<a href=NEWS.rin.ru'><a href=NEWS.rin.ru'> NEWS.rin.ru 
23 of March, 11:49

The Pentagon announced the U.S. vulnerable to hackers The Ministry of defense of the United States is going to tighten requirements for genpostavschikom weapons and the creators of the programs. Due to the increased threat of cyber attacks, the Pentagon is going to produce even the most recent rules of procurement for defence.

The adepts of the military Department of the United States is taking measures to improve the security of its own weapons systems from cyber attacks. These include the development of new procurement rules for defence purposes, which should be ready by the end of September this year. As specialists, we are told, if it's not paranoia Department, most likely, another method to knock multibillion dollar subsidies from the budget.

In early January, the Pentagon told Congress of the United States that in the course of the special audit in almost every example of military software detected a significant vulnerability. The software is poorly configured and dilapidated, the report notes.

"Threats from criminals, extremist groups and governments of foreign countries is constantly growing. With all this cyber warfare allows the villains to do heavy damage with minimum costs," says Pentagon spokesman Terry Halvorsen, saying that today intensified their activities to counter it."

The document describes that the Pentagon estimates the risks of sabotage by insiders and taking action against them. In this regard, the Ministry plans urge from their own suppliers to set protection on the network that they use to communicate with suppliers, and also reported the villains to do heavy damage at the lowest cost," says Pentagon spokesman Terry Halvorsen, assuring that today "take active steps to oppose it."

The document describes that the Pentagon is considering the risks of sabotage by insiders and taking action against them. In this regard, the Department is going to require private providers to set protection on the network that they use to communicate with suppliers, and informed about all the cyber attacks that lead to data loss.
sections: Politics, World News, Accidents

    Copyright © RIN 2005-