The Future: six drivers of global change - novelonlinefull.com
You’re read light novel The Future: six drivers of global change Part 43 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
William J. Broad, John Markoff, and David E. Sanger, "Israeli Test on Worm Called Crucial in Iran Nuclear Delay," New York Times, January 15, 2011.
191 began infecting computers in Iran and several other nations
" 'Flame' Computer Virus Strikes Middle East; Israel Speculation Continues," a.s.sociated Press, May 29, 2012.
192 destructive attacks against Internet-connected machinery
William J. Broad, John Markoff, and David E. Sanger, "Israeli Test on Worm Called Crucial in Iran Nuclear Delay," New York Times, January 15, 2011.
193 inadvertently infected by Stuxnet
Rachel King, "Virus Aimed at Iran Infected Chevron Network," Wall Street Journal, November 9, 2012.
194 Leon Panetta publicly warned that a "cyberPearl harbor"
Elisabeth b.u.miller and Thom Shanker, "Panetta Warns of Dire Threat of Cyberattack on U.S.," New York Times, October 11, 2012.
195 "only they're making it 30 percent cheaper"
Perlroth, "Traveling Light in a Time of Digital Thievery."
196 then steal some of its most valuable customers
Steve Fishman, "Floored by News Corp.: Who Hacked a Rival's Computer System?," New York, September 28, 2011.
197 emails of individuals to gather information for news stories
Sarah Lyall and Ravi Somaiya, "British Broadcaster with Murdoch Link Admits to Hacking," New York Times, April 5, 2012.
198 hacking into the telephone voicemails
Don Van Natta Jr., Jo Becker, and Graham Bowley, "Tabloid Hack Attack on Royals, and Beyond," New York Times, September 1, 2010.
199 hack into supposedly secure videoconferences
Nicole Perlroth, "Cameras May Open Up the Board Room to Hackers," New York Times, January 22, 2012.
200 theft of important information because they have a financial incentive
James Kaplan, Shantnu Sharma, and Allen Weinberg, "Meeting the Cybersecurity Challenge," McKinsey Quarterly, June 2011.
201 targets have failed to take action to protect themselves
Michaela L. Sozio, "Cyber Liability-a Real Threat to Your Business," California Business Law Confidential, March 2012; Preet Bharara, "Asleep at the Laptop," New York Times, June 4, 2012.
202 collecting information about their own customers and users
Alexis Madrigal, "I'm Being Followed: How Google-and 104 Other Companies-Are Tracking Me on the Web," Atlantic, February 29, 2012.
203 tailor advertising to match each person's individual collection of interests
Ibid.
204 online interests without offering them an opportunity to give their consent
Riva Richmond, "As 'Like' b.u.t.tons Spread, So Do Facebook's Tentacles," New York Times, Bits blog, September 27, 2011, http://bits.blogs.nytimes.com/2011/09/27/as-like-b.u.t.tons-spread-so-do-facebooks-tentacles/.
205 "simply tools to improve the grip strength of the Invisible Hand"
Madrigal, "I'm Being Followed."
206 discover information that one would not necessarily want
Jeffrey Rosen, "The Web Means the End of Forgetting," New York Times Magazine, July 21, 2010.