Friday, 11 August 2017

Cyber Espionage


FIRST TIME VISITOR,HAVE ACCESS TO THE STOREROOM

DRAMA:KIDNAPPER LOSES HIS POWER IN THE PROCESS OF COLLECTING THE RANSOM

The Mystery of the Human Life solved

Perfect Love that could not be overcome

The Wedding garment that replaces the filthy rags

THE MOST EFFICIENT AND EFFECTIVE METHOD USED IN CYBER ESPIONAGE



IN SUMMARY
·Biznerati looks at the most effective and effective method used in Cyber Espionage
·Also looks at the impact cyber espionage has on the economy
·Other technologies used in cyber espionage

The most effective and efficient method used in cyber espionage is THE WATERING HOLE. In this method,every visitor of a particular website compromised for the campaign is infected.
 
DRAMA:KIDNAPPER LOSES HIS POWER IN THE PROCESS OF COLLECTING THE RANSOM
It involves the web browsers and this is so far the most effective method used by state sponsored attacks.However it is difficult to estimate the impact of cyber espionage on the economy of a state since Many organization can never come out saying their privacy has been compromised ,for fear of losing public confidence and many other effects but this happens at times thanks to the aggressive media outlets that always 'whistleblow' on such matters.Cyber espionage can also lead to a fallout of active business partners.For example Company A &B are business partners but later on company A decides to spy on B without its consent.If B founds out ,this can lead to strained relations and eventually a big Fallout.Consequences can be even much worse if states are involved and this impacts negatively on the respective economies.
And now lets take a look at the cyber espionage campaigns that have led to economic destruction

1.Operation aurora: A High-profiled information security attack launched against Google

2. 2).Red october(widely known)    An advanced cyber operation that targeted diplomatic and Government agencies 

  

>> Download Biznerati Valentine edition(2016) [pdf]

Cyber espionage is a global disaster and states should build a defense network comprised of bad -turned -good skilled hackers who were former convicts.Its important so as to prevent stealing of intellectual state property or high profiled organizations intellectual property
TECHNOLOGIES USED TSPY ONVICTIMS
1)Network surveillance appliances
2.Communication tracking techniques
3.Malware-

 Pleased to announce that You can write for us!!! 

>>> Is your front camera spying on you? 


4.Social network poisoning just similar to the Watering Hole 

RELATED: Cyber security has become an economic imperative 

>> Follow us on twitter