{"id":43446,"date":"2014-10-28T11:58:12","date_gmt":"2014-10-28T15:58:12","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/russian-hackers-target-nato-military-secrets\/"},"modified":"2014-10-28T11:58:12","modified_gmt":"2014-10-28T15:58:12","slug":"russian-hackers-target-nato-military-secrets","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nato-2\/russian-hackers-target-nato-military-secrets\/","title":{"rendered":"Russian hackers target Nato, military secrets"},"content":{"rendered":"<p><p>    Other Eastern European countries, such as Bulgaria, were also    targeted, as well as NATO and the Organization for Security and    Cooperation in Europe (OSCE).  <\/p>\n<p>    Russian President Vladimir Putin has repeatedly poured scorn on    North Atlantic Treaty Organization (NATO). According to    FireEye, hacking NATO could give Moscow, \"sensitive tactical    and strategic intelligence concerning regional military    capabilities and relationships\".  <\/p>\n<p>    The report comes amid heightened tension between the West and    Russia, following Moscow's annexation of Crimea in March. The    finger has been pointed at Russia for several widely reported    cyberattacks, including a breach at JPMorgan    that compromised the accounts of 76    million households and seven million small businesses.  <\/p>\n<p>    Read MoreHow a Russian hacker snatched $100M from    banks<\/p>\n<p>    In addition, cyber intelligence firm iSight Partners has    recently reported that Russian hackers exploited a    vulnerability in Microsoft Windows to spy on computers used by    Nato and other western governments.  <\/p>\n<p>    Attacks likely successful  <\/p>\n<p>    FireEye said that the sophistication of the attacks detailed in    its report meant that they were likely to have proved    successful in the majority of cases.  <\/p>\n<p>    \"I think you would be nave to assume they haven't been    successful. For the large percentage of hacks they are    successful, because we know existing security architecture is    insufficient in stopping these things,\" Jason Steer, director    of technology strategy at FireEye, told CNBC by phone.  <\/p>\n<p>    Identifying where hackers are from can be difficult because of    clever movement of data and deliberately misleading use of    language in malware. Russia is particular hard to pin down due    to its hackers covert movements in cyberspace, said Steer.  <\/p>\n<p>    Read MoreHackers aim to pull off cyber-heist worth $1    billion: Report<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.cnbc.com\/id\/102127673?__source=yahoonews&par=yahoonews\/RK=0\/RS=dWyHJVjbSffm6gidDRpynaT0klQ-\" title=\"Russian hackers target Nato, military secrets\">Russian hackers target Nato, military secrets<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Other Eastern European countries, such as Bulgaria, were also targeted, as well as NATO and the Organization for Security and Cooperation in Europe (OSCE). Russian President Vladimir Putin has repeatedly poured scorn on North Atlantic Treaty Organization (NATO). According to FireEye, hacking NATO could give Moscow, \"sensitive tactical and strategic intelligence concerning regional military capabilities and relationships\".  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nato-2\/russian-hackers-target-nato-military-secrets\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94882],"tags":[],"class_list":["post-43446","post","type-post","status-publish","format-standard","hentry","category-nato-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/43446"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=43446"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/43446\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=43446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=43446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=43446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}