Militaries would attack each other in cyber war, we said infrastructure will become part of the target set and there can be large damage and destruction. Not just information damage. At the time we are criticized to integrate review that said file under fiction. So i think at one time robin i decided to write the book that we were right but we also wanted to say, what has changed in the ten years and while we were right about something, we were wrong about others. Yes the militaries have become the dominant threat and if you look at the major attacks in the last three years of all the military, arena, north korea, chinese, russia, america if you look at the target they are going after every structure and just last month the United States more or less submitted they penetrated the power grid claiming they had done it to us. It is destruction if you look at the attack, the largest destructive attack over 10 billion worth of damage, it is wiped out networks to not just attack them and sti
Lets dive right in. This is not your first book on cybersecurity. You coauthored on cyber were. Why follow up with this book now and what has changed . Guest thank you for reading the book and you may find some of your work and some of your great reporting referenced in the book. All appropriately footnoted. 10 years ago we wrote a book called cyber or and we said things than that militaries were going to become dominant and threatened the landscape of cyberspace and militaries will attack each other in cyberwar. We said infrastructure would become part of the target set and there could be large damage and destruction. Not just spewing information and at the time we were criticized. There was a great review in wired that said it was fiction. At one level we decided to write this book to say back, now we were right but we also wanted to say what has changed in 10 years and while we were right about some things we were wrong about others. Yes the militaries have become the dominant threa
Midnight today eastern time to make their voices heard. That is when the Public Comment form shuts down. Global news 24 hours a day, powered by more than 2700 journalists and analysts in more than 120 countries. This is bloomberg. Emily i am emily chang in this is Bloomberg Technology. Coming up, hints at an ipo. We will break down the plan for uber after the new bots meets the troops. Plus, apple goes all in on the touchscreen and the home button becomes a thing of the past as the countdown to the next big iphone event begins. We have the inside track on the biggest design changes in iphone history. And Warren Buffett sounds off on tech. Berkshire hathaway chairman and ceo speaks to bloomberg tv. We cover his biggest regret the Tech Industry and what industries are still ripe for disruption. First, the worlds most viable startup could be going public sooner than we think. The incoming uber ceo met with uber employees wednesday and says he thinks the company should go public in the nex
Alisa speaking by his south korean counterpart today, defense secretary jim mattis told reporters we are never out , of Diplomatic Solutions on north korea. That is after President Trump tweeted the u. S. Has been paying extortion money for years, talking is not the answer. People against the fcc plan to roll back obama era Net Neutrality rules have until midnight today eastern time to make their voices heard. That is when the fcc costs Public Comment for them shuts down. Global news 24 hours a day, powered by more than 2700 journalists and analysts in more than 120 countries. This is bloomberg. Emily i am emily chang and this is bloomberg technology. Coming up, techs most valuable unicorn hints at an ipo. We will break down the plan for uber after the new boss meets the troops for the first time. Plus, apple goes all in on the touchscreen and the home button becomes a thing of the past as the countdown to the next big iphone event begins. We have the inside track on the biggest design
Seven in the morning in singapore, Big Night In London and two major Internet Security companies, American Company semantic and russian based company say they are looking at codes that make a Net North Korea to the attacks. They have similarities to programmes used in pyongyang. So far there has been no response from north korea and experts cautioned there is no hard evidence. Cyber attacks have struck Around The World. The most far reaching of cyber crimes ever committed. As Government Organisations and businesses will light clean up after being caught out, the attention turns to the people responsible. The Military Regime in pyongyang is assessed to have over a thousand Computer Experts working on cyber activities of act by thousands of support staff. A california based expert are looking in the clues that may connect the attacks with progress previously attributed to north korea, including code in an earlier version of ransomware. John kelly told media that a cyber attack from north