Search Details

Word: cyberterror (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...between organized terrorist or cyberwar attacks from other countries and the individual hacker." The remarkable depth and range of McKinnon's attacks and the fact that he appeared to be looking for something in particular is exactly the kind of pattern that security experts point to as evidence of cyberterror attacks. "This guy was organized and he was looking for specific material," says Jordan, who also blames the "absurd insecurity" of the U.S.'s cyber-defenses. "McKinnon was mainly using the basic technique of an automatic dialer that scans loads of machines until it finds ones that either have their...

Author: /time Magazine | Title: Hack Attack | 7/31/2008 | See Source »

| 1 |