Remove Accountability Remove Surveillance Remove Technology Remove Telecommunications
article thumbnail

The War in Technology: A Digital Iron Curtain Goes Up

SecureWorld News

We know that war has impacts on telecommunications, but what we've seen in Ukraine is on a different level.". And it might have been prepared for this moment, years ago, as a surveillance tool. It's easy to put surveillance on telecoms if you have a foothold," Kubecka said. Advancing Russian troops need it to communicate.

article thumbnail

China Says U.S. Hacking Huawei Since 2009

SecureWorld News

In a tale as old as the computer, China has once again pointed fingers at the United States, accusing it of hacking into one of its technology companies. are currently engaged in a fierce battle for technological supremacy, particularly in the rapidly advancing field of artificial intelligence.

Hacking 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 438 by Pierluigi Paganini – International edition

Security Affairs

0-days exploited by commercial surveillance vendor in Egypt PREDATOR IN THE WIRES OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes Cybersecurity Apple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

article thumbnail

Episode 167: Made in America? Trade Tensions highlight Supply Chain Risk

The Security Ledger

» Related Stories From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military Episode 165: Oh, Canada! government ban on the technology. We're joined by Terry Dunlap the co-founder of ReFirm Labs to talk about why software supply chain risks. Read the whole entry. »

Risk 40
article thumbnail

Third-Party Software Security Scanning

Cisco Security

As the use of third-party software has become ubiquitous across product development and industry, there has been growing interest in more accurate visibility and accounting of the use of open source and commercial components. Key Components of the Corona Service. One Sized (tool) May Not Fit All.

Software 107
article thumbnail

A Deep Dive on the Recent Widespread DNS Hijacking Attacks

Krebs on Security

mail.cyta.com.cy: Cyta telecommunications and Internet provider, Cyprus. 14 by KrebsOnSecurity, Netnod CEO Lars Michael Jogbäck confirmed that parts of Netnod’s DNS infrastructure were hijacked in late December 2018 and early January 2019 after the attackers gained access to accounts at Netnod’s domain name registrar.

DNS 264
article thumbnail

Best Facial Recognition Software for Enterprises In 2022

eSecurity Planet

The technology isn’t yet perfect, but it has evolved to a point that enterprise use is growing. The application of facial recognition technology in operations was primarily in law enforcement organizations until the last decade, when a massive advance in AI and deep learning allowed it to be more broadly applied.

Software 125