Displaying posts tagged with

“cyber attack”

Universities Face a Rising Barrage of Cyberattacks

By RICHARD PÉREZ-PEÑA Published: July 16, 2013 NYTimes America’s research universities, among the most open and robust centers of information exchange in the world, are increasingly coming under cyberattack, most of it thought to be from China, with millions of hacking attempts weekly. Campuses are being forced to tighten security, constrict their culture of openness […]

Obama orders US to draw up overseas target list for cyber-attacks

lenn Greenwald and Ewen MacAskill guardian.co.uk, Friday 7 June 2013 15.06 EDT Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals. The 18-page Presidential Policy Directive 20, issued in October last […]

Hagel says cyberthreats pose ‘stealthy’ danger to US

Published May 31, 2013 FoxNews.com Defense Secretary Chuck Hagel said Friday that cyberthreats pose a “quiet, stealthy, insidious” danger to the United States and called for the development of guidelines to establish “rules of the road” and foster a better understanding among nations for the use of cyber technologies. Speaking to reporters on his plane […]

Iran Hacks Energy Firms, U.S. Says

By SIOBHAN GORMAN and DANNY YADRON Wall Street Journal Thursday, May 23, 2013 As of 7:52 PM EDT WASHINGTON—Iranian-backed hackers have escalated a campaign of cyberassaults against U.S. corporations by launching infiltration and surveillance missions against the computer networks running energy companies, according to current and former U.S. officials. In the latest operations, the Iranian […]

This Pentagon Project Makes Cyberwar as Easy as Angry Birds

BY NOAH SHACHTMAN05.28.136:30 AM Wired The target computer is picked. The order to strike has been given. All it takes is a finger swipe and a few taps of the touchscreen, and the cyberattack is prepped to begin. For the last year, the Pentagon’s top technologists have been working on a program that will make […]

New Computer Attacks Traced to Iran, Officials Say

By NICOLE PERLROTH and DAVID E. SANGER Published: May 24, 2013 NYTimes SAN FRANCISCO — American officials and corporate security experts examining a new wave of potentially destructive computer attacks striking American corporations, especially energy firms, say they have tracked the attacks back to Iran. The targets have included several American oil, gas and electricity […]

Chinese Hackers Resume Attacks on U.S. Targets

By DAVID E. SANGER and NICOLE PERLROTH Published: May 19, 2013 NYTimes WASHINGTON — Three months after hackers working for a cyberunit of China’s People’s Liberation Army went silent amid evidence that they had stolen data from scores of American companies and government agencies, they appear to have resumed their attacks using different techniques, according […]

China and Cyberwar

By THE EDITORIAL BOARD NYTimes Published: May 7, 2013 Despite denials from Beijing, there seems little doubt that China’s computer hackers are engaged in an aggressive and increasingly threatening campaign of cyberespionage directed at a range of government and private systems in the United States, including the power grid and telecommunications networks. The Obama administration […]

China Sees Cyberwar as Reducing U.S. Advantage in Future Conflict

Arik Hesseldahl All Things MAY 7, 2013 AT 5:52 AM PT It’s one thing to read news concerning the latest report to Congress by the U.S. Department of Defense on China’s latest military activities. But with regard to China’s evolving stance and capabilities in the cyber arena, it’s especially interesting to read the original report. […]

In a Cyber War Is It OK to Kill Enemy Hackers?

by DOMINIC BASULTO BigThink APRIL 11, 2013, 2:36 PM The new Tallinn Manual on the International Law Applicable to Cyber Warfare, which lays out 95 core rules on how to conduct a cyber war, may end up being one of the most dangerous books ever written. Reading through the Tallinn Manual, it’s possible to come to the conclusion […]