Technology, Discovery & Innovation NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Computing Digital Life Discovery Space More Topics...
Druva inSync Free Trial
Druva inSync with DLP, analytics & secure file sharing.
www.druva.com/inSync-Trial
You are here: Home / Network Security / Add Energy Dept. to List of Hacks
Energy Dept. Reportedly Latest Target of Hackers
Energy Dept. Reportedly Latest Target of Hackers
By Adam Dickter / Sci-Tech Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
FEBRUARY
04
2013



Looks like those Chinese hackers are at it again. After reports that intruders based there recently compromised the computers of The New York Times and The Wall Street Journal, targeting employee passwords and other data, the U.S. Department of Energy told employees in an e-mail that its systems, too, had been infiltrated.

The story was first reported by the nonprofit online newspaper Washington Free Beacon, which said FBI and Energy Department investigators were probing the theft of employee information at the agency and whether the hack was a prelude to an attempt to carry out a much more pervasive attack to gain classified data in the future.

Virtual Battlefield

While no classified information is believed to have been compromised, the sophistication of the attack suggests a "nation-state" involvement, the paper said, and Energy has been a frequent target of Chinese hacks in the past.

Last year saw a series of hacking attacks against U.S.-based companies and government agencies, including a military computer at the White House. The virtual battlefield is an increasingly busy theater of operations as the U.S. struggles to ward off an onslaught of foreign hackers.

In 2009, then-Defense Secretary Robert M. Gates established the U.S. Cyber Command, a division of the U.S. Strategic Command, headed by Gen. Keith B. Alexander, to defend military systems. Its job is to "direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure U.S./Allied freedom of action in cyberspace and deny the same to our adversaries."

The Department of Homeland Security, however, is charged with defending non-military government (the .gov domain) computers such as those at DOE, while Cyber Command defends the .mil domain.

Global cyber security expert Chester Wisniewski of the firm Sophos told us there was too little information to determine "concrete conclusions" about what the Chinese were up to.

"It is fair to say that the Chinese are not having any difficulty staying busy and it is far more likely that we are just hearing it from more organizations than usual," Wisniewski said.

Encrypt Your Data

"Most organizations are compromised multiple times per year and just prefer to keep it quiet. Of course the extent to which the attackers were able to exploit them often determines whether they are obligated to let the cat out of the bag."

He added that one missing question regards why personal information seems to have been stored unencrypted.

"It is impossible to maintain a perfectly secure environment, so you ought to know that the "bad guys" are going to end up on your network from time to time," he said. "Why did you leave sensitive information just lying around for the taking? We shouldn't blame the victims, but negligence is negligence."

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
IT departments are embracing cloud backup, but there's a lot you need to know before choosing a service provider. Learn all the critical things you need to know by accessing the white paper, "5 Things You Didn't Know About Cloud Backup". Access the White Paper now.
MORE IN NETWORK SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Russian Gang with Stolen IDs Hacks Hosting Company
In August, a Russian cyber gang obtained what researchers called “the largest cache of stolen data." Now, those hackers may be putting their ill-gotten gains to criminal use.
 
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 

Enterprise Hardware Spotlight
AMD's New FX Series CPU Breaks Processing Speed Record
The new FX-8370 processor from Advanced Micro Devices has set a record for silicon processor speed, the company announced. Overclocked, the eight-core chip was measured at 8722.78 MHz.
 
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
 
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 

Mobile Technology Spotlight
Rumor Mill Puts Mobile Wallet in iPhone 6
Apple is moving toward the mobile wallet world with its next iPhone. The tech giant has partnered with retailers, banks and major payment networks to make it happen, according to Bloomberg.
 
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
 
Visual Search To Shop: Gimmick or Game Changing?
Imagine using your phone to snap a photo of the cool pair of sunglasses your friend is wearing and instantly receiving a slew of information about the shades along with a link to order them.
 

Navigation
Sci-Tech Today
Home/Top News | Computing | Digital Life | Discovery | Space | Innovation | Health | Science News
Environment
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.