Advertisement
 
YOU ARE HERE: LAT HomeCollectionsCyber Security
IN THE NEWS

Cyber Security

BUSINESS
August 7, 2013 | By Andrew Tangel
NEW YORK -- Big U.S. banks have learned to play nice, at least when it comes to cybersecurity. Last year, when hackers bombarded, and in some cases hobbled, banks' websites, the FBI met with representatives to discuss the attacks. Bank officials initially were reluctant to share much information, however, according to Joseph Demarest, assistant director in the FBI's cyberdivision. “It was stilted,” Demarest said at a cybersecurity conference in New York on Tuesday. “Folks were rather protective,” he added, and “wouldn't share in an environment with their competitors sitting in the same room.” Months later, Demarest said, the large financial institutions began sharing more information about attacks with the government and each other.
Advertisement
NEWS
June 7, 2013 | By Christi Parsons
SAN JOSE -   President Obama plans to take up the subject of cyber security with Chinese President Xi Jinping on Friday as the two meet behind closed doors for what U.S. officials hope will be a rapport-building session between the two leaders. But the meeting unfolds in an atmosphere of newly heightened concern about the Obama administration's own policies toward the privacy of American citizens, likely to distract the public attention's from the high-stakes meeting in Southern California.
NATIONAL
January 14, 2012 | By Richard Verrier, Los Angeles Times
The Obama administration signaled Saturday it does not support aspects of pending anti-piracy legislation, a setback for the Motion Picture Assn. of America, Hollywood's chief lobbying arm. The measures - which have deeply divided the entertainment and technology industries - would give the Justice Department more tools to shut down foreign websites involved in theft of movies and TV shows. Major Hollywood studios and unions have been mounting a campaign in support of the bills to combat online piracy, which costs the industry billions annually.
WORLD
June 6, 2013 | Shashank Bengali and Ken Dilanian
In January 2010, when Google accused Chinese hackers of infiltrating its network to track emails of human rights activists, the Obama administration didn't disclose what U.S. diplomats in Beijing believed: China's Politburo had directed the attack. Today the White House no longer shies from publicly accusing Beijing of launching a sophisticated range of cyber attacks on U.S. computer networks to steal corporate and government secrets -- including those of naval propulsion systems and gas pipeline technology -- worth billions of dollars.
NEWS
April 24, 2012 | By Morgan Little
WASHINGTON -- Activists and lawmakers are geared up for a final push against the latest Internet security legislation, calling on Congress to reject or dial back the Cyber Intelligence Sharing and Protection Act (PDF) because of the considerable power it would give government to examine Americans' online activities. A number of amendments already have been made to the bill as its supporters have tried to secure passage - - a vote is likely on Friday - - by clearing up ambiguities regarding what the law would allow the government to do. CISPA's supporters portray it as a bill focused on opening up communication between the government and private entities for the purposes of sharing information about imminent or emerging cyber security threats, with particular emphasis on those that threaten national security from foreign sources.
OPINION
July 14, 2009 | Jesselyn Radack, Jesselyn Radack is the homeland security director of the Government Accountability Project in Washington.
Cyber security is a real issue, as evidenced by the virus behind July 4 cyber attacks that hobbled government and business websites in the United States and South Korea. It originated from Internet provider addresses in 16 countries and targeted, among others, the White House and the New York Stock Exchange. Unfortunately, the Obama administration has chosen to combat it in a move that runs counter to its pledge to be transparent.
MAGAZINE
November 17, 2002 | Janet Reitman, Janet Reitman's last story for the magazine was a profile of David Rosenthal, a television writer who left Hollywood, at least temporarily, and moved to New York.
The boys who might save your life one day really love fast cars. one of them, a 24-year-old named Mark Davis, drives a turbo-powered black Ford Mustang. Earlier this year, Mark took me for a drive through Tulsa, Okla., where he lives. "Check this out," he said, as we passed a strip mall. He flipped on a Metallica CD, rolled down the windows, pumped up the volume as high as it could go, and revved his engine. A few people standing on the curb staggered back as if they'd been shot. Mark grinned.
BUSINESS
May 31, 2013 | By Paresh Dave, Los Angeles Times
Frustrated by their inability to stem an onslaught of computer hackers, some companies are considering adopting the standards of the Wild West to fight back against online bandits. In taking an eye-for-an-eye approach, some of the companies that have been attacked are looking at retaliating against the attackers, covertly shutting down computers behind the cyber assaults or even spreading a new virus to stymie the hackers. Such retaliation is illegal in the United States, but companies see it as a way to curtail the breaches, particularly if the attack is originating from another country, where the legality of retaliatory attacks is unclear.
BUSINESS
February 23, 2012 | By Ken Dilanian
This post has been corrected. See the note at the bottom for details. Just as U.S. companies are coming to grips with the threats to their computer networks emanating from cyber spies based in China, a noted expert is highlighting what he says is an even more pernicious vulnerability in smartphones. Dmitri Alperovitch, the former McAfee cyber security researcher who is best known for identifying a widespread China-based cyber espionage operation he dubbed " Shady Rat ," has used a previously unknown hole in smartphone browsers to deliver an existing piece of China-based malware that can commandeer the device, record its calls, pinpoint its location and access user texts and emails.
NATIONAL
February 8, 2013 | By Molly Hennessy-Fiske
HOUSTON -- Members of the Bush family, including both former presidents, have apparently been hacked, and the Secret Service is investigating. The revelation came after Bush family photos and excerpts of email exchanges were posted online Thursday by the Smoking Gun, which attributed them to a hacker known as “Guccifer.” Guccifer claimed on the website to be a veteran hacker already being sought by “the feds” for hacking hundreds of...
Los Angeles Times Articles
|