CR4 - The Engineer's Place for News and Discussion®


Plant & Facilities Engineering

The Plant & Facilities Engineering Blog is the place for conversation and discussion about mechanical and electrical systems, automation and instrumentation, maintenance and management, and products & services as they relate to plant and facilities operation. Here, you'll find everything from application ideas, to news and industry trends, to hot topics and cutting edge innovations.

Previous in Blog: Who is Responsible for Industrial Espionage by Hackers?   Next in Blog: Something Old, Something New
Close

Comments Format:






Close

Subscribe to Discussion:

CR4 allows you to "subscribe" to a discussion
so that you can be notified of new comments to
the discussion via email.

Close

Rating Vote:







3 comments

Are Hackers Coming After Your Data?

Posted August 15, 2011 11:09 AM

According to IT security specialist McAfee, hackers based in China have stolen petabytes of proprietary data, representing, "…a massive transfer of wealth in the form of intellectual property that is unprecedented in history." Operation Shady RAT, which stands for the remote access tool used to collect the data, has reportedly targeted federal, state, and county governments in the U.S. as well as Canadian, Indian, Vietnamese, South Korean, and Taiwanese governments. Of the 72 organizations targeted by the group, 49 were in the U.S. and as many as 14 international defense contractors may have lost proprietary data. Have you protected your systems against a potential invasion?

The preceding article is a "sneak peek" from Plant & Facilities Engineering, a newsletter from GlobalSpec. To stay up-to-date and informed on industry trends, products, and technologies, subscribe to Plant & Facilities Engineering today.

Reply

Interested in this topic? By joining CR4 you can "subscribe" to
this discussion and receive notification when new comments are added.
Guru
Technical Fields - Technical Writing - New Member Engineering Fields - Piping Design Engineering - New Member

Join Date: May 2009
Location: Ketchikan, AK, USA
Posts: 15513
Good Answers: 606
#1

Re: Are Hackers Coming After Your Data?

08/15/2011 10:01 PM

If they steal petabytes of data, how do they distinguish the good from the garbage, without simply choking on the whole damned lot?

One countermeasure would be to spew lots of junk--even more than already.

__________________
In vino veritas; in cervisia carmen; in aqua E. coli.
Reply
Guru

Join Date: Jan 2008
Posts: 1756
Good Answers: 59
#2

Re: Are Hackers Coming After Your Data?

08/16/2011 12:35 AM

If the owners are that careless about their property (oh I forgot the government is in the mix too), why should you weep?

A computer not connected to the web is not connected, period. An interface with a callback modem connect you from known location only. Many measures are simple. like not putting it on computers.

It takes effort, and the lazy always will pay the price.

On the other hand, how would you know, what is valuable in this dump?

Reply
Power-User

Join Date: Dec 2010
Location: 1144 n meta okc,ok73107
Posts: 104
#3

Re: Are Hackers Coming After Your Data?

08/16/2011 8:51 AM

I beleive that they may find a more desireable place for rare earth materials by going into outerspace for the purpose of designing rock quarries on Asteroids to get rare earth minerals, not other planets or the Oceans.ds

__________________
dsuzmay@gmail.com
Reply Score 1 for Off Topic
Reply to Blog Entry 3 comments
Interested in this topic? By joining CR4 you can "subscribe" to
this discussion and receive notification when new comments are added.
Copy to Clipboard

Users who posted comments:

ds (1); leveles (1); Tornado (1)

Previous in Blog: Who is Responsible for Industrial Espionage by Hackers?   Next in Blog: Something Old, Something New

Advertisement