Asian Surveying & Mapping
Breaking News
HAL to build, market Isro’s SSLV in landmark deal
New Delhi, Jun 20: In a historic move for...
Taiwan developing space capabilities for all-weather imaging
TAIPEI (TVBS News) — Taiwan is advancing its space...
Honda hails successful test of reusable rocket as it looks to get into the space business
Tokyo — Japan's second-biggest carmaker, Honda, has successfully tested...
China’s space program provides larger platform for broader international cooperation
BEIJING -- Experts from China's manned space program said...
India To Launch $1.5 Billion Joint Earth Mission With NASA In July
National Aeronautics and Space Administration (NASA) and the Indian...
Axiom-4 mission delayed again: ISRO confirms Subhanshu Shukla’s ISS spaceflight won’t launch before 22 June 2025
The Axiom-4 mission to the International Space Station has...
Mengzhou spacecraft for China’s moon-landing mission passes landmark test flight
China has completed the inaugural test flight of its...
Space application for ITMA Asia + CITME 2026 opens
Shanghai – Space application for the 2026 edition of...
Yanmar, Chia Tai and XAG Empower Thai Agriculture through Innovation
Bang Nam Priao District, Chachoengsao Province, Thailand – On...
bitsensing Signs MOU with IKIO Technologies to Advance AI-Based Traffic Monitoring on India’s Expressways, Highways and Municipal Areas
Backed by proven success in South Korea and Europe,...

October 28th, 2011
Japan’s Geospatial Information Authority Targeted in Cyber Attack

The Geospatial Information Authority of Japan (GSI) has been targeted in a cyber attack, Minister of Land, Infrastructure, Transport and Tourism Takeshi Maeda told a news conference on Oct. 28 — the latest in a series of attacks on Japanese computer systems. Speaking in a news conference after a Cabinet meeting on Oct. 28, Maeda said, “I’ve heard that a server of the Geospatial Information Authority of Japan has also been attacked.” Organization officials said that a server holding measurement data was attacked, and computer IDs and passwords were analyzed, enabling a party to gain access to the server. Read More