<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          USEUROPEAFRICAASIA 中文雙語Fran?ais
          China
          Home / China / World

          Cyberattack thrusts focus on spy agency

          China Daily | Updated: 2017-05-17 07:50

          NSA used flaws in Windows to build a hacking tool for own use

          WASHINGTON - An unprecedented global cyberattack that infected computers in at least 150 countries beginning on Friday has unleashed a new wave of criticism of the US National Security Agency.

          The attack was made possible by a flaw in Microsoft's Windows software that the NSA used to build a hacking tool for its own use - only to have that tool and others end up in the hands of a mysterious group called the Shadow Brokers, which then published them online.

          Microsoft President Brad Smith sharply criticized the US government on Sunday for "stockpiling" software flaws that it often cannot protect, citing recent leaks of both NSA and CIA hacking tools.

          "Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage," Smith said. "An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen."

          Some major technology companies, including Google and Facebook, declined to comment on the statement.

          But some other technology industry executives said privately that it reflected a widely held view in Silicon Valley that the US government is too willing to jeopardize internet security in order to preserve offensive cyber capabilities.

          The NSA did not respond to requests for comment.

          Espionage

          The NSA and other intelligence services generally aim to balance disclosing software flaws they unearth against keeping them secret for espionage and cyber warfare purposes.

          On Monday, senior administration officials defended the government's handling of software flaws, without confirming the NSA link to WannaCry, the tool used in the global ransomware attack.

          "The United States, more than probably any other country, is extremely careful with their processes about how they handle any vulnerabilities that they're aware of," Tom Bossert, the White House homeland security adviser, said at a news briefing on Monday.

          Other tools from the presumed NSA toolkit published by the Shadow Brokers have also been repurposed by criminals and are being sold on underground forums, researchers said. But they appear to be less damaging than WannaCry. It is not known who is behind the Shadow Brokers.

          Derek Manky, global security strategist at cybersecurity firm Fortinet, said he thinks WannaCry is probably the worst that will come from the Shadow Brokers' publicly dumped toolkit, though the group may have held back from publicly revealing everything it obtained

          "Out of that batch, it is probably a high-water mark," Manky said.

          Security experts said the NSA had engaged in responsible disclosure by informing Microsoft of the flaw at some point after learning it had been stolen and a month before the tools leaked online.

          Users who do not patch their systems and the Shadow Brokers were more directly responsible for the attack than the NSA, they said.

          The Department of Homeland Security began an "aggressive awareness campaign" to alert industry partners to the importance of installing the Microsoft patch shortly after it was released in March, an agency official working on the attack said.

          "This one, we knew it could be a problem," the official said.

          "NSA should be embarrassed - they've had a lot of damaging leaks," said James Lewis, a former US official who is now a cyber expert at the Center for Strategic and International Studies. Still, he said, "Microsoft needs to admit that the 20th century is over, it's a much more hostile environment, and that hobbling the NSA won't make us any safer."

          Reuters - Xinhua

           Cyberattack thrusts focus on spy agency

          A patient takes a nap as she waits at the registration desk in a hospital in Jakarta, Indonesia, on Monday. The hospital's information system was hit by last week's cyberattack.Dita Alangkara / Associated Press

           

          Editor's picks
          Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 成人午夜在线观看日韩| 中国产无码一区二区三区| 国产福利在线观看永久视频| 亚洲天堂av免费在线看| 日日噜噜夜夜狠狠久久无码区| 国产无遮挡猛进猛出免费软件| 久久综合色最新久久综合色| 亚洲色欲在线播放一区二区三区| 婷婷99视频精品全部在线观看 | 国产明星精品无码AV换脸 | 久久国产自偷自免费一区| 国产a在视频线精品视频下载| 国产绿帽在线视频看| 国产精品一区二区国产主播| 精品亚洲男人一区二区三区| 日夜啪啪一区二区三区| 十八女人毛片a级毛片水真多| 无遮无挡爽爽免费视频| 亚国产亚洲亚洲精品视频| 久久精品国产熟女亚洲av| 人妻丰满熟妇av无码区| 狠狠综合久久av一区二| 综合欧美视频一区二区三区| 人人澡超碰碰97碰碰碰| 大伊香蕉精品一区二区| 亚洲欧美中文字幕日韩一区二区| 欧洲极品少妇| 久久综合国产精品一区二区| 韩国V欧美V亚洲V日本V| 国产精品自拍实拍在线看| 最新日韩精品中文字幕| 天天摸夜夜添狠狠添高潮出免费 | 亚洲熟女乱色综一区二区| 久久不卡精品| 日韩a∨精品日韩在线观看| 亚洲精品久久久久久下一站| 精品国产女同疯狂摩擦2 | 国产一区内射最近更新| a级国产乱理伦片在线观看al| 无码专区—va亚洲v专区vr| 特级做a爰片毛片免费看无码|