Search Details

Word: cyberattacks (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...have flown over Afghanistan or Iraq, because the plane was designed for long-range air-to-air duels with futuristic fighters that perhaps China eventually might field. "At least [the F-22s] are safe from cyberattack," wrote former Navy Secretary John Lehman over the weekend in the Wall Street Journal. "No one in China knows how to program the '83 vintage IBM software that runs them." And it's hard to talk up the Chinese threat. Pentagon officials say that by 2020, the U.S. military will be flying more than 1,000 so-called fifth-generation fighters...

Author: /time Magazine | Title: Defense Secretary Gates Downs the F-22 | 7/22/2009 | See Source »

...Cyberattacks have grown more frequent and destructive in recent years. One form of hacking - the denial-of-service (DoS) attack - has apparently even become a tool of war. The attacks are designed to paralyze websites, financial networks and other computer systems by flooding them with data from outside computers. A 15-year-old Canadian with the handle "mafiaboy" launched the first documented DoS attack in 2000, against numerous e-commerce sites, including eBay and Amazon.com, shutting some down and wreaking havoc that cost an estimated $1.7 billion. In 2007, entities believed to have been associated with the Russian government...

Author: /time Magazine | Title: Cybercrime | 6/1/2009 | See Source »

...such actions). Attacks have mushroomed so quickly that the Defense Department reportedly plans to establish a new military command focused solely on computer warfare. Secretary Robert Gates told CBS News that the Pentagon also plans to quadruple the ranks of its cybersecurity experts, explaining that the country is "under cyberattack virtually all the time, every...

Author: /time Magazine | Title: Cybercrime | 6/1/2009 | See Source »

...course, every power outage comes with a cost, not least to the economy. Mansoor would not discuss how long it would take to recover from a cyberattack - there are too many variables involved - but said the longest delays in restoring power are typically caused not by technological glitches but by major acts of God, like hurricanes and earthquakes that destroy physical infrastructure. (Read a TIME blog on China and hacking...

Author: /time Magazine | Title: How Vulnerable Is the Power Grid? | 4/15/2009 | See Source »

...This is not to suggest that the power grid can't be hacked into. In 2007, CNN reported that researchers working for the Department of Energy had mounted an experimental cyberattack against a power generator and were able to get it to self-destruct. Details of the experiment were kept from the public at the request of the Department of Homeland Security...

Author: /time Magazine | Title: How Vulnerable Is the Power Grid? | 4/15/2009 | See Source »

| 1 | 2 | 3 | Next