Cyberattacks sound alarms, DC scrambles

McCain, Sen. John
March 2013
Hill;3/18/2013, Vol. 20 Issue 31, p1
The article focuses on the threat of cyberattacks being faced by the U.S. government and businesses, especially from Chinese hacking units.


Related Articles

  • An Anonymous Threat. Holbrook, Emily // Risk Management (00355593);May2012, Vol. 59 Issue 4, p14 

    A timeline is presented of events following the hacking activities of the Cybercriminals identified as Anonymous, which threatened websites, email accounts, and phone systems of prominent people and organizations they regard as immoral, anti-democratic, or pro-censorship.

  • The Month of the Hacker. WILLIAMS, HART // Moderate Voice;6/25/2011, p12 

    A blog on the cyber-attacks and hacking incidences in the U.S. during June 2011, is discussed.

  • Man Accused of Creating Cyberattack in Phoenix Area Arrested.  // India -- West;11/4/2016, Vol. 42 Issue 51, pB16 

    No abstract available.

  • The Hacker Wars. Lyons, Dan // Newsweek;6/13/2011, Vol. 157 Issue 24/25, p31 

    The article discusses the importance to nations of deterring computer hacking attacks. China disclosed it has created an organization charged with defending that nation's computer systems from attacks. In the U.S. the Defense Department issued a report that said cyberattacks against the U.S....

  • SURVEYING THE DIGITAL DOMAIN. Goldsborough, Reid // Poptronics;Feb2002, Vol. 3 Issue 2, p16 

    Presents several safety measures against cyberterrorism and humiliation in Internet in the United States. Utilization of antivirus software against hackers; Significance of crash course in online etiquette; Presentation of 'The Guide for Posting to Newsgroups' and 'The Usenet Guide to Power...

  • Security Threats Growing, Evolving, Survey Reveals.  // Journal of Commerce (1542-3867);6/27/2011, Vol. 12 Issue 24, p8 

    The article reports that global supply chains are expected to face increased cyber, hacker, pirate and terrorist attacks over the next 20 years, with key shipping hubs and transportation gateways most at risk, according to the results of a survey by New York-based consulting firm...

  • 'Underwhelming' cyber attacks traced to China, pro-North Korea hackers in the South.  // East-Asia-Intel Reports;7/15/2009, p11 

    The article offers information on the denial-of-service cyber attacks that were launched against South Korea. It is stated that the origin of the attack was traced to a number of countries, including China, the U.S. and Japan. Also, it is mentioned that the attacks were of low intensity as they...

  • Opinion.  // Hays Free Press (Buda, TX);7/15/2015, Vol. 119 Issue 16, p3A 

    A cartoon on cyber-attack is presented.

  • the art of cyberwar. Dilworth, Seth W.; Stempel, Paul A. // Reporter;Winter2010, Vol. 37 Issue 3, p36 

    The article offers information on cyber warfare. It reports on hacking which is a popular sport in China. It states the Chinese hackers have an increasingly rich library of hacker fiction from which to plot their next attacks. It states the recent cyber attacks worldwide reflects a need to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics