Advertisement
YOU ARE HERE: LAT HomeCollectionsCyber Security
IN THE NEWS

Cyber Security

BUSINESS
September 27, 2012 | By E. Scott Reckard, Andrew Tangel and Jim Puzzanghera
A shadowy but well organized hacker group in the Middle East has disrupted the electronic banking operations of America's largest financial institutions in recent days, underscoring U.S. vulnerability to online terrorism. A group identifying itself as Izz ad-Din al-Qassam Cyber Fighters attacked the websites of Wells Fargo, U.S. Bancorp and Bank of America. The strikes left customers temporarily unable to access their checking accounts, mortgages and other services. The banks said account and personal information for their tens of millions of online and mobile customers were not compromised.
Advertisement
NEWS
April 24, 2012 | By Morgan Little
WASHINGTON -- Activists and lawmakers are geared up for a final push against the latest Internet security legislation, calling on Congress to reject or dial back the Cyber Intelligence Sharing and Protection Act (PDF) because of the considerable power it would give government to examine Americans' online activities. A number of amendments already have been made to the bill as its supporters have tried to secure passage - - a vote is likely on Friday - - by clearing up ambiguities regarding what the law would allow the government to do. CISPA's supporters portray it as a bill focused on opening up communication between the government and private entities for the purposes of sharing information about imminent or emerging cyber security threats, with particular emphasis on those that threaten national security from foreign sources.
BUSINESS
May 23, 2011 | By Cyndia Zwahlen
It took all of three minutes for the hacker to break into the small accounting firm's computer system. The virtual open window into the system turned out to be a computer equipped with outdated software. It provided access to the office network and the hacker was able to get files that included private financial information. "That was a shock," said Lynne Leavitt, a partner at the four-person Los Angeles firm, Brakensiek Leavitt Pleger. "I thought we had good security. I thought we were safe.
BUSINESS
February 24, 2012 | Ken Dilanian
Just as U.S. companies are coming to grips with threats to their computer networks emanating from cyber spies based in China, a noted expert is highlighting what he says is an even more pernicious vulnerability in smartphones. Dmitri Alperovitch, the former McAfee Inc. cyber security researcher best known for identifying a widespread China-based cyber espionage operation dubbed Shady Rat, has used a previously unknown hole in smartphone browsers to plant China-based malware that can commandeer the device, record its calls, pinpoint its location and access user texts and emails.
OPINION
July 14, 2009 | Jesselyn Radack, Jesselyn Radack is the homeland security director of the Government Accountability Project in Washington.
Cyber security is a real issue, as evidenced by the virus behind July 4 cyber attacks that hobbled government and business websites in the United States and South Korea. It originated from Internet provider addresses in 16 countries and targeted, among others, the White House and the New York Stock Exchange. Unfortunately, the Obama administration has chosen to combat it in a move that runs counter to its pledge to be transparent.
MAGAZINE
November 17, 2002 | Janet Reitman, Janet Reitman's last story for the magazine was a profile of David Rosenthal, a television writer who left Hollywood, at least temporarily, and moved to New York.
The boys who might save your life one day really love fast cars. one of them, a 24-year-old named Mark Davis, drives a turbo-powered black Ford Mustang. Earlier this year, Mark took me for a drive through Tulsa, Okla., where he lives. "Check this out," he said, as we passed a strip mall. He flipped on a Metallica CD, rolled down the windows, pumped up the volume as high as it could go, and revved his engine. A few people standing on the curb staggered back as if they'd been shot. Mark grinned.
OPINION
June 12, 2013 | By Joseph S. Nye Jr
China will almost certainly pass the United States in the total size of its economy within a decade or so. But if one looks also at military and "soft power" resources, the U.S. is likely to remain more powerful than China for at least the next few decades. Does it matter? When nations worry too much about power transitions, their leaders may overreact or follow strategies that are dangerous. As Thucydides described it, the Peloponnesian War - in which the Greek city-state system tore itself apart - was caused by the rise in the power of Athens and the fear that created in Sparta.
NATIONAL
October 14, 2009 | Sebastian Rotella
Homeland Security Secretary Janet Napolitano got a firsthand look Tuesday at how her agency, which defends the nation's physical borders, also guards a volatile virtual frontier: cyberspace. Napolitano visited the Cyber Crimes Center, which is operated by U.S. Immigration and Customs Enforcement in a discreet office building in suburban Virginia. Known as C3, the 12-year-old unit has a staff of 35 who use their computer expertise to assist investigations of complex international crimes, especially those that victimize children.
BUSINESS
August 7, 2013 | By Andrew Tangel
NEW YORK -- Big U.S. banks have learned to play nice, at least when it comes to cybersecurity. Last year, when hackers bombarded, and in some cases hobbled, banks' websites, the FBI met with representatives to discuss the attacks. Bank officials initially were reluctant to share much information, however, according to Joseph Demarest, assistant director in the FBI's cyberdivision. “It was stilted,” Demarest said at a cybersecurity conference in New York on Tuesday. “Folks were rather protective,” he added, and “wouldn't share in an environment with their competitors sitting in the same room.” Months later, Demarest said, the large financial institutions began sharing more information about attacks with the government and each other.
BUSINESS
July 11, 2013 | By Don Lee, Los Angeles Times
WASHINGTON - The U.S. reached agreement with China to cooperate on improving investments and climate change, among other areas, but officials could cite little concrete progress on a White House priority: getting the Chinese to stop cyber-theft of American technologies and trade secrets. As China and the U.S. concluded their fifth annual Strategic and Economic Dialogue on Thursday, officials on both sides described the overall tenor of the two-day discussions as candid and constructive.
Los Angeles Times Articles
|