Pentagon Hacking Charge Denied
考研英语
时间: 2019-04-08 14:15:38
作者: 匿名
China yesterday described as "groundless" and a product of "Cold War mentality" reports claiming hackers, on the instructions of the People's Liberation Army (PLA), had broken into a Pentagon network.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.
China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.
China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
猜你喜欢
-
- 03-082013年考研英语词汇轻松记:妙句记单词(2)
- 04-08教你三招变身单词达人
- 03-092018考研英语句子插入结构怎么翻译?
- 03-092018年考研英语作文常用词汇替换(七)
- 04-082013年大学英语四级考试翻译模拟练习4
- 04-08作文只是背模板?正确复习姿势了解下
- 04-08大学英语四级阅读精选模拟题100篇及答案详解(63)
- 04-08每天起床第一句,英语单词背没背
- 03-082012考研英语辅导翻译误区之缺乏背景知识
- 04-082016考研英语:如何提高效率,记忆单词