Rep. Frank Wolf (R., Va.) criticized the decision by NASA’s Ames Research Center to prohibit Chinese scientists from attending an upcoming conference in a Tuesday letter to agency administrator Charles Bolden.
Chinese government-backed hackers have cost the United States nearly $2 trillion in “lost and stolen property” that was seized through illicit Internet attacks, Rep. Mike Rogers (R., Mich.), chairman of the House Permanent Select Committee on Intelligence, said Monday.
Obama administration officials assured Congress on Wednesday morning that the technology undergirding Obamacare will be ready on time and will be secure from cyber attacks, although testimony and congressional questions revealed risks.
Witnesses stressed that the United States must do more to protect itself against cyber attacks from foreign infiltrators in front of the House Committee on Energy and Commerce Tuesday morning.
U.S. and Chinese officials met in Washington on Monday for the first talks between the two nations on the contentious issue of cyber attacks and cyber theft of intellectual property.
Lawmakers and cybersecurity experts urged Congress and President Barak Obama Tuesday to enact tougher sanctions against the Chinese government for its widespread theft of intellectual property and defense technology as well as its abuse of human rights activists.
Preventing a “cyber 9/11” will require unprecedented collaboration between the government and the private sector, cybersecurity experts said Thursday.
Chinese hackers have gained access to designs of more than two dozen major U.S. weapons systems, a U.S. report said on Monday, as Australian media said Chinese hackers had stolen the blueprints for Australia’s new spy headquarters.
A previously unknown group of hackers believed to be Iranian has opened cyber attacks in the United States against U.S. companies.
A new round of cyber attacks is hitting American companies, but unlike recent Chinese attacks that have been espionage-based, these attacks originate in the Middle East and are seeking to destroy rather than extract information.