Cybersecurity & Espionage Articles
Original Post at Softpedia.com
0 Comments
Original Post at Softpedia.com
Crooks now have lists of addresses of certified employees working for certain companies. They can use these emails to deliver spam knowing they'll have a good chance of infecting a corporate computer with malware and escalate their access to other network sections from there. Original Post at International Business Law Advisor
This list put together by the Dictionary of International Trade Handbook of the Global Trade Community serves as an excellent overview of the things to look out for in your international business dealings. Original Post at Softpedia.com
A team of five researchers from MIT and Georgia Tech have developed a camera that uses terahertz radiation to read the content of a closed book. Terahertz radiation is one of the bands of electromagnetic radiation that falls between microwaves and infrared light. One of its properties is that it can penetrate surfaces. Additionally, different materials absorb different terahertz radiation at various frequencies. Original Post at Bloomberg Tech
For more than a decade, the U.S. military and intelligence community has quietly warned that the world's largest telecom equipment manufacturer, Huawei, is an arm of the People's Liberation Army and that its phones, circuits and routers are instruments of Chinese eavesdropping. Now these agencies are starting a formal review, led by the FBI and the NSA, examining the national security implications of Huawei's potential participation in building the U.S. 5G wireless network, according to current and former U.S. intelligence officials. Original Post at Fox Business
"What do JPMorgan Chase, Home Depot, Target, Sony, IRS all have in common?’ It’s not that they just got hacked. It’s that despite spending $1 billion on their firewalls, they were exploited. So what it says is, as a country we have to take a whole new level of [cyber] protection." Original article at CSOOnline.com
The article is continued in Part 2. There is an emerging consensus that any world-class insider threat program must have the following three core characteristics:
|
Cyber-CyI find interesting articles on the web that are simple, down-to-earth, easy to understand, and (hopefully) informative for non-technical readers. Archives
November 2022
Categories |