Search Details

Word: cyberattackers (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...national power grid anywhere in the world has been brought down by a cyberattack. And it's worth keeping in mind that most countries have much fewer defenses from cyberattacks than the U.S. "It's virtually impossible to bring down the entire North American grid," says Major General (Rtd) Dale Meyerrose, a cybersecurity expert who recently retired as chief information officer for the Director of National Intelligence. The electricity-distribution system is highly decentralized, and there's no central control system; at worst, cyberattackers may be able to damage sections of the grid...

Author: /time Magazine | Title: How Vulnerable Is the Power Grid? | 4/15/2009 | See Source »

...most critical power users - the military, hospitals, the banking system, phone networks, Google's server farms - have multiple contingencies for uninterrupted power supply and backup generation. In the event of a cyberattack on the grid, they would be able to operate for long periods - days, weeks and, in some cases, indefinitely - without much difficulty...

Author: /time Magazine | Title: How Vulnerable Is the Power Grid? | 4/15/2009 | See Source »

...report had said there was not a single credible terrorism threat, domestic or foreign, to the Inauguration. That covered the whole gamut of threats, from a cyberattack on sensitive computers to the use of weapons of mass destruction. Top officials have echoed these findings. "I don't anticipate anything disruptive," Homeland Security Secretary Michael Chertoff told CNN. But, he added, "part of my job is to hope for the best but plan for the worst...

Author: /time Magazine | Title: Security at the Inauguration: Preparing for Anything | 1/19/2009 | See Source »

...taught us that the spectrum of potential threats is as wide as the imagination. The same could be said for vulnerabilities to the computers we depend on. Families must guard their computers against novice vandals planting viruses or against more advanced intruders leeching your computing power to launch a cyberattack on someone else. Despite the spate of devastating viruses this year--Slammer in January, Blaster and Sobig in August--the threat has evolved past the 17-year-old hacker, past the lone thief who steals and reveals credit-card data. Businesses must now watch for organized-crime groups adept...

Author: /time Magazine | Title: The Code Warriors | 11/10/2003 | See Source »

...planned publication of junior-high school textbooks that still present a watered-down version of Japan's military aggression has provoked official protests from China, the temporary withdrawal of South Korea's ambassador and a South Korean cyberattack that crashed the Japanese Education Ministry website in March. The message that the rest of Asia takes from these episodes is clear: Japan still doesn...

Author: /time Magazine | Title: Look Back In Anger | 4/30/2001 | See Source »

Previous | 1 | 2 | 3 | Next