Pentagon Hacking Charge Denied
考研英语
时间: 2019-04-08 14:15:38
作者: 匿名
China yesterday described as "groundless" and a product of "Cold War mentality" reports claiming hackers, on the instructions of the People's Liberation Army (PLA), had broken into a Pentagon network.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.
China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.
China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
猜你喜欢
-
- 03-082017考研英语(一)考试大纲综述
- 03-082017考研英语大纲权威解析:命题风格多样化
- 03-082017年考研英语一大纲(非英语专业)原文
- 03-082016考研英语大纲汇总
- 03-082016年考研英语一新题型大纲解析
- 03-082016届考研英语二大纲解析--翻译
- 03-082016年英语一考研大纲深度解析:应用文写作
- 03-082018年考研英语编故事记单词的妙招
- 03-082018考研英语阅读:过来人谈高效解题的8个思维方式
- 03-082018考研新变化:全日制与非全日制招生不得相互使用