The Ongoing Problems of Placing Backdoors in Telecommunications Networks
5 October 2024 | 2:03 pm

In a cyber incident reminiscent of Operation Aurora,1 threat actors successfully penetrated American telecommunications companies (and a small number of other countries’ service providers) to gain access to lawful interception systems or associated data. The result was that: For months or longer, the hackers might have held access to network infrastructure used to cooperate with […]

Measuring the Effects of Active Disinformation Operations
1 October 2024 | 11:23 pm

This is a good long form piece by Thomas Rid on disinformation activities, with a particular focus on Russian operations. A key takeaway for me is that there is a real potential for the exposure of disinformation campaigns to beget subsequent campaigns, as the discovery (and journalistic coverage) of the initial campaign can bestow a […]

Computers-on-Wheels and Web-Based Vulnerabilities
27 September 2024 | 1:17 am

While there can be significant efficiencies gained by increasing the amount of data that is accessible by motor vehicles, connecting these computers-on-wheels to the Internet can have notable consequences. Recent reporting by Wired reveals, as an example, that: … a group of independent security researchers revealed that they’d found a flaw in a web portal […]


More News from this Feed See Full Web Site