Even as organisations’ cyber walls get higher, attackers’ ladders are getting longer and theirtunnels deeper.
就算是机构的网络安全围墙修得更高,攻击者的云梯也在加长,他们打的地道也在加深。
“The increasing sophistication of malware tools, the deep pockets of states using them andthe proliferation of organised criminal gangs in this sector make it increasingly difficult to graspjust how serious the issues are, says Stuart Poole-Robb, a former military intelligence officialand now chief executive of the business intelligence group KCS.
原军事情报官员、现担任企业情报集团KCS首席执行官的斯图亚特渠尔-罗布(Stuart Poole-Robb)表示:“恶意软件工具越来越复杂,使用这些工具的政府财力雄厚以及有组织犯罪团伙在该领域的扩散,这让人们越来越难以明白这个问题有多么严重。
In 2014, the average so-called “advanced persistent threat attack lasted 205 days beforebeing detected, according to the digital security vendor FireEye. The countries most targeted in2015 were the US, South Korea, Japan, Canada, the UK and Germany. And few in westerncyber defence circles have any hesitation in identifying the principal culprits: Russia and China,with Iran fast catching up.
数字安全供应商FireEye的数据显示,2014年,所谓的“高级持续性威胁普通攻击在被发现前持续了205天。2015年最容易遭受攻击的国家是美国、韩国、日本、加拿大、英国和德国。西方网络防务圈的人们几乎毫不犹豫就能指出罪魁祸首:俄罗斯和中国,伊朗也在迅速赶上。
【西方网络战将转守为攻】相关文章:
最新
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15