Pentagon Hacking Charge Denied
考研英语
时间: 2019-04-08 14:15:38
作者: 匿名
China yesterday described as "groundless" and a product of "Cold War mentality" reports claiming hackers, on the instructions of the People's Liberation Army (PLA), had broken into a Pentagon network.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.

China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
The Financial Times, citing unidentified former and serving US officials, said yesterday that PLA hackers had broken into a US Defense Department network in June to steal data, forcing the shutdown of a system serving department secretary Robert Gates.
"The Chinese government has consistently opposed and vigorously attacked all Internet crimes, including hacking," Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing in Beijing yesterday.

China itself is a victim of online attacks, she said.
A Symantec Internet Security Threat Report released in March found that the US is the source of about 31 percent of all malicious computer activities, more than four times that of China (7 percent) and Germany (7 percent).
And 51 percent of the servers used for buying or selling stolen personal information were in the US, the report said.
Experts have said that hackers in other countries could use insecure computers and networks in China to disguise their locations and launch attacks.
猜你喜欢
-
- 03-082017考研英语一新题型:题目相对成熟无增减
- 03-082017考研英语二英译汉:分值依旧占到15%
- 03-082017年考研(英语一)考试大纲不变
- 03-082017考研英语大纲解析--阅读PartB详解
- 03-082017考研大纲:英语一与英语二【完形填空】对比解读
- 03-082017考研英语一大纲-小议阅读理解细节题和推理题攻略
- 03-082017年考研英语二大纲(非英语专业)原文
- 03-082017年与2016年考研英语(一)大纲变化对照表
- 03-082017年与2016年考研英语(二)大纲变化对照表
- 03-082017考研英语(二)考试大纲综述