Remove 2011 Remove Blockchain Remove Examples Remove Military
article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

Security experts who reviewed the leaked data say they believe the information is legitimate, and that i-SOON works closely with China’s Ministry of State Security and the military. i-SOON CEO Wu Haibo, in 2011. In 2021, the Sichuan provincial government named i-SOON as one of “the top 30 information security companies.”

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. In 2011, there a was user in a chat room by the name of altoid, like the mint. Anyone talking about it in 2011 most likely had inside information.

Privacy 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

For example, organizations dealing with the most sensitive data—such as defense contractors—should target the adaptive tier across functional areas, while organizations with a lower risk profile may decide to target lower tiers when designing their systems.

article thumbnail

LW ROUNDTABLE: Will the U.S. Senate keep citizens safe, vote to force China to divest TikTok?

The Last Watchdog

This tends to diffuse sober analysis of the countless examples of Russia, in particular, weaponizing social media to spread falsehoods, interfere in elections, target infrastructure and even radicalize youth. In 2011, Russia launched a social media site called iFunny aimed at disaffected young men.