Please login or sign up to post and edit reviews.
216: Corporate Espionage!
Podcast |
Supercharged
Publisher |
5by5
Media Type |
audio
Publication Date |
Oct 18, 2018
Episode Duration |
00:54:19
This week Tommy and Adam take go deep and tackle the topic of corporate espionage as Apple, Amazon, Google and others combat this fake or real trend.
This week Tommy and Adam take go deep and tackle the topic of corporate espionage as Apple, Amazon, Google and others combat this fake or real trend.

This week Tommy and Adam take go deep and tackle the topic of corporate espionage as Apple, Amazon, Google and others combat this fake or real trend.

Links for this episode:

  • The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. CompaniesBloomberg: "The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources."
  • What Businessweek got wrong about AppleApple: "The October 8, 2018 issue of Bloomberg Businessweek incorrectly reports that Apple found “malicious chips” in servers on its network in 2015. As Apple has repeatedly explained to Bloomberg reporters and editors over the past 12 months, there is no truth to these claims."
  • Bloomberg responds to Apple’s denials with fresh evidence of pervasive hardware hackingMS Power User: "Bloomberg has recently been embroiled in controversy after they accused industry supplier Supermicro of supplying motherboards infected with compromised chips which could be used to steal data from servers from companies such as Apple and Amazon. Because the compromise would be at the hardware rather than software level it would be very difficult to detect."
  • Google+ to shut down after coverup of data-exposing bugTechCrunch: "Google is about to have its Cambridge Analytica moment. A security bug allowed third-party developers to access Google+ user profile data since 2015 until Google discovered and patched it in March, but decided not to inform the world. When a user gave permission to an app to access their public profile data, the bug also let those developers pull their and their friends’ non-public profile fields. Indeed, 496,951 users’ full names, email addresses, birth dates, gender, profile photos, places lived, occupation and relationship status were potentially exposed, though Google says it has no evidence the data was misused by the 438 apps that could have had access."

Thank you to White, Jacobs, and Associates for sponsoring this episode!

This episode currently has no reviews.

Submit Review
This episode could use a review!

This episode could use a review! Have anything to say about it? Share your thoughts using the button below.

Submit Review