Advertisement
 

Chinese Hackers Infiltrated The New York Times’ Computer Networks for Four Months

January 31, 2013
Get the Flash Player to see this rotator.
 
The New York Times was the victim of an elaborate hacking attack from China, according to a report in Wednesday's Times. The attacks, which have been on-going for the past four months, were apparently in retaliation for an article the Times published about the vast wealth accumulated by Chinese Prime Minster Wen Jiabao's family.

Hackers first gained access to the Times's system on September 13th, but the breach wasn't noticed until October 26th, the day after the article was published and two days after the Times had asked AT&T to monitor its network for any unusual activity....

 

Companies Mentioned:

More Suggested Content:

IRCE 2012 logo
10-Step Plan to Better Web Security
June 8, 2012 From ROI Report
To help brands protect against the chaos that ensues as a result of a data security breach — not to mention the potential lost revenue — Tim Toews, a web security consultant and former chief information officer at Office Depot, offered a 10-step plan to help retailers maintain control of their business space (i.e., their network) and keep hackers out. Toews presented his plan during a session he led this week at the Internet Retailer Conference & Exhibition in Chicago.
 

SPONSORED CONTENT

MORE ON E-MEDIA >>

FROM THE BOOKSTORE

As important as email marketing is, being an expert at it is no easy task. But do not fret. Email Marketing 2014 provides the trends and best practices you need to follow. You'll find: 21 email trends charts featuring data from Who's Mailing What!Analysis of 11 effective cross-channel emails Best practices covering everything from email copywriting and design to data, metrics, CRM, deliverability and more4 email case studies Email Marketing 2014 Trends, Best Practices & Case Studies

As important as email marketing is, being an expert at it is no easy task. But do not fret. Email Marketing 2014 provides the trends and best practices you need to follow. You'll find: 21 email trends charts featuring data from Who's Mailing What!Analysis of 11 effective cross-channel emails Best practices...

ORDER NOW

Build a High-Impact, Low-Hassle Digital Sales Prospecting System That Works!Discover the “invisible funnel,” where self-educated buyers are making decisions before you know they existLeverage Funnel Optimized website design to identify your prospects’ key challenges before you ever speak to themIntegrate social media, content, and email to optimize the entire prospecting processMake every sales call count with behaviorally targeted email prospectingLeverage Twitter, Facebook, and LinkedIn to efficiently “prospect at scale”And more! Invisible Sale: How to Build a Digitally Powered Marketing and Sales System to Better Prospect, Qualify and Close Leads

Build a High-Impact, Low-Hassle Digital Sales Prospecting System That Works!
Discover the “invisible funnel,” where self-educated buyers are making decisions before you know they existLeverage Funnel Optimized website design to identify your prospects’ key challenges before you ever speak to themIntegrate social media, content, and email to optimize the entire prospecting...

ORDER NOW

 

COMMENTS

Click here to leave a comment...
Comment *
Most Recent Comments: