Cyber security news for all

More

    NSA Infiltrates Thousands Of Computers Worldwide

    Controversial methods, but a good goal: For a long time, the NSA was a fighter for secure infrastructure in the technology industry. That was a misconception. The latest revelations show that the NSA security and its serving goals.

    The U.S. intelligence agency NSA has had a strange but not bad reputation in the technology industry. There is little fundamental rejection, NSA developers are considered capable, hardly anyone sees their motivation and the overarching goals of their service. There has been a consensus: even if there are arguments about some actions, the NSA basically wants the same thing as IT companies and users: a secure network, a protected infrastructure.

    nsa hacker

    All of the NSA developments have probably really improved the security of the systems. But given the latest revelations about the NSA’s attacks on basic network infrastructure, the role of the secret service needs to be reassessed. The NSA does not make the network overall more secure, on the contrary.

    The NSA Buys Attack Vulnerabilities Instead Of Publishing Them

    According to the Washington Post, the NSA is buying security gaps in the gray market for its attacks on computer systems. More than 20 million dollars are expected to be spent this year. This trade in previously unknown security gaps is problematic in many ways. It will hardly be in the interest of the NSA that the gaps will be filled before the secret service has exploited them for attacks and taken over vulnerable systems. There is a contradiction between more security on the web and the interest of the US government in successful cyberattacks by the NSA.

    The NSA Attacks Encryption Standards Instead Of Strengthening Them

    The US government spends nearly $ 10 billion a year on encryption standard cracking programs. 30,000 employees are expected to work on it. If that is true, there is probably no one in the world who spends more money for the so-called Crypto Apocalypse to occur soon than the US government. This is how security researchers have named the moment when the most important encryption standards are cracked. When this happens, methods used today to secure e-commerce, banking and communication.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]