Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
archive,tag,tag-nsa,tag-234,stockholm-core-2.4,select-child-theme-ver-1.0.0,select-theme-ver-9.6.1,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-7.1,vc_responsive

The Secret Behind the NSA Breach: Network Infrastructure Is the Next Target

See on Scoop.it - Secure communication How the networking industry has fallen way behind in incorporating security measures to prevent exploits to ubiquitous routers, proxies, firewalls, and switches. Apptimate's insight: You cannot trust network security anymore, you need to add extra security layers to your applications. See on darkreading.com

How the NSA snooped on encrypted Internet traffic for a decade

See on Scoop.it - Secure communication Exploit against Cisco's PIX line of firewalls remotely extracted crypto keys. Apptimate's insight: This is what happens when you have backdoor in security products, even though this was most probably a flaw and not intentional. For 10 years NSA has been decrypting

Confirmed: Leaked Equation Group Hacking Tools Are Real

See on Scoop.it - Secure communication Scant doubt remains that a set of code and exploits - leaked by the "Shadow Brokers" hacking group - belongs to the Equation Group. What remains unclear, Apptimate's insight: It has now been confirmed that the NSA HAS been hacked. According to

Snowden Claims Russia is Behind NSA Hack

See on Scoop.it - Secure communication Snowden Claims Russia is Behind NSA Hack. Kremlin’s attempt to prevent ‘escalation in the attribution game,’ says whistleblower Apptimate's insight: Apparently NSA HAS been hacked. According to Snowden caused by lazy operatives not following the secure procedures. Again, it seams like it

Loading new posts...
No more posts