Okay, so Huawei won’t reveal the contents of certain areas of ROM on their routers and switches. No sweat. That’s a very clear message: They can’t trust us.
Which means we positively can’t trust them. Got Huawei? Get rid of it fast.
We’re talking about webcams and routers, VoIP phones, wind turbines, you name it. What’s the point? To “pinpoint shoddy industrial controls.” Among other things.
See it at http://www.shodanhq.com/
The recently discovered (by Kapersky Lab) Red October cyber espionage campaign digs up intelligence and re-uses it to gain deeper access:
“The main purpose of the operation appears to be the gathering of classified information and geopolitical intelligence, although it seems that the information gathering scope is quite wide,” Kaspersky said. “During the past five years, the attackers collected information from hundreds of high profile victims although it’s unknown how the information was used. It is possible that the information was sold on the black market, or used directly.”
Contributor subnetD points me toward this interesting site and person. Among the fascinating topics: hash cracking, keystroke capture, Metasploit and risk modeling.
Very cool that FB provides info to law enforcement authorities on due process. It would be even cooler if I really trusted FB, but that’s another matter.
So, you want someone’s FB info? You will need one of:
- A valid subpoena issued in connection with an official criminal investigation
- A court order
- A search warrant showing probable cause, or
- A national security letter.