{"id":2433,"date":"2013-02-11T00:00:00","date_gmt":"2013-02-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/11\/chinese-hackers-going-after-u-s-not-just-media-daily-intelligencer\/"},"modified":"2021-12-30T11:41:20","modified_gmt":"2021-12-30T11:41:20","slug":"chinese-hackers-going-after-u-s-not-just-media-daily-intelligencer","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/11\/chinese-hackers-going-after-u-s-not-just-media-daily-intelligencer\/","title":{"rendered":"Chinese Hackers Going After U.S., Not Just Media &#8212; Daily Intelligencer"},"content":{"rendered":"<p>Last month the New York Times announced that Chinese hackers had stolen every employee&#8217;s corporate password, and not to be outdone, the Wall Street Journal and Bloomberg News then revealed that they&#8217;d been targeted as well (though hackers failed to infiltrate Bloomberg News). &#8230;  According to a new national intelligence estimate, Chinese hackers have been rifling through the computer systems of a variety of American businesses as part of a massive operation that might be costing the country tens of billions of dollars. While it appears the hackers were targeting the media companies to keep tabs on their reporting on China, the National Intelligence Estimate found that the larger aim of the larger cyber-espionage campaign is to steal trade secrets and other data that could give China an economic edge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some experts think online espionage is costing us as much as $25 billion to $100 billion annually, and the Obama administration is stepping up its efforts to fight the problem.   This week, the president is expected to issue an executive order outlining voluntary cyber security standards for important private-sector companies and for the sharing of threat information between the companies and the government. &#8230;  The government needs specific evidence of hacking to take action, and when an institution like the Times reveals that it&#8217;s been targeted, it might encourage other companies to admit that they failed to prevent hackers from poking around in their computer systems.<\/p>\n<p>Link: http:\/\/nymag.com\/daily\/intelligencer\/2013\/02\/chinese-hackers-going-after-us-not-just-media.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2433","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2433"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2433\/revisions"}],"predecessor-version":[{"id":4920,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2433\/revisions\/4920"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}