History Article
Close
This article was published on July 9, 2015 at 11:11.
The last change is the July 9, 2015 at 11:14.
“We have lost the ability to control who uses our technology. Terrorists, extortionists and others can implement it at will. We believe it is an extremely dangerous situation, it is now evident that there is a serious threat. ” It is the cry of alarm raised a few minutes ago by Hacking Team through an official statement. The company’s digital espionage, hit and sunk by a hacker attack in the past few hours, comes out with a statement full of worries. A statement from which we learn that the 400 gb of data stolen are not an end in itself damage. Far from it.
Hacking Team raise the white flag and openly declares not to be in degrees of control technology of espionage in his possession. “We are considering whether it is possible to contain the damage” they know from the Milan-based company. “Before the attack we could not control who had access to our technology. Now, because of the work of criminals, we have lost the ability to control who uses it. ” Which essentially means: our spyware could be finished in the hands of anyone, and could therefore be used for anything. Our thoughts turn immediately to terrorism, because the recent reports tell more and more of such actions. And today that 400 gigabytes of files containing confidential documents – but also loopholes open to enter the system until recently unknown to most – are available to the deep web, concerns can be fairly significant.
“Our engineers – is written in the note – working apace to upgrade our software Remote Control System that allows customers to obtain information and intelligence on criminals. Our customers have suspended the use of this system has been compromised by the attack. It is an important step to protect information and investigative police. ” And speaking of the investigation, the prosecutor in Milan, as we wrote yesterday, is putting in order the pieces. The file is in the hands of the prosecutor Maurizio Romanelli, who coordinates the pool responsible for the crimes. The offense, at the time, is that of unauthorized access to the computer system. But from a file of this type could emerge anything.biagiosimonetta
© ALL RIGHTS RESERVED
Permalink
No comments:
Post a Comment