YOU ARE HERE: LAT HomeCollectionsCyber Security

Cyber Security

January 14, 2012 | By Richard Verrier, Los Angeles Times
The Obama administration signaled Saturday it does not support aspects of pending anti-piracy legislation, a setback for the Motion Picture Assn. of America, Hollywood's chief lobbying arm. The measures - which have deeply divided the entertainment and technology industries - would give the Justice Department more tools to shut down foreign websites involved in theft of movies and TV shows. Major Hollywood studios and unions have been mounting a campaign in support of the bills to combat online piracy, which costs the industry billions annually.
July 10, 2013 | By Don Lee
WASHINGTON -- The U.S. and China opened annual high-level talks on Wednesday, with both sides calling for greater mutual trust amid bilateral strains over cyber spying and security threats in northeast Asia.  The meetings, held at the State and Treasury departments in Washington, are intended to bring together Cabinet-level officials to enhance dialogue on potential cooperation in a wide range of security and economic areas, as well as on the...
June 6, 2013 | Shashank Bengali and Ken Dilanian
In January 2010, when Google accused Chinese hackers of infiltrating its network to track emails of human rights activists, the Obama administration didn't disclose what U.S. diplomats in Beijing believed: China's Politburo had directed the attack. Today the White House no longer shies from publicly accusing Beijing of launching a sophisticated range of cyber attacks on U.S. computer networks to steal corporate and government secrets -- including those of naval propulsion systems and gas pipeline technology -- worth billions of dollars.
May 23, 2011 | By Cyndia Zwahlen
It took all of three minutes for the hacker to break into the small accounting firm's computer system. The virtual open window into the system turned out to be a computer equipped with outdated software. It provided access to the office network and the hacker was able to get files that included private financial information. "That was a shock," said Lynne Leavitt, a partner at the four-person Los Angeles firm, Brakensiek Leavitt Pleger. "I thought we had good security. I thought we were safe.
April 24, 2012 | By Morgan Little
WASHINGTON -- Activists and lawmakers are geared up for a final push against the latest Internet security legislation, calling on Congress to reject or dial back the Cyber Intelligence Sharing and Protection Act (PDF) because of the considerable power it would give government to examine Americans' online activities. A number of amendments already have been made to the bill as its supporters have tried to secure passage - - a vote is likely on Friday - - by clearing up ambiguities regarding what the law would allow the government to do. CISPA's supporters portray it as a bill focused on opening up communication between the government and private entities for the purposes of sharing information about imminent or emerging cyber security threats, with particular emphasis on those that threaten national security from foreign sources.
June 12, 2013 | By Joseph S. Nye Jr
China will almost certainly pass the United States in the total size of its economy within a decade or so. But if one looks also at military and "soft power" resources, the U.S. is likely to remain more powerful than China for at least the next few decades. Does it matter? When nations worry too much about power transitions, their leaders may overreact or follow strategies that are dangerous. As Thucydides described it, the Peloponnesian War - in which the Greek city-state system tore itself apart - was caused by the rise in the power of Athens and the fear that created in Sparta.
August 7, 2013 | By Andrew Tangel
NEW YORK -- Big U.S. banks have learned to play nice, at least when it comes to cybersecurity. Last year, when hackers bombarded, and in some cases hobbled, banks' websites, the FBI met with representatives to discuss the attacks. Bank officials initially were reluctant to share much information, however, according to Joseph Demarest, assistant director in the FBI's cyberdivision. “It was stilted,” Demarest said at a cybersecurity conference in New York on Tuesday. “Folks were rather protective,” he added, and “wouldn't share in an environment with their competitors sitting in the same room.” Months later, Demarest said, the large financial institutions began sharing more information about attacks with the government and each other.
July 11, 2013 | By Don Lee, Los Angeles Times
WASHINGTON - The U.S. reached agreement with China to cooperate on improving investments and climate change, among other areas, but officials could cite little concrete progress on a White House priority: getting the Chinese to stop cyber-theft of American technologies and trade secrets. As China and the U.S. concluded their fifth annual Strategic and Economic Dialogue on Thursday, officials on both sides described the overall tenor of the two-day discussions as candid and constructive.
February 12, 2013 | By Ken Dilanian, Washington Bureau
WASHINGTON - President Obama issued an executive order Tuesday that seeks to shore up the nation's cyber-defenses by improving how classified information is shared between the government and the owners and operators of crucial infrastructure, including electric utilities, dams and mass transit. The long-expected order, which Obama announced in his State of the Union speech, is a stopgap measure that follows Congress' failure last year to pass legislation to create comprehensive standards for the private sector to help thwart digital attacks.
February 8, 2013 | By Molly Hennessy-Fiske
HOUSTON -- Members of the Bush family, including both former presidents, have apparently been hacked, and the Secret Service is investigating. The revelation came after Bush family photos and excerpts of email exchanges were posted online Thursday by the Smoking Gun, which attributed them to a hacker known as “Guccifer.” Guccifer claimed on the website to be a veteran hacker already being sought by “the feds” for hacking hundreds of...
Los Angeles Times Articles