With last week’s privacy vote, hackers now know where to learn a Senator’s darkest secrets or how to uncover U.S. military personnel travel plans, among other things.
Let’s say a three-star general and career intelligence officer books a trip online from Dulles to O’Hare for a 3-day conference. She scans her inbox and spots an email with the subject line: “Review the itinerary for your upcoming trip to Chicago!” After skimming the body of the email, she double-clicks the attached PDF, at which point sophisticated malware developed by a U.S. adversary’s intelligence organization imbeds itself and begins silently transmitting every file stored on the hard drive to a clandestine server, activating a system that monitors her future web and email activities, plus, for good measure, every keystroke she types. Read more...
More about Business, Data Privacy, Privacy, and Businessvia Zero Tech Blog