NSA May Have Penetrated Internet Cables to Spy on Google and Yahoo
Nov 27, 2013 19:23
How did the NSA snooped on the communications of Google and Yahoo users without breaking into a data center? The New York Times is reporting that it could be because they penetrated into fiber optic cables instead.
According to the "people with knowledge of the matter" line, they believe that the NSA penetrated an internet backbone to spy on those using Google and Yahoo.
The Internet companies' data centers are locked down with full-time security and state-of-the-art surveillance, including heat sensors and iris scanners. But between the data centers information was unencrypted and an easier target for government intercept efforts, according to three people with knowledge of Google's and Yahoo's systems who spoke on the condition of anonymity.
The newspaper doesn't speculate how exactly the NSA did it, but damn was that smart or what? Not to mention holy shit scary. [New York Times]
Electronic Logging Devices (ELDs) have revolutionized the trucking industry by streamlining logging practices and ensuring compliance with federal regulations. Designed to monitor a vehicle’s engine and automatically record driving hours, ELDs replace traditional paper logs and provide an efficient solution for tracking Hours of Service (HOS). If you're looking to complement your fleet's technology, partnering with tools like a reliable truck dispatch service can further optimize operations and keep your business running smoothly. Read more
The HONOR Magic 7 Pro price in ksa makes it an appealing option for those looking for a high-end smartphone. This advanced device stands out with its sleek design and robust build quality. This blog delves into the details, examining what makes the HONOR Magic 7 Pro unique, from the materials used to its overall durability and user experience. If you’re considering purchasing a high-end smartphone that balances aesthetics and functionality, this review of the HONOR Magic 7 Pro’s design and build quality will provide you with all the information you need. Read more
Organizations continue to reside under substantial pressure to provide security and compliance with data in the current-day complex regulatory ambiance. Enter endpoint management — a strategic approach to managing and securing devices, that has become a key tool for achieving these objectives. Endpoint management solutions assist organizations with stringent compliance requirements by establishing a single interface for monitoring, controlling, and securing devices. Read more