Pentagon Hacking Charge Denied
考研英语
时间: 2019-04-08 14:15:38
作者: 匿名
China yesterday described as "groundless" and a product of "Cold War mentality" reports claiming hackers, on the instructions of the People's Liberation Army (PLA), had broken into a Pentagon network.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.
China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.
China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
猜你喜欢
-
- 03-082016考研英语大纲解析之英语:考什么
- 03-082016考研英语(一)大纲翻译部分深度解析
- 03-082016考研英语大纲解析-完型填空定语从句解密
- 03-082016考研英语大纲公布完形填空考点梳理
- 03-082016考研英语大纲公布完形填空名词解题思路
- 03-082016考研英语大纲公布完型填空部分解析及策略
- 03-082016考研英语大纲趋稳99天冲刺备考
- 03-082016考研英语大纲作文之预测
- 03-082016考研英语大纲无变化掌握大纲真谛高效备考
- 03-082016年考研英语大纲翻译部分深度解析