some of their family members.

This attack is believed to have pushed Obama to issue a public statement on Friday, in which he also said that Iran and Russia's cyber security might now match that of the US.

He said: "We're going to have to get much more rapid in responding to attacks. We're going to have to strengthen overall networks."

The president also said millions of firms and ordinary people would need training in maintaining "basic cyber hygiene".

Featured Resources

Virtual desktops and apps for dummies

An easy guide to virtual desktop infrastructure, end-user computing, and more

Download now

The total economic impact of optimising and managing your hybrid multi-cloud

Cost savings and business benefits of accelerating the cloud journey

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

What’s next for the education sector?

A new learning experience

Download now

Recommended

Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
Biden calls for $22 billion in cyber security funding
Security

Biden calls for $22 billion in cyber security funding

18 May 2021
Avast’s Business Hub helps eliminate gaps in cyber defense
Security

Avast’s Business Hub helps eliminate gaps in cyber defense

18 May 2021
NETSCOUT threat intelligence report
Whitepaper

NETSCOUT threat intelligence report

18 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021