Cyber warfare: What do state attacks look like and can anything be done to stop them?

From Yahoo to nuclear power stations, what are state hackers doing?