Skip to content Skip to footer

NSA: Tricks Of The Trade

The National Security Agency’s sophisticated hacking operations go way beyond using software vulnerabilities to gain access to targeted systems. The agency has a catalog of tools providing NSA analysts access to just about every potential source of data about a target. In some cases, the NSA has modified the firmware of computers and network hardware, including…

Read More

NSA Spying on Unsuspecting Networks

No one except the NSA knows which 50,000 networks it injected data-thieving malware into, so what's a cautious enterprise network manager to do? It's business as usual. However, what's "usual" these days is vigilance - continuous monitoring and analysis to uncover unusual patterns and proactively respond. "It is important to adopt protective processes that continuously couple…

Read More

China Strikes Back

Just this week China began taking aim at some of the United States biggest technology providers claiming they are a “terrible security threat.” This comes only a few months after the United States government targeted one of China's largest tech companies Huawei. Back in March of this year Huawei became a target of scrutiny when suspicions…

Read More

PRISM is watching all of us

The NSA PRISM program was top secret until now. The NSA has a program code named PRISM which lives on the servers of major service providers that include Microsoft, Yahoo, Google, Facebook, PalTalk, Youtube, Skype ,AOL, and Apple.  PRISM has been in operation since 2007 and first partnered with Microsoft. They are aiming to have…

Read More