Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Chinese hackers infiltrate U.S. Senator's office PCs

Thursday, March 26, 2009

Senator Bill Nelson of Florida confirmed this week that cybercriminals based in China hacked into his Senate office computers.

The news comes in the same week that the U.S. Department of Defense released a report on China's military capabilities that highlighted the growing threat of Chinese cyberwarfare. Nelson first revealed the attacks March 19 at an Armed Services Committee hearing.

Nelson said in a statement that no classified information was stored on the hacked computers, which were wiped clean by the Senate Sergeant at Arms Information Technology Security Branch.

Twice this month and once in February, hackers targeted the work stations of Nelson’s foreign policy aide, his deputy legislative director and "a former Nelson NASA adviser," Nelson’s office said.

The cyberattacks were traced to China through IP information, according to a report in CQ Politics. China has been suspected of involvement in other cyberattacks in recent years, including an incident last August that infected the communications networks of the presidential campaigns of Barack Obama and John McCain.

The Pentagon's report said China is compensating for its lack of military hardware capabilities through disruptive technologies such as attacking an enemy's computer networks and communication satellites.


View more news

 
  Most Popular
. Computer Security

. Ethical Hacking

. Windows 7: the untold story of how the enterprise gets snubbed

. Open source identity: Linux founder Linus Torvalds

. FAQ: How to protect your PC against the Downadup worm

. Brocade's new CTO takes aim at Cisco

. Heartland tries to rally industry in wake of data breach

. IBM confirms layoffs

. Apple puts iPhone Nano and Netbook rumors to rest

. Microsoft 'can't imagine' PS3 catching up to Xbox 360
 
 
  Popular Searches
 
 
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html