A map of China is seen through a magnifying glass on a computer screen showing binary digits in Singapore in this January 2, 2014 photo illustration. Picture taken January 2, 2014. REUTERS/Edgar Su.
"After years of cyberattacks on the networks of high-profile government targets like the Pentagon, Chinese hackers appear to have turned their attention to far more obscure federal agencies," reports the New York Times—real snoozers like the Government Printing Office and the Government Accountability Office, which senior officials said this week were pwned in March.
The printing office catalogs and publishes information for the White House, Congress and many federal departments and agencies. It also prints passports for the State Department. The accountability office, known as the congressional watchdog, investigates federal spending and the effectiveness of government programs.
The attacks occurred around the same time Chinese hackers breached the networks of the Office of Personnel Management, which houses the personal information of all federal employees and more detailed information on tens of thousands of employees who have applied for top-secret security clearances.
Read more here.
The pattern of attacks suggests they are conducted by state agencies. Perhaps the point here is that they're trying to compromise as many targets within the system as possible, to learn more about common vulnerabilities--rather than targeting these specific agencies. And besides, you never know what's behind a door until you open it.
Looking for a tiny PC that still has space for a gaming-quality video card? SFF PC Cases is a remarkably detailed spreadsheet listing dozens of models, complete with cost, dimensions, volume and even important build tips. The very smallest are not practical for powerful builds, but the critical “Maximum GPU length” field is right there […]
Enjoy Michael Mullany’s review of the Gartner Hype Cycle, with all the things tech predictors got right and all the things they got wrong: “we’re terrible at making predictions.” Lesson 6: Some technologies keep receding into the future There are some notable technologies that recur on the Hype Cycle and every time they appear they […]
Why we secretly love our cords. Tamara Warren: There’s a certain security in the cord. It’s the idea of connection, perhaps even dating back to our days in the womb. … A battery, no matter how sophisticated, is fleeting. When we have our cords with us, we are in constant pursuit of power, even when […]
Top-performing content doesn’t come from pure inspiration. So how do you get the maximum number of eyeballs to see your marketing copy? By analyzing the impact of the keywords within. Serpstat does this all for you. It can monitor up to 200 keywords in your projects, across 10 total domains. They keep track of the […]
Toaster ovens are the perfect appliance for small things like toasted sandwiches and roasted garlic (try it!), but anything more involved usually requires a full-sized conventional oven.However, despite its small size, the Wolfgang Puck Pressure Oven can handle anything from baked pastries to broiled meats. This kitchen appliance has a minimal countertop footprint, and cooks […]