Definitions

from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • noun Plural form of cyberassault.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word cyberassaults.

Examples

  • Intel has revealed in a Securities andExchange Commission filing that it too was the target of a sophisticated hacking attack in January, around the same timeGoogle complainedto China aboutsuch cyberassaults.

    Intel discloses yet another corporate network breach 2010

  • Russia, which has led the country to create a Cyber Defense League, a specialty military unit of IT volunteers that would help fend off similar future cyberassaults.

    TIME.com: Top Stories Allie Townsend 2011

  • Russia, which has led the country to create a Cyber Defense League, a specialty military unit of IT volunteers that would help fend off similar future cyberassaults.

    TIME.com: Top Stories Allie Townsend 2011

  • Russia, which has led the country to create a Cyber Defense League, a specialty military unit of IT volunteers that would help fend off similar future cyberassaults.

    TIME.com: Top Stories 2011

  • Russia, which has led the country to create a Cyber Defense League, a specialty military unit of IT volunteers that would help fend off similar future cyberassaults.

    TIME.com: Top Stories 2011

  • Terrorists, crooks and nation states are ramping up cyberassaults that are eating away at data, cash and security in the

    WN.com - Articles related to Gates investigates role contractors play in intel 2010

  • Military planners are mindful of incidents like the massive cyberassaults against

    Wired Top Stories Nathan Hodge 2010

  • Phone hacks have been mostly limited to the bragging-rights variety or small-scale for-profit attacks, even as malicious hackers found inventive new ways to make millions through cyberassaults on personal computers connected to the Internet.

    SFGate: Top News Stories jtemple@sfchronicle.com (James Temple 2010

  • IPS systems act as high-tech network bouncers - monitoring systems for malicious activities, such as malware or intrusion by hackers, and attempting to block these cyberassaults.

    The Register 2010

  • Terrorists, crooks and nation states are ramping up cyberassaults that are eating away at data, cash and security in the US, according to the head of the FBI, Robert Mueller (pictured in February).

    PhysOrg.com - latest science and technology news stories PhysOrg Team 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.