Cyber Attacks a Growing Threat, Congressman Says

By Jody Ray Bennett February 12, 2013

A recent rash of cyber security attacks has drawn the attention of Congress, Pat Meehan, R-PA, writes in The Mercury. The attacks have been focused on U.S. bank accounts.

Izz ad-Din al-Qassam is connected to the attacks; the group is connected to and working with the Iranian government. Citigroup, PNC and Capital One, among others, have all been affected by the attacks, either by service disruption or by shutting down the sites.

U.S. security officials have predicted that Iran has been growing more capable of cyber attacks such as these. In April 2012 Frank Cilluffo, director of the Homeland Security Policy Institute at George Washington University said “there is little, if any, reason to think that Iran would hesitate to engage proxies to conduct cyber strikes against perceived adversaries.”

Online attacks can have larger targets than just personal bank accounts. Air-traffic and rail control systems, the power grid, water systems, power plants, wireless networks and defense networks are all potential targets. While taking down online banking functionality only causes an inconvenience, infrastructure attacks can cause blackouts, damn failures, communication failures and an inability to mobilize defense. Anything that is controlled by a computer and is connected to another computer is at some level of risk from cyber attacks.

In the summer of 2012, two large companies in the Middle East had important business information wiped from databases and tens of thousands of computers destroyed in an attack. In much the same way business data can be erased, bank account balances can be erased, as the information is now saved on computers; as more records are digitized, more personal information is subject to theft and unwanted deletion. The subcommittee on cybersecurity, infrastructure and protection as well as security technologies will be creating a plan to prevent such attacks on Americans.




Edited by Rachel Ramsey

TechZone360 Contributing Writer

SHARE THIS ARTICLE
Related Articles

ADTRAN Faces Trifecta for U.S. Growth

By: Doug Mohney    3/4/2015

Over the past month, two major events are likely to turn into solid sales numbers for ADTRAN over the next couple of years, while a third will continu…

Read More

MWC: Samsung S6 Kicks iPhone's Butt on Paper

By: Rob Enderle    3/4/2015

The phones also have a fast capture camera which should get you shots that other's miss (just tap on the camera button twice and the camera is ready t…

Read More

A Candid Talk with Ford: Connected Cars and the Future

By: Rich Tehrani    3/4/2015

At Mobile World Congress (MWC) 2015, I spoke with James Buczowski, a Henry Ford Technical Fellow, about the company's connected ecosystem experiments …

Read More

The Road of Municipal Broadband Leads to FCC Broadband Title II

By: Doug Mohney    3/2/2015

Almost lost in the Federal Communication Commission's announcement that it plans to put tighter, Title II utility-style regulation onto broadband carr…

Read More

Secure Shell Key Management in Light of OpenSSL Vulnerabilities: Part 2

By: TMCnet Special Guest    3/2/2015

Identity and access management solutions assist in controlling the access to cloud infrastructure, applications, servers and both structured and unstr…

Read More