cyberterrorist love

Definitions

from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • noun A person who carries out cyberterrorism.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word cyberterrorist.

Examples

  • * Starts by talking about his brother the cyberterrorist who has political power.

    State of Play 6 2009

  • Almost anyone under 30, though, has been trained in the skills that would allow him or her to be a cyberterrorist.

    The Atlas That Shrugged 2008

  • I mean, this -- it's very hard to hide when you -- when you're a cyberterrorist.

    CNN Transcript - Special Event: Millennium 2000: Internet Future - January 2, 2000 2000

  • The author, a technical fellow at Microsoft and an expert on the Windows operating system, writes a thriller imagining what might happen when a cyberterrorist attack disables pretty much everything run by a computer, including airplanes and nuclear-power plants.

    The Seattle Times 2011

  • That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.

    InformationWeek - All Stories And Blogs Bob Evans 2010

  • That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.

    InformationWeek - All Stories And Blogs Bob Evans 2010

  • That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.

    TechWeb 2010

  • That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.

    InformationWeek - All Stories And Blogs Bob Evans 2010

  • That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.

    TechWeb 2010

  • That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.

    InformationWeek - All Stories And Blogs Bob Evans 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.