Remove 2017 Remove Data collection Remove Technology
article thumbnail

Interview with the Head of the NSA’s Research Directorate

Schneier on Security

MIT Technology Review published an interview with Gil Herrera, the new head of the NSA’s Research Directorate. ” Making sense of vast stores of unclear, often stolen data in hundreds of languages and even more technical formats remains one of the directorate’s enduring tasks.

Big data 311
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

Meanwhile, the chairman of China's technology giant Huawei has pointed to NSA spying disclosed by Edward Snowden as a reason to mistrust US technology companies. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. China denied having done so , of course.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data flow vs. data security dilemma for China Didi

CyberSecurity Insiders

CAC alleges Didi has breached many laws pertaining to personal data collection, storage and security and will face legal consequences if it fails to further comply with its orders. On business perspective, Didi Chuxing Technology Co.

article thumbnail

Operation North Star – North-Korea hackers targeted US defense and aerospace companies

Security Affairs

The Techniques, Tactics, and Procedures (TTPs) of the Operation North Star operations are very similar to those observed in 2017 and 2019 campaigns that targeted key military and defense technologies. “The data collected from the target machine could be useful in classifying the value of the target.

article thumbnail

A Deep Dive Into the Residential Proxy Service ‘911’

Krebs on Security

“Our technology ensures the maximum security from reverse engineering and antivirus detections,” ExEClean promised. 911’s EULA would later change its company name and address in 2017, to International Media Ltd. In a 2017 discussion on fl.l33t[.]su in the British Virgin Islands.

VPN 360
article thumbnail

GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The Last Watchdog

And, in doing so, the IC has developed an effective set of data handling and cybersecurity best practices. Businesses at large would do well to model their data collection and security processes after what the IC refers to as the “intelligence cycle.” Related video: Using the NIST framework as a starting point.

article thumbnail

Learning from Near Misses

Adam Shostack

The writing and abstract reflect the goal of influencing those outside security to help us learn better: The proliferation of connected devices and technology provides consumers immeasurable amounts of convenience, but also creates great vulnerability. Mandatory reporting and investigations would result better data collection.

InfoSec 130