Or: It’s just a song and dance by geeks on both sides that think too much of themselves.Mostly likely Chinese and North Korean Government sponsored to destabilise Taiwan by targeting large businesses in the South Pacific. Having a hackable dummy server with design schematics that causes hardware to brick could be defensive strategy.
First T-Mobile is NOT 'versed' in security - they are a mobile services company.Multiple companies have had their in house databases breached, T-Mobile has had their data stolen multiple times. You would hope that a company versed in security would be better then using in house people that are at the mercy of cut backs, low cost replacements and managers whose knowledge of security is based on reading an articl.
Just switch to Lockdown Mode on all of your Apple devices and your SAFE !Completely preventing these attacks is incredibly difficult. Even the best technology companies on Earth can't entirely prevent it. It's a sad world.
Sure, hire someone who attack and steal your property and ask for money just to not ruin your life. I’m sure you can trust on all of them. Omg, I don’t understand sometimes what people think… xDYou would think that any company would have top security it would be this. They need to hire these hackers
Kinmax, the IT services company, is HQed in Taiwan, and only has offices in Taiwan and China. Those impacted companies would only be using them for local operations, IF at all. Also, don't read too much into "Other Kinmax partners include Microsoft, Cisco, and VMware". Any IT company USES technology from those companies and quite likely supports those technologies at their customers sites-- that's most probably what they mean by "partners".Kin'ell this is major if Microsoft, Cisco and VMWare are also involved
Kinmax is an IT service company. They support their customer's use of Microsoft, Cisco, and VMWare technologies, which are foundation products for IT services. That's what an IT service company does. When an IT service company talks about "partnerships", they are talking about the technologies they support. No IT company of significance would list their clients on their website-- that would be considered a breach of confidentiality that would have their clients looking for more reliable suppliers.Really?? are you sure Microsoft does not outsource their database? If AI can reproduce accurate Key codes, that might say something. They might not directly outsource, but their databases are networked to outsource locations. That opens up opportunity to hack.
Is anyone working on AI for adaptive firewalling honeypotting, etc? Seems like that is useful but much harder than question-answer style AI/LLMs.Well, Russia, China, North Korea, among a few others, are not going to be bothered to send their trained hackers to US for trial. FBI can spend money and other resources trying to lure them out, but chance is slim. In summary, it is much harder than you think.
Might as well let machine build machine Rather than us. Heck, replace Tim Cook with AI equivalent. Saves Apple $5m right there.
Hey, they just make the stuff, they don't use it themselves! ha haShould’ve required their business partners to use biometrics like touchID/faceID and multi-factor identification instead of simple passwords but hey what do I know, they’re only a global leader in chip manufacturing
the key is which AI has been given the compute power and knowledge to decipher say 20xx-bit encryption and a service account for authentication and more so if given the ability to override or circumvent human action and overside to disable access.Really?? are you sure Microsoft does not outsource their database? If AI can reproduce accurate Key codes, that might say something. They might not directly outsource, but their databases are networked to outsource locations. That opens up opportunity to hack.
But give them the opportunity to live. If they can completely debug Windows 3.1 in 24 hours, then they will live. Otherwise...It's impossible to fix all vulnerabilities -- we've got to start killing the people who exploit them.
companies hire people to see if they can exploit vulnerabilities in their systems all the time. it's a way to find out the weaknesses in a system. there are hacker conventions that are sponsored by tech companies for that reason. it's not unreasonable to hire someone who has the skills and know-how to help a company fix those vulnerabilities. that is what people think... you need to understand thatSure, hire someone who attack and steal your property and ask for money just to not ruin your life. I’m sure you can trust on all of them. Omg, I don’t understand sometimes what people think… xD