text
stringlengths 4
429
|
---|
ments+Report/4888892/story.html
|
Poulsen, K. (2011, May 31). Second Defense Contractor L
|
3 'Actively Targeted' With RSA SecurID Hacks. Retrieved
|
June 13, 2011, from Wired: http://www.wired.com/threatlevel/2011/05/l
|
Reddy, S., Gorman, S., & Perez, E. (2011, June 13). IMF Mum on Details of Network Cyberattack. Retrieved June 13,
|
2011, from The Wall Street Journal:
|
http://online.wsj.com/article/SB10001424052702304665904576381973865291928.html
|
Rivner, U. (2011, April 01). Anatomy of an Attack. Retrieved June 13, 2011, from Speaking of Security: The Official
|
RSA Blog and Podcast: http://blogs.rsa.com/rivner/anatomy
|
attack/
|
Sanger, D., & Markoff, J. (2011, June 11). I.M.F Reports Cyberattack Led to 'Very Major Breach'. Retrieved June 13,
|
2011, from The New York Times: http://www.nytimes.com/2011/06/12/world/12imf.html
|
Secdev. (2009, March 29). Tracking GhostNet: Investigating a Cyber Espionage Network. Retrieved June 13, 2011,
|
from Information Warfare Monitor: http://www.scribd.com/doc/13731776/Tracking
|
GhostNet
|
Investigating
|
Cyber
|
Espionage
|
Network
|
PAGE 11 OF 13
|
COPYRIGHT
|
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
|
Snodgrass, R. (2007, December 14). Cyber attack on LANL outs personal info. Retrieved June 13, 2011, from LANL:
|
The Rest of the Story: http://lanl
|
rest
|
story.blogspot.com/2007/12/cyber
|
attack
|
lanl
|
outs
|
personal
|
info.html
|
The Guardian. (2011, June 13). IMF hit with serious state
|
sponsored cyber attack. Retrieved June 13, 2011, from
|
The Sydney Morning Herald: http://www.smh.com.au/technology/security/imf
|
with
|
serious
|
statesponsored
|
cyber
|
attack
|
20110613
|
lfzm0.html
|
The Washington Times. (2008, June 12). Hacking on Hill traced to China. Retrieved June 13, 2011, from The
|
Washington Times: http://www.washingtontimes.com/news/2008/jun/12/hacking
|
hill
|
traced
|
china/
|
U.S Office of Counterintelligence. (2011, June 14). Stuxnet Worm. Retrieved June 13, 2011, from Spy and Terrorist
|
Briefing Center: http://www.hanford.gov/oci/ci_spy.cfm?dossier=138
|
Walid Berissoul et agencies. (2011, March 07). Bercy: la cyber
|
attaque visait le G20. Retrieved June 13, 2011, from
|
Europe1: http://www.europe1.fr/France/Cyber
|
attaque
|
vise
|
selon
|
Bercy
|
442555/
|
Zetter, K. (2010, January 14). Google Hack Attack Was Ultra Sophisticated, New Details Show. Retrieved June 13,
|
2011, from Wired: http://www.wired.com/threatlevel/2010/01/operation
|
aurora/
|
PAGE 12 OF 13
|
COPYRIGHT
|
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
|
COPYRIGHT NOTICE
|
Copyright
|
Command Five Pty Ltd. All rights reserved.
|
This document is provided by the copyright holders under the licence
|
that follows. By obtaining, using, and/or distributing this document you
|
agree that you have read, understood, and agree to the terms and
|
conditions that follow.
|
The names and trademarks of Command Five Pty Ltd may not be
|
used in advertising or publicity relating to this document or its contents
|
without specific, prior, written permission.
|
No permission is given for this document to be used for commercial
|
purposes or as part of any commercial activity or undertaking,
|
including, but not limited to, use in or relating to advertising or
|
publicity, and/or use in support of, or as part of, any pre
|
sales or sales
|
activities.
|
No permission is given to create modified or derivative works. You
|
may distribute this document in its original form for non
|
commercial
|
purposes in accordance with the other terms and conditions stated
|
herein. Copyright title will at all times remain with the copyright
|
holders.
|
All referenced trademarks remain the property of their respective
|
owners.
|
THIS DOCUMENT IS PROVIDED
|
AS IS
|
FOR INFORMATIONAL
|
PURPOSES ONLY WITH NO REPRESENTATIONS OR WARRANTIES OF
|
ANY KIND, INCLUDING BUT NOT LIMITED TO ANY WARRANTY,
|
EXPRESS OR IMPLIED, OF MERCHANTABILITY OR FITNESS FOR A
|
PARTICULAR PURPOSE; WARRANTY OF NON
|
INFRINGEMENT, OR
|
TITLE; NOR ANY WARRANTIES PERTAINING TO THE ACCURACY OR
|
COMPLETENESS OF CONTENT.
|
ANY OPINIONS EXPRESSED IN THIS DOCUMENT MAY CHANGE
|
WITHOUT NOTICE AND ARE NOT NECESSARILY THE CONSIDERED
|
OPINIONS OF COMMAND FIVE PTY LTD, ITS PARTNERS, EMPLOYEES,
|
OR AFFILIATE ORGANISATIONS. ANY ADVICE OFFERED IN THIS
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.