Seek news on
InfoAnda
powered by
Google
Custom Search

Last text search :
2016 wso 2.5 rw-r
2017 #1 smp wso rw-r

wso-drwxr-xr-x-smp.php-(writeable).php
2017 #1 smp wso rw-r
wso-drwxr-xr-x-smp.php-(writeable).php
wso-drwxr-xr-x-smp.php-(writeable).php
wso-drwxr-xr-x-smp.php-(writeable).php


Tuesday, 31 May 2011 - Analysis: Lockheed hack highlights cyber-blame snags |
  • Pakistanis angry over detentions in Times Sq. case
    Monday, May 24, 2010
    ISLAMABAD – Relatives of three men detained by Pakistan for alleged links to the suspect in the attempted Times Square bombing say the men are innocent.
    They
  • Taiwan denies boycotting Australian film festival
    Thursday, August 6, 2009

    AFP - Thursday, August 6TAIPEI (AFP) - - Taiwan's Beijing-friendly government on Wednesday denied boycotting an Australian film festival amid a row over the e
  • Merkel's support dips, regional ally resigns International
    Thursday, September 3, 2009

    By Sarah Marsh and Noah Barkin

    BERLIN (Reuters) - Chancellor Angela Merkel suffered a double blow on Thursday as a senior party ally in east German
  • Minister seeks closure of anti-Berlusconi websites
    Wednesday, December 16, 2009
    ROME (AFP) - – The Italian government moved Tuesday to close down Internet sites encouraging further violence against Prime Minister Silvio Berlusconi, who
  • Asian markets mixed after Wall Street rally
    Wednesday, March 18, 2009

    By ELAINE KURTENBACH,AP Business Writer AP - Wednesday, March 18SHANGHAI - Asia's stock market rally seemed to be running out of steam Wednesday, despite an
  • Van Morrison: Birth report 'utter fiction' | 1 January 2010
  • Hitachi warns of $7.8 billion loss, to restructure | Technology | | 30 January 2009
  • Indonesia's controversial Obama statue to be moved | 5 February 2010
  • Protesters rally in Indonesia after deadly clash | 15 April 2010


    Forum Views () Forum Replies ()

    Read more with google mobile : Analysis: Lockheed hack highlights cyber-blame snags |

    Edition: U.S. Article Comments (4) Follow Reuters Facebook Twitter RSS YouTube Read Palin a no-show for fans wanting Gettysburg view | 1:55am EDT Missouri officials continue identifying tornado dead | 3:37am EDT Pizza-making machine has chefs in a spin | 26 Mar 2009 Nikkei up 2 percent on strong industrial outlook, weaker yen 3:42am EDT Snowmelt, rain worsen flooding in northern Plains 30 May 2011 Discussed 75 $1 trillion on the table in U.S. debt talks 59 Judge voids controversial Wisconsin union law 51 Speculation grows over Sarah Palin’s 2012 plans Watched GM pulls the plug Fri, May 27 2011 Scientists revive ancient spider in stunning 3D detail Tue, May 24 2011 Japan steps up power-saving efforts Sun, May 29 2011 Analysis: Lockheed hack highlights cyber-blame snags Tweet Share this By Jim Wolf and Jim Finkle WASHINGTON (Reuters) - Past patterns may point to China, but top investigators say they will never know for sure who mounted a "significant" cyberattack against Lockheed Martin Corp, the Pentagon's No. 1 arms... Email Print Related News Australia warns on cyber attacks on resource firms Mon, May 30 2011 Lockheed says frequent cyber target from around world Sun, May 29 2011 Exclusive: Hackers breached U.S. defense contractors Fri, May 27 2011 Sony restoring game network in Asia; to testify in U.S. Fri, May 27 2011 Pakistan retakes naval base after attack Mon, May 23 2011 Analysis & Opinion Virtual Bitcoins are appealing but probably doomed In Pakistan’s Gwadar port, Chinese whispers grow Related Topics Technology » China » The F-35 Lightning II, also known as the Joint Strike Fighter (JSF), planes arrive at Edwards Air Force Base in California in this May 2010 file photo. Credit: Reuters/Tom Reynolds/Lockheed Martin Corp/Handout By Jim Wolf and Jim Finkle WASHINGTON | Mon May 30, 2011 6:48pm EDT WASHINGTON (Reuters) - Past patterns may point to China, but top investigators say they will never know for sure who mounted a "significant" cyberattack against Lockheed Martin Corp, the Pentagon's No. 1 arms supplier. Lockheed, which is also the government's top information technology provider, said on Sunday it was a "frequent target of adversaries around the world." The company has not disclosed which of its business units was targeted, but people with experience plugging holes after such strikes said that cyberspies likely sought trade secrets or weapons-related data. The Bethesda, Maryland-based company did not respond to a request to clarify whom it deemed adversaries, and whether it suspected a foreign state in the digital assault it said it had detected "almost immediately" on May 21. Lockheed said it had countered with stepped-up security measures and that no customer, program or employee personal data has been compromised in the "significant and tenacious attack" on its information systems network. China has generally emerged as a prime suspect when it comes to keyboard-launched espionage against U.S. interests, although the Pentagon says more than 100 foreign intelligence groups have been trying to pierce U.S. networks. "China's government, the Chinese Communist Party, and Chinese individuals and organizations continue to hack into American computer systems and networks as well as those of foreign entities and governments," the bipartisan U.S.-China Economic and Security Review Commission said in its 2010 annual report to Congress. The body was created by the Congress in 2000 to advise it on implications of trade with China. It said in its report the methods used in suspected Chinese-launched attacks were growing more sophisticated and increasingly piggy-backing on social networking tools. BEIJING DISMISSES CHARGES Beijing, at odds with the United States over Taiwan and other issues, has "laced U.S. infrastructure with logic bombs," a cyberweapon, former U.S. National Security Council official Richard Clarke wrote in his 2010 book "Cyber War." Beijing steadfastly dismisses such charges. "I'd say it's just irresponsible to arbitrarily link China to such cyber hacking activities in each and every turn," Wang Baodong, the Chinese Embassy spokesman in Washington, said in an email to Reuters. "As a victim itself, China is firmly against hacking activities and strongly for international cooperation on this front". Pinning down responsibility for an attack like that reported by Lockheed is "incredibly difficult" given the sophisticated ways that an attacker may misdirect, said Anup Ghosh, a former senior scientist at the Pentagon's Defense Advanced Research Projects Agency, or DARPA. Encoded clues in the Stuxnet virus that may have slowed progress on Iran's nuclear program, for instance, seemed designed to point to Israel. But "it is impossible to know if these are red herrings or genuine," said Ghosh, who worked on securing military networks for DARPA from 2002 to 2006 and who now runs Invincea, a software security company. Eugene Spafford, who heads the CERIAS cybersecurity research facility at Purdue University in Indiana, said the digital residue of an attack would not suffice to lead to a person or place. "Records may show a network address where those bits came from, and that network address may tie to a machine in a country, but that is only the address of the most recent 'hop'," he said in an email interview. "It is always possible that it is a system that itself was compromised, by another system that was compromised," and so on and so on, Spafford said. In addition, one could never rule out the possibility that a given cyberstrike might be launched by someone in the pay of yet a third party, no matter where it originated. Spafford, whose CERIAS lab has partnered with a dozen major companies and national laboratories, including defense contractors and Fortune 500 companies, said the bottom line is that "we likely never really will know who did it." Investigators first look for hard evidence -- searching for stolen data that may be traveling across the Internet or seeking out people looking to sell information culled in a cyber attack. They typically rely heavily on circumstantial evidence, including whether the attack details match known methods from a suspect and if the targets are consistent with a group's perceived interest. It is also possible that the U.S. intelligence community, using its vast electronic eavesdropping and other spying capabilities, may make a judgment about the origin independent of forensic analysis, but that too would be subject to doubt. (Editing by Mohammad Zargham) Technology China Tweet this Link this Share this Digg this Email Reprints   We welcome comments that advance the story directly or with relevant tangential information. We try to block comments that use offensive language, all capital letters or appear to be spam, and we review comments frequently to ensure they meet our standards. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. Comments (4) mgunn wrote: Because of proxies anyone can attack from anywhere at any time. Past patterns are totally misleading as all those were by conjecture too which then feeds onto itself and catches a life of its own. Kinda like the Iraq WMD thing, we say it enough and we all start to believe it. In fact, if I were a hacker I would purposely make it look like it emanated the from china or russia just to divert attention. May 30, 2011 9:28pm EDT  --  Report as abuse China_Lies wrote: The world isn’t that naive….of course it was the chinese. Who else has the proven capability, the proven desire, and the proven history of military and economic cyber-espionage? Sorry, but the cards are stacked against china. Take it one step further: a few weeks ago, the world found out that the US possesses some pretty amazing military technology. Pakistan stalls for three weeks before returning a portion of the helicopter to the US. This gives them enough time to invite their chinese friends in for an inspection. As soon as the inspection is complete, they realize they need more details. So, what do they do? They go after the source by hacking into Lockheed’s network. It doesn’t take a rocket scientist to put the pieces of this puzzle together. Come on!!! May 30, 2011 10:06pm EDT  --  Report as abuse blinded1 wrote: To say the least, Pentagon has hands on creation of Stuxnet virus. May 30, 2011 10:07pm EDT  --  Report as abuse See All Comments » Add Your Comment Social Stream (What's this?) © Copyright 2011 Thomson Reuters Editorial Editions: Africa Arabic Argentina Brazil Canada China France Germany India Italy Japan Latin America Mexico Russia Spain United Kingdom United States Reuters Contact Us Advertise With Us Help Journalism Handbook Archive Site Index Video Index Reader Feedback   Mobile Newsletters RSS Podcasts Widgets Your View Analyst Research Thomson Reuters Copyright Disclaimer Privacy Professional Products Professional Products Support Financial Products About Thomson Reuters Careers Online Products Acquisitions Monthly Buyouts Venture Capital Journal International Financing Review Project Finance International PEhub.com PE Week FindLaw Super Lawyers Attorney Rating Service Reuters on Facebook Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests. NYSE and AMEX quotes delayed by at least 20 minutes. Nasdaq delayed by at least 15 minutes. For a complete list of exchanges and delays, please click here.

    Other News on Tuesday, 31 May 2011
    Russian ex-tycoon Khodorkovsky files for parole |
    Sri Lanka war atrocities video credible: U.N. envoy |
    North, south Sudan discuss Abyei as tension simmers |
    Gaza activists warn Israel not to block new convoy |
    EU probes two U.S.-Asian computer hardware deals |
    Hip-hop star Sean Kingston stable after water crash |
    'Hangover,' 'Pirates' sequels lead box office |
    Group hacks PBS website in WikiLeaks protest |
    Yemen truce ends, stoking worries of civil war |
    Loud bang heard near Fukushima reactor, no radiation leak: Tepco |
    Afghan leader tells NATO attacks on homes not allowed |
    Pakistani jets attack Taliban hideouts, kill 11 |
    Japan PM wants to stay on and resolve nuclear crisis |
    Mladic could be sent to war crimes court in 24 hours |
    Tiananmen mothers say government hints at payment, no apology |
    Sony: PlayStation recovery delayed in parts of Asia |
    Google: Chrome for notebooks only for now |
    Intel unveils laptops that include tablet features |
    HP expands recall of laptop batteries |
    Analysis: Lockheed hack highlights cyber-blame snags |
    Samsung asks court for next-gen iPhone and iPad |
    Illinois House approves bill allowing casino in Chicago |
    Cannes Film Festival offers some Oscar clues |
    Egypt's Mubarak unfit for prison move: prosecutor |
    Libya's Gaddafi: I will not leave my country |
    North, South Sudan agree demilitarized zone: AU |
    Italy PM Berlusconi's lawyers want sex trial moved |
    India, Pakistan fail to make progress on glacier |
    Bahrain's king offers July reform talks |
    Suspect held in Russian journalist's 2006 killing |
    Nokia drops targets, shares slump to 13-year low |
    Steve Jobs to kick off Apple conference |
    Broadcom sees NFC technology as future main revenue driver |
    Greece at new risk of being pushed off euro
    Bodies of missing Tenn. mom, Jo Ann Bain, and daughter found
    Female Breasts Are Bigger Than Ever
    AMD Trinity Accelerated Processing Units Now in Volume Production
    The Avengers (2012 film), made the second biggest opening- and single-day gross of all-time
    AMD to Start Production of piledriver
    Ivy Bridge Quad-Core, Four-Thread Desktop CPUs
    Islamists Protest Lady Gaga's Concert in Indonesia
    Japan Successfully Broadcasts an 8K Signal Over the Air
    ECB boosts loans to 1 trillion Euro to stop credit crunch
    Egypt : Mohammed Morsi won with 52 percent
    What do you call 100,000 Frenchmen with their hands up
    AMD Launches AMD Embedded R-Series APU Platform
    Fed Should not Ignore Emerging Market Crisis
    Fed casts shadow over India, emerging markets
    Why are Chinese tourists so rude? A few insights

    [InfoAnda] [Home] [This News]



    USD EUR - 1 year graph

    VPN on MacOSX

    BlogMeter 1.01