Given enough adoption of secure policies and frameworks and a threat agent with adequate resources, access and motivation any control/countermeasure/safeguard can be overcome. This means that a sufficiently motivated and backed threat agent (nee “hacker”) can defeat any one (and in multiple cases, any) security controls put in place. Key takeaway: If you want… Continue reading APT – Advanced, Persistent Threat
Tag: cyber
State-sponsored cyber warfare
What do you make of accusations such as are quoted in this article on alleged Iranian hacking of infrastructure systems? http://thehackernews.com/2013/05/iranian-hackers-targeting-us-oil-gas.html
Untitled
Bad news! New Android malware forwards incoming messages to hacker – The Hacker News feedly.com/k/18mEGYM
Untitled
Is cloud ready for business’ security concerns? Over Half Of Big Data & Cloud Projects Stall Because Of Security feedly.com/k/ZhkCXi
Untitled
Hacking #BIOS opportunities #infosec Dark Reading – feedly.com/k/11gYxrX