• Given the alternative of future attacks, more technology to fight back has to be better than less.

    WSJ: Crovitz: In Praise of Surveillance Cameras

  • The most problematic form of digital attacks for businesses are evil clones, impersonators who use technology to create a believable avatar of you that confesses to a misdeed, or exaggerates your faults.

    FORBES: Digital Assassins Invade The Corporate Suite

  • On Wednesday, Chinese foreign minister Hong Lei said China itself had been the victim of attacks, citing a 2012 report from the country's Ministry of Information Technology and Industry.

    BBC: White House vows to fight trade-secrets theft

  • Black-hat hackers began posting corporate e-mails, and, during the summer of 2011, attacks on media, technology, and other institutions came almost daily.

    NEWYORKER: Machine Politics

  • As Judith Curry, a climatologist at the Georgia Institute of Technology, observes, attacks on climate scientists, sometimes paid for by carbon-emitting industries when global warming first became a public issue, have made many researchers in the field nervous and defensive.

    ECONOMIST: Leaked e-mails do not show climate scientists at their best

  • The central bank had pushed rates down to encourage economic growth after the bursting of the technology bubble in the stock market in 2000 and the terrorist attacks of Sept. 11, 2001.

    FORBES

  • In addition, Atomic Tangerine took the wraps off of a new technology, NetRadar, that uses sophisticated network agents to reduce the threat of attacks before they actually occur, according to Atomic Tangerine.

    CNN: Security experts say hackers have the edge

  • They say that Iraqis are coming forward to warn them of attacks and they also have increasingly sophisticated surveillance technology.

    NPR: Bush Speech Highlights the Challenge of the Iraqi Insurgency

  • According to a recent study cited by the U.S. House Small Business Subcommittee on Health and Technology, nearly 20% of all cyber attacks hit small businesses with 250 or fewer employees.

    FORBES: Your Business Is Never Too Small For A Cyber Attack, Here's How To Protect Yourself

  • Six months later the image still sears Brown's mind, but he conjures up another one: an even more crippling new wave of attacks that might come next, puncturing the nation's technology underbelly and disabling the networks that keep nuclear missiles in their silos, the lights on at hospitals, milk on store shelves and ATMs belching out cash.

    FORBES: Scare Tactics

  • Six months later the image still sears Brown's mind, but he conjures up another one: an even more crippling new wave of attacks that might come next, puncturing the U.S.' technology underbelly and disabling the networks that keep nuclear missiles in their silos, the lights on in hospitals and automatic teller machines belching out cash.

    FORBES: Scare Tactics

  • At Homeland Security, you could work in the burgeoning area of biometrics, which uses technology like digital fingerprints and photos to verify identity and protect against terrorist attacks.

    FORBES: Magazine Article

  • Adding PUF technology significantly improves the chip's protection from reverse engineering attacks, as it removes the permanent presence of the digital encryption key on the device.

    ENGADGET: NXP's silicon fingerprinting promises to annoy the heck out of ID hackers

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定