Pentagon: 24,000 military files stolen in cyberattack

the-pentagon-cyber-attackDeputy defense secretary William J. Lynn revealed in a speech on Thursday that the security systems of a defense contractor were breached by hackers back in March, resulting in the loss of 24,000 military files. The hackers are believed to be based outside of the US, though no specific information as to their whereabouts was given.

According to a Huffington Post report, the cyberattack is one of the Pentagon’s biggest ever security breaches.

Lynn called it a “significant concern” that “over the past decade, terabytes of data have been extracted by foreign intruders from corporate networks of defense companies.”

The deputy defense secretary went on to explain that while much of the data taken by intruders is “mundane,” some of it is extremely sensitive, relating to areas such as aircraft, surveillance and satellite communications.

Lynn was outlining the Pentagon’s new cyber strategy, which aims to produce tougher computer networks that can withstand cyberattacks and allow the military to continue to function in an effective manner, even when parts of its set-up have been compromised.

It is the first time such a strategy has been implemented by the Pentagon as it looks at ways to deal with cyberattacks not only from foreign groups and governments looking to obtain sensitive data, but also terrorist groups.

“Current countermeasures have not stopped this outflow of sensitive information,” Lynn also said in his speech, adding: “We need to do more to guard our digital storehouses of design innovation.”

Last month, national security expert Richard Clarke claimed that the Chinese government is systematically attacking the computer networks of the U.S. government.

In late May, hackers were also reported to have gained access to the computer networks of defense contractors Lockheed Martin.

In the same month, White House officials were the victims of an attempt by foreign hackers to trick them into giving over their e-mail passwords. Military personnel were among those targeted. China was blamed for the phishing attack, though the government denied being involved.

Also in May, the Pentagon announced that cyberattacks on US computer systems could be regarded as an act of war, resulting in a possible military response.


How good are you at spotting phishing scams? Take this quiz to find out

Are you able to discern between a legitimate email and one that's a scam designed to phish for your personal information? Google created an online quiz with tips to help you better understand phishing so you don't become a victim.

These are the best indie games you can get on PC right now

Though many indie games now come to consoles as well, there's still a much larger selection on PC. With that in mind, we've created a list of the best indie games for PC, with an emphasis on games that are only available on PC.

Take a trip to a new virtual world with one of these awesome HTC Vive games

So you’re considering an HTC Vive, but don't know which games to get? Our list of 25 of the best HTC Vive games will help you out, whether you're into rhythm-based gaming, interstellar dogfights, or something else entirely.

Hackers are scoring with ransomware that attacks its previous victims

Computer viruses are always evolving. In a new one, dubbed "Ryuk," hackers are targeting PCs with ransomware that scours an infected network in order to pinpoint and attack and enterprises with big money.

Heal your wrist aches and pains with one of these top ergonomic mice

If you have a growing ache in your wrist, it might be worth considering ergonomic mice alternatives. But which is the best ergonomic mouse for you? One of these could be the ticket to the right purchase for you.

Want a MacBook that will last all day on a single charge? Check these models out

Battery life is one of the most important factors in buying any laptop, especially MacBooks. Their battery life is typically average, but there are some standouts. Knowing which MacBook has the best battery life can be rather useful.
Product Review

Controversy has dogged the MacBook Pro lately. Is it still a good purchase?

The MacBook Pro is a controversial laptop these days -- and that's unfortunate. Due to some divisive changes Apple made to the functionality of the MacBook Pro, fans are more split. Does the 8th-gen refresh change that?

Want a Dell laptop with an RTX 2060? Cross the new XPS 15 off your list

The next iteration of Dell's XPS 15 laptop won't come with an option for an RTX 2060, according to Alienware's Frank Azor. You could always opt for a new Alienware m15 or m17 instead.

Always have way too many tabs open? Google Chrome might finally help

Google is one step closer to bringing tab groups to its Chrome browser. The feature is now available in Google's Chrome Canady build with an early implementation that can be enabled through its flag system.

Here's how to convert a Kindle book to PDF using your desktop or the web

Amazon's Kindle is one of the best ebook readers on the market, but it doesn't make viewing proprietary files on other platforms any easier. Here's how to convert a Kindle book to PDF using either desktop or web-based applications.

Worried about your online privacy? We tested the best VPN services

Browsing the web can be less secure than most users would hope. If that concerns you, a virtual private network — aka a VPN — is a decent solution. Check out a few of the best VPN services on the market.
Product Review

Origin's Chronos PC is no looker, but it plays games with eye-popping detail

The Chronos is Origin’s smallest PC, but while it occupies less space than most A/V receivers, it delivers the power of a much larger desktop. Its dull exterior design does the system a disservice. Once you turn it on, you won’t be…

Can't stand keyboard gaming on PC? Here's how to use a PS3 controller instead

Properly connecting a PlayStation 3 Controller to a PC is no easy task, especially when you opt for third-party peripherals. Thankfully, our guide will help you through the process.

Zipping files on a Chromebook? Follow these four easy steps

Chromebooks support file compression, though they work a little differently than on Windows or Mac. Here's the step-by-step process to zipping files on a Chromebook, and then unzipping them again for extraction.