Not so recently, the Italian security company, “The Hacking Team” which develops and sells surveillance software to government agencies and private companies around the world was hacked and there was  a huge data breach that exposed their customers, emails and other critical data. It is been exposed that the company had also built in “backdoors” in its products that they  can use to spy on the agencies and companies.

And it has come to light that Adobe’s Flash had a big security hole that the company was not aware of but “The Hacking Team” knew and may well have been used by the company. Now that all of this is in the public domain, not only has “The Hacking Team” advised its customers to stop using its products but also companies like Adobe are fixing the holes in their software that was used by this company. This brings into focus the question, “How can we trust a security company that aims to protect us from hackers”.

Is the open source way the only way to ensure that a software does what it claims to be. Are proprietary closed software now vulnerable and can be exploited by these security companies. Very recently, a software company that develops and markets operating systems was found to have installed snooping updates to its latest OS as well as older versions. According to rumors from the “Dark Web”, another security company much bigger than “The Hacking Team” has faced a similar but bigger hack.

And the data that was exposed in these hacks were also personal information and pictures of employees and their family. Which begs the question; if these high profile, reputed security companies cannot protect themselves, how can they protect the rest of us.

Source: Google Image Search

About The Author

"Founded in July, 2016, WhackHack.com is a cyber security blog that covers important security issues affecting common users, industry and governments. It aims to create awareness among its readers about malware, hacking, encryption, identity theft, privacy, etc and also offer solutions to protect themselves from such attacks"

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

4 × four =

Close