je.st
news
Tag: backdoors
NSA Backdoors Could Cost US Companies Billions in Business Abroad
2013-09-12 20:17:38| TechNewsWorld
The National Security Agency's efforts to include "backdoors" in U.S. companies' security products, networks and devices -- thereby making it easier for the NSA to snoop around -- could hurt business abroad. Specifically, foreign countries could come to view U.S. firms' relationship with Washington much the same way that the U.S. views Chinese companies' relationship with Beijing.
Tags: business
cost
companies
abroad
NSA and GCHQ have broken internet encryption, created backdoors that anyone could use
2013-09-06 13:34:03| Extremetech
New documents released by Edward Snowden show that the NSA and its British equivalent, GCHQ, have cracked VPNs, SSL, and TLS -- the encryption technologies that keep your data secure on the internet. Perhaps more worryingly, the NSA has an ongoing program to place backdoors in commercial products. The documents, which contain some choice phrases such as "work has predominantly been focused this quarter on Google due to new access opportunities being developed," almost completely undermines the very basis of the internet, obliterating the concept of trust online.
Tags: use
internet
could
created
HP admits to undocumented backdoors in two separate storage lines
2013-07-12 21:46:39| InfoWorld: Top News
HP has owned up to undocumented backdoors in members of its
Tags: lines
separate
storage
admits
Groups criticize FBI plan to require Internet backdoors for wiretaps
2013-05-01 17:49:24| InfoWorld: Top News
Privacy groups are denouncing a federal government move to force Internet companies like Facebook and Google to build backdoors that would let the FBI and other agencies snoop on real time online communications.
Tags: internet
plan
groups
require
Web server hackers install rogue Apache modules and SSH backdoors, researchers say
2013-01-24 20:34:09| InfoWorld: Top News
A group of hackers that are infecting Web servers with rogue Apache modules are also backdooring their SSH (Secure Shell) services in order to steal login credentials from administrators and users.