Pentagon Hacking Charge Denied
考研英语
时间: 2019-04-08 14:15:38
作者: 匿名
China yesterday described as "groundless" and a product of "Cold War mentality" reports claiming hackers, on the instructions of the People's Liberation Army (PLA), had broken into a Pentagon network.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.
China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.
China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
猜你喜欢
-
- 04-082019考研英语临考名师叮嘱3件事
- 03-082012年考研英语阅读题型特点与命题思路分析之推理判断题
- 04-082013年大学英语四级考试翻译模拟练习8
- 03-08考研优美英语作文背诵:TypesofSpeech
- 03-082013考研英语大纲:夯实基础突出技巧
- 03-082012年考研英语四方面入手征服阅读题
- 04-082001年英语专业四级考试阅读真题:text J
- 04-08Two S Korean hostages released(1)
- 04-08教育部考试中心:2014考研英语阅读模拟练习题(7)
- 03-082015年考研英语词汇精讲(十八)