article thumbnail

Interview with the Head of the NSA’s Research Directorate

Schneier on Security

MIT Technology Review published an interview with Gil Herrera, the new head of the NSA’s Research Directorate. ” Making sense of vast stores of unclear, often stolen data in hundreds of languages and even more technical formats remains one of the directorate’s enduring tasks.

Big data 274
article thumbnail

Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers

Security Affairs

The Sandworm group (aka BlackEnergy , UAC-0082 , Iron Viking , Voodoo Bear , and TeleBots ) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST). Poseidon is a Linux backdoor that supports a full range of remote computer control tools.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data flow vs. data security dilemma for China Didi

CyberSecurity Insiders

CAC alleges Didi has breached many laws pertaining to personal data collection, storage and security and will face legal consequences if it fails to further comply with its orders. On business perspective, Didi Chuxing Technology Co.

article thumbnail

Scott Hermann, CEO of IDIQ, Joins Entryway’s National Board of Directors

Identity IQ

Hermann’s deep expertise in identity theft protection, credit and financial education and leveraging data to implement scalable business solutions will immediately benefit Entryway as the organization works to create efficiencies through data collection to serve a greater number of at-risk individuals and families across all of its program markets.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

Meanwhile, the chairman of China's technology giant Huawei has pointed to NSA spying disclosed by Edward Snowden as a reason to mistrust US technology companies. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. China denied having done so , of course.

article thumbnail

StripedFly: Perennially flying under the radar

SecureList

Subsequent analysis revealed earlier instances of suspicious code dating back to 2017. Importantly, our investigation, which considered binary timestamps, indicated that this exploit was created prior to April 2017. It is worth noting that the EternalBlue exploit was publicly disclosed by the Shadow Brokers group on April 14, 2017.

Malware 107
article thumbnail

GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The Last Watchdog

And, in doing so, the IC has developed an effective set of data handling and cybersecurity best practices. Businesses at large would do well to model their data collection and security processes after what the IC refers to as the “intelligence cycle.” Related video: Using the NIST framework as a starting point.