Iran accused of hacking into U.S. Navy computers
US officials said the attacks hit an unclassified network, according to The Wall Street Journal
IDG News Service - Hackers backed by Iran have penetrated an unclassified U.S. Navy network in one of the most serious incidents of cybercrime yet by the Middle East nation, according to a report Friday.
The U.S. doesn't believe important data was stolen, but the attacks showed a new level of Iranian hacking power, including the ability to access military data, U.S. officials told The Wall Street Journal. Either agents working directly for the Iranian government or an outside group with Iran's approval allegedly carried out the attacks.
The attacks came just as U.S. and Iranian officials tried to restart negotiations over Iran's alleged nuclear weapons program. U.S. President Barack Obama and Iranian President Hasan Rouhani spoke by phone on Friday.
Cybersecurity experts have said China and Russia have more sophisticated hacking abilities than Iran or North Korea but the smaller countries are more volatile threats, seeking retaliation rather than economic gain.
The U.S. carries out its own share of cyberwarfare, according to reports in the Washington Post based on documents leaked by former NSA employee Edward Snowden. Those documents showed the U.S. engaged in 231 attacks on foreign targets in 2011, the Post said.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts