Of particular concern is that according to a joint technical alert issued by the US Computer Emergency Response Team, Russia is a network infrastructure device such as routers, switches, and firewalls. The alarm stated that the router is expensive and helps Russia “support spying, extract intellectual property, maintain continuous access to victim networks, and potentially lay the groundwork for future offensive operations.”
After detailed introduction of Russian hackers, the White House network ‘Csar’ announced its departure.
So what should an individual or company or government official look for?
Jeanette Manfra, head of cybersecurity at the Department of Homeland Security, told NPR that a technology that compromises security is called “spoofing.”
“It allows actors to pretend that they are computers, or devices that you think you are talking to, so they enter the middle of a connection between two different devices and they can monitor ongoing traffic and they can control traffic back and forth,” she said. Say.
An ethernet cable connects a router device inside a communications room at an office in London on May 15, 2017. Chris Ratcliffe/Bloomberg via Getty Images hide caption An ethernet cable connects a router device inside a communications room at an office in London on May 15, 2017. In a rare joint statement, the U.S and U.K. last week warned that Russia is actively preparing for a future cyberwar against the West. Of particular concern, according to a joint technical alert issued by the U.S. Computer Emergency Response Team, is a Russian cyberattack on network infrastructure devices such as routers, switches and firewalls. Compromised routers, the alert says, help Russia “support espionage, extract intellectual property, maintain persistent access to victim networks, and potentially lay a foundation for future offensive operations.” Engaging post, Read More…
thumbnail courtesy of npr.org
If you like to receive more of these curated safe harbor news alerts then subscribe to my mailing list. and come back soon at https://www.safeharboroncyber.com/Blog/ to read further CyberWisdom Safe Harbor Commentaries. Home » Curated SafeHarboronCyber’s CyberWisdom Post »