From Reuters:Huge: USG confirms cyber offense funded at 9x rate of defense. Wonder why we can't stop foreign hacks? This is why. https://t.co/qug3LY16Bt pic.twitter.com/q0Zhn7FRxG— Edward Snowden (@Snowden) March 30, 2017
A scramble at Cisco exposes uncomfortable truths about U.S. cyber defense
When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems (CSCO.O) swung into action.
The Wikileaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco's widely used Internet switches, which direct electronic traffic, to enable eavesdropping.
Senior Cisco managers immediately reassigned staff from other projects to figure out how the CIA hacking tricks worked, so they could help customers patch their systems and prevent criminal hackers or spies from using the same methods, three employees told Reuters on condition of anonymity.
The Cisco engineers worked around the clock for days to analyze the means of attack, create fixes, and craft a stopgap warning about a security risk affecting more than 300 different products, said the employees, who had direct knowledge of the effort.
That a major U.S. company had to rely on WikiLeaks to learn about security problems well-known to U.S. intelligence agencies underscores concerns expressed by dozens of current and former U.S. intelligence and security officials about the government's approach to cybersecurity.
That policy overwhelmingly emphasizes offensive cyber-security capabilities over defensive measures, these people told Reuters, even as an increasing number of U.S. organizations have been hit by hacks attributed to foreign governments.AND THEN THERE'S THIS:
TechRepublic: Is the Intel Management Engine a backdoor?
Is Intel's Management Engine a backdoor for security groups and hackers, or just a feature created to aid businesses? Jack Wallen dives in and draws his conclusions.
3 comments:
Latest WikiLeaks release shows how the CIA uses computer code to hide
the origins of its hacking attacks and ‘disguise them as Russian or
Chinese activity’
http://www.dailymail.co.uk/news/article-4367746/WikiLeaks-says-CIA-disguised-hacking-Russian-activity.html
************
Computer genius - MicroJESTER discusses Botnet cheats . . .which cannot be stopped . . .these bot nets surge topics which trend https://twitter.com/WDFx2EU95
OT: https://twitter.com/JamesOKeefeIII/status/847847554087780352
James O'Keefe tweets:
Someone just impersonated me to create a bogus @Project_Veritas PAC with the @FEC. @TheJusticeDept needs to start an immediate investigation
The correct place to donate to @Project_Veritas is by using this link, not to the fraudulent activity shown below: http://projectveritas.com/donate/
Anonymous,
MicroMagicJingle is "Jester"?
Is that correct?
How do you know?
Post a Comment