Remove Data collection Remove Risk Remove Surveillance Remove Telecommunications
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

There is definitely a national security risk in buying computer infrastructure from a country you don't trust. The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. This is a complicated topic.

article thumbnail

5G Security

Schneier on Security

The security risks inherent in Chinese-made 5G networking equipment are easy to understand. Eavesdropping is also a risk, although efforts to listen in would almost certainly be detectable. In a capitalist free market economy, the only solution is to regulate companies, and the United States has not shown any serious appetite for that.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Advanced threat predictions for 2024

SecureList

It determined that the injection point was situated within the connection between two Egyptian telecommunication providers. By relying solely on technical data, the lab could not ascertain which connection side the middlebox was positioned on.

Hacking 102
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments. BVP Investments.