Russian hackers co-ordinated with military, claims US report

clock • 2 min read

Cyber attacks on Georgia were co-ordinated closely with Russia's five-day campaign in August 2008, claims technical report

Attacks originated in Russia Russian cyber attacks against Georgia a year ago were conducted in close connection with Russian criminal gangs, and used US identities and software tools, according ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Redis shifts to dual source-available licensing model

Open Source

CSPs hosting Redis solutions will now be required to enter into commercial agreements

clock 22 March 2024 • 3 min read
Microsoft hires Mustafa Suleyman to lead newly formed consumer AI division

Corporate

University drop-out and DeepMind co-founder Suleyman scooped up by Microsoft to be CEO of Microsoft AI

clock 20 March 2024 • 2 min read
University CIO: 'We were owned in 4 hours'

Threats and Risks

And that certainly focused minds, says Salford University’s Mark Wantling

clock 20 March 2024 • 5 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security Technology

UK's biometrics commissioners steps down, signalling missteps

UK's biometrics commissioners steps down, signalling missteps

Home Office is ignoring new technologies

Muskan Arora
clock 31 January 2024 • 4 min read
Endpoint is the path of least resistance, says Threatlocker

Endpoint is the path of least resistance, says Threatlocker

IT Leaders Summit debates the true purpose of endpoint security.

Penny Horwood
clock 05 October 2023 • 2 min read
GitHub announces passwordless authentication trial

GitHub announces passwordless authentication trial

The trial can be considered a milestone in the long demise of passwords

Penny Horwood
clock 13 July 2023 • 2 min read