SHARE
Facebook X Pinterest WhatsApp

Pentagon Hack Attacks Decrease

thumbnail Pentagon Hack Attacks Decrease

Although he U.S.-China Economic and Security Review Commission reports about 30,000 incidents of malicious cyber activity in the first six months of 2010, a draft federal report states the number of attacks on the Pentagon’s networks has decreased. As reported on Wired, there is a sharp contrast between the scare talk of generals and the […]

Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Although he U.S.-China Economic and Security Review Commission reports about 30,000 incidents of malicious cyber activity in the first six months of 2010, a draft federal report states the number of attacks on the Pentagon’s networks has decreased. As reported on Wired, there is a sharp contrast between the scare talk of generals and the actual figures presented in the federal report. Deputy Defense Secretary William Lynn suggests intrusions have increased exponentially, retired Adm. Mike McConnell said USA was losing the cyber-war and U.S. Cyber Command and National Security Agency chief Lt. Gen. Keith Alexander said he was alarmed by the number of times military networks were scanned for potential weak spots. The U.S.-China Economic and Security Review Commission however notes that 2010 could be the first year in which the number of events has declined in over a decade.


“The report cautioned that the drop in ‘malicious activity … may or may not represent a decrease in the volume of attempts to penetrate defense and military networks.’ Instead, the Pentagon seems to be doing a little better job in securing its networks, ever since a relatively-unsophisticated worm made its way onto hundreds of thousands of military computers in late 2008.
During ‘Operation Buckshot Yankee’ the subsequent clean-up effort, military leaders found that they were unable to gather even the most basic information about how their computers were configured — and what programs might be living in their networks.

Read the Full Story at Wired

Recommended for you...

4 Phishing Examples: Spot and Avoid Fraudulent Attacks
Examples of Ransomware: A Cautionary Tale
Juniper, Cato Build Out SASE Platform Offerings
Jeff Burt
Feb 4, 2022
Pandemic Leads to Permanent Changes in Workforce, WAN: Aryaka
Jeff Burt
Jan 20, 2022
Enterprise Networking Planet Logo

Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.