12px13px15px17px
Date:07/07/11

Government facilities targets of cyber attack

Two U.S. government-funded research laboratories and a defense contractor were targets of a "highly sophisticated" cyber attack last week, representatives of the organizations said, the latest in a string of assaults on U.S. interests. The attacks struck Pacific Northwest National Laboratory (PNNL) in Richland, Washington; Thomas Jefferson National Laboratory in Newport News, Virginia and Battelle Corp, a government contractor that manages PNNL.
The three shut down Internet access on Friday, when they became aware of the attacks, they said. The two laboratories have yet to restore access to their external websites.
"The good news is no classified information has been compromised or is in danger from this attack," said PNNL spokesman Greg Koller. "At this time, we have not found any indication of 'exfiltration' of information from our unclassified networks as well."
The attack follows cyber assaults that shut down network access at Lockheed Martin Corp, the Pentagon's No. 1 supplier by sales, and the Oak Ridge National Laboratory, which is managed by UT-Battelle for the U.S. Energy Department. In Washington, retired Air Force General Michael Hayden, a former director of central intelligence and ex-head of the Pentagon's National Security Agency, said on Wednesday that growing cyber threats were pushing security planners into uncharted territory."This is really hard for us to think about," he told a forum on cyber deterrence hosted by the Potomac Institute for Policy Studies, a nonpartisan research group focused on science and technology. "If we don't act boldly, something really bad is going to happen. Then we'll over-react." James Mulvenon, a specialist on the Chinese military and Chinese cyber issues at Defense Group Inc, a consultant to the U.S. intelligence community, told the same forum that the United States must operate on the assumption that its networked systems already have been penetrated by foes.
U.S. strategy, he said, should be to enhance "resilience" so that the United States can recover relatively quickly from possible cyber-enabled attack. Recently, a group of private experts briefed a U.S. intelligence audience about how they could go 90 percent of the way toward bringing down a major U.S. city's vital systems without anyone being able to tell, Michael Tiffany, a cyber security expert, told the session.
"Force multiplication is cheap," said Tiffany, chief architect at Recursion Ventures, a security technologies company. "And there are no indicators of force buildup" when malicious code is carefully inserted into a system.



Views: 1530

©ictnews.az. All rights reserved.

Facebook Google Favorites.Live BobrDobr Delicious Twitter Propeller Diigo Yahoo Memori MoeMesto






23 April 2021

22 04 2021

22/04/21
Instagram’s new feature to combat hate speech, abuse

We recently shared an update on our work to combat abuse and hate speech on Instagram, which included 

22/04/21
Strategy Analytics: Global smartphone shipments surge to 340 million units, up +24% YoY in Q1 2021

According to the latest research from Strategy Analytics, global smartphone shipments were 340 million units

22/04/21
Apple introduces AirTag

Apple expands the Find My ecosystem with AirTag, an iPhone accessory that provides a private and secure way to easily locate the items that matter mos

22/04/21
Siemens and Google Cloud to cooperate on AI-based solutions in manufacturing

Google Cloud and Siemens, an innovation and technology leader in industrial automation and software, today

22/04/21
Amazon is opening a hair salon in London to trial new technology

Amazon’s latest bricks-and-mortar experiment is, unexpectedly, a hair salon. The company is opening its Amazon