article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

article thumbnail

Chinese tax software bundled with GoldenSpy backdoor targets western companies

Security Affairs

In October 2016, Chenkuo Technology announced a partnership with Aisino for “big data cooperation. The two companies recently opened offices in China, they are a UK-based technology vendor and a major financial institution. ” The backdoor is digitally signed by a company named Chenkuo Network Technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

article thumbnail

Analytics Insight Recognizes ‘40 Under 40 Innovators’ in 2021

CyberSecurity Insiders

The issue focuses on trailblazing innovators who are using technology to change the way we do business. They collaborate their digital ideas with the market available technology and drive innovation, strengthen resiliency, and influence rapid changes in the modern world. About Analytics Insight®.

article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

While the various charging documents released in this case do not mention it per se, it is clear that members of this group also favored another form of supply chain attacks — hiding their malware inside commercial tools they created and advertised as legitimate security software and PC utilities. Security analysts and U.S. Image: DOJ.

Antivirus 357
article thumbnail

Analytics Insight Announces ‘The 10 Most Influential CISOs to Watch in 2021’

CyberSecurity Insiders

He has been immersed in the technology and computing industry for more than 30 years in a range of roles from sales and support to IT operations and information security. In his role, he is responsible for encompassing data security to the company’s customers and associates. About Analytics Insight®.

CISO 40
article thumbnail

Malware Training Sets: FollowUP

Security Affairs

During my PhD program I worked for US Government (@ National Institute of Standards and Technology, Security Division) where I did intensive researches in Malware evasion techniques and penetration testing of electronic voting systems. I met Palantir Technologies where I was introduced to the Intelligence Ecosystem. Pierluigi Paganini.

Malware 68