#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

business hacking | Breaking Cybersecurity News | The Hacker News

After 5 Years, Now Google Ready to Comply with China's Censorship Laws for Business

After 5 Years, Now Google Ready to Comply with China's Censorship Laws for Business

Sep 07, 2015
Google is planning to introduce a trimmed down special version of Google Play Store and Android Wear to The Mainland China. But wait, if I'm not wrong… Google had ended ties with China five years ago. Then what made Google to re-establish itself in China once again? Business?? Recent reports by Amir Efrati at The Information state that Google has massive plans to re-establish itself in the Mainland China. The search engine giant is aiming to get approval from China (the largest populated country in the world) for: Reviving Google as the Internet service provider Designing a tailor-made Google play store for China Android Wear software for the wearable existing in China Smart steps, though, but what happened back in 2010? Google and China always contradict each other, China's Internet laws and Google's censoring the search engine was one battle. In 2010, Google famously retracted its search engine Google.cn from Mainland China, after they ma
Cyber threats a major risk to business

Cyber threats a major risk to business

Oct 22, 2012
When it comes to security, small and midsize businesses are largely unaware of the risks they face. Cybercrime is a serious problem which affects businesses of all sizes and can have devastating consequences. U.S. small businesses should understand they cannot completely remain safe from cyber-threats if they do not take the necessary precautions. Although such threats existed long before malware emerged, data theft, fraud and industrial spying are all now typically conducted through cyber-attacks. The picture painted is of an environment under siege, with an alarming 41% of businesses acknowledging themselves less than ready to face cyber-threats. Kaspersky Lab and B2B International recently conducted a survey among IT professionals working for large and medium-sized businesses to find out what IT specialists thought of corporate security solutions, to determine their level of knowledge about current threats, the sort of problems they most often face, and their ability to e
Making Sense of Operational Technology Attacks: The Past, Present, and Future

Making Sense of Operational Technology Attacks: The Past, Present, and Future

Mar 21, 2024Operational Technology / SCADA Security
When you read reports about cyber-attacks affecting operational technology (OT), it's easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks? Answering that would require breaking down the different types of OT cyber-attacks and then looking back on all the historical attacks to see how those types compare.  The Types of OT Cyber-Attacks Over the past few decades, there has been a growing awareness of the need for improved cybersecurity practices in IT's lesser-known counterpart, OT. In fact, the lines of what constitutes a cyber-attack on OT have never been well defined, and if anything, they have further blurred over time. Therefore, we'd like to begin this post with a discussion around the ways in which cyber-attacks can either target or just simply impact OT, and why it might be important for us to make the distinction going forward. Figure 1 The Pu
Cybersecurity Resources