cyber-espionage love

cyber-espionage

Definitions

Sorry, no definitions found. Check out and contribute to the discussion of this word!

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word cyber-espionage.

Examples

  • But while the anarchic appeal of both Anonymous and Lulz is earning them a global following, experts warn that their activities run the risk of obscuring the real threat posed by cyber-espionage and online organised crime.

    Hackers' childish squabble that ended in a raid by Scotland Yard 2011

  • But while the anarchic appeal of both Anonymous and Lulz is earning them a global following, experts warn that their activities run the risk of obscuring the real threat posed by cyber-espionage and online organised crime.

    Hackers' childish squabble that ended in a raid by Scotland Yard 2011

  • Thomas Winfield , professor of international law at the George C. Marshall European Center for Security Studies, describes these attacks as "state-sponsored cyber-espionage".

    Patents are a Virtue Geoff Nairn 2011

  • One of the best-known examples of commercial cyber-espionage was Operation Aurora in early 2010, which hit Google and at least 30 other companies.

    Your Wall Has Ears Geoff Nairn 2011

  • The cyber-espionage slice of theInternet underground traces its beginnings back to 1993 when the Russians first began developing black-ops teams to concentrate on intelligence gathering using the Internet, says Alan Paller, managing director of The Sans Institute think tank.

    China-Google quarrel highlights world of cyber espionage 2010

  • The news is filled with scary stories about the insecurity of the computer and telecommunication systems on which our nation's prosperity depends: malicious software planted in electricity-grid computers; rampant state-sponsored and criminal cyber-espionage and theft; and the possibility of cyberattacks on banking and transportation systems.

    The cybersecurity changes we need 2010

  • And University of Toronto researchers this week announced their discovery of yet another cyber-espionage ring operating out of China.

    Google's Business Reason for Leaving China Matthew Forney 2010

  • And University of Toronto researchers this week announced their discovery of yet another cyber-espionage ring operating out of China.

    Google's Business Reason for Leaving China Matthew Forney 2010

  • There are other, less apocalyptic, motives behind much of the cyber-espionage that is currently taking place.

    Cyber Terrorism Is Now Seen as a Real Threat 2010

  • The news is filled with scary stories about the insecurity of the computer and telecommunication systems on which our nation's prosperity depends: malicious software planted in electricity-grid computers; rampant state-sponsored and criminal cyber-espionage and theft; and the possibility of cyberattacks on banking and transportation systems.

    The cybersecurity changes we need 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.