Google shuts down a counterterrorism operation and addresses vulnerabilities across networks

 

Google recently shut down a counterterrorism operation as it found that the group was exploiting vulnerabilities in Android, Chrome and the iOS. The operation was a nine month long one and it was discovered that the hackers were a Western ally.

 

This shut down created some internal conflict. Some of the team members believed that it was the right step as the vulnerabilities needed to be addressed as Google has a duty towards its users. It was the company’s duty to protect its users while making the internet safer and more secure.

 

Others at Google  believe that the decision to stop and inform the public about the attack was not necessary. They say that counterterrorism activities should be out of bounds of the public.

 

The disclosure also raised questions in the intelligence community and its allies.

 

Google found that the hackers used unique techniques to deliver malware to users in a large scale through a sophisticated and speedy process. The expert hacking group successfully compromised devices that used the three major operating systems in the world: Android, iOS and Windows.

 

Google omitted many details although it publicized the attacks. It didn’t mention who was responsible for the hacking. It also didn’t mention who the target was.

 

Google has dedicated itself to keeping networks safe from vulnerabilities. It has two major programs: Project Zero and Threat Analysis Group.

 

Project Zero

 

It works to find powerful, undetected and vulnerable security issues. It doesn’t attribute hacking to specific groups.

 

Threat Analysis Group

 

This group directly counters threats that are posed by hackers who are supported by unfriendly governments including North Korea, Russia and China. This group attributes hacking and points out the  the hackers.

 

Google said that it took broader action in this instance as it believes that even though this time, it was a Western ally, eventually the vulnerabilities could be used by an unfriendly group and the correct choice is to fix the flaw the moment it is found.


Follow us on Google news for more updates and News










PLEASE READ THE IMPORTANT DISCLOSURES BELOW.

This content is being provided to you for informational purposes only. The content has been prepared by third parties not affiliated with CWEB Inc, a business. This content and any information contained therein, does not constitute a recommendation by CWEB to buy, sell or hold any security, financial product or instrument referenced in the content. This information neither is, nor should be construed as an offer, or a solicitation of an offer, to buy or sell securities by CWEB Inc. CWEB Inc. does not offer or provide any opinion regarding the nature, potential, value, suitability or profitability of any particular investment or investment strategy, and you shall be fully responsible for any investment decisions you make, and such decisions will be based solely on your evaluation of your financial circumstances, investment objectives, risk tolerance, and liquidity needs.

Unless stated otherwise, the web content provided by the CWEB family of companies is for educational purposes only. The information and tools provided neither are, nor should be construed, as an offer, or a solicitation of an offer, to buy or sell securities by CWEB Inc. or its affiliates. Unless stated otherwise, no information presented constitutes a recommendation by CWEB Inc. or its affiliates to buy, sell or hold any security, financial product or instrument discussed therein or to engage in any specific investment strategy.

Full Disclaimer


>