this post was submitted on 08 Aug 2023
144 points (100.0% liked)

Technology

37727 readers
626 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

According to former US and Japanese officials, the NSA discovered in the fall of 2020 that the PRC had persistent access to Japanese Defense Networks.

This prompted a bilateral engagement to enhance Japanese Network security.

Kind of scary to think about all the state hacking going on that hasn't yet been revealed.

all 19 comments
sorted by: hot top controversial new old
[–] tiredofsametab@kbin.social 15 points 1 year ago (1 children)

Security in IT here in Japan has largely been an afterthought or security theatre. Passwords stored in plaintext are not uncommon (I've signed up for things and had my password in plaintext sent in email back to me). It seems to be getting better slowly. My current company has a whole security division, which is a nice change.

NDAs prevent me from being too specific, but I worked previously at another company in Japan that refused to hire security staff or even pay for the occasional pen test and audit. I fixed everything I could find on my own, but I highly doubt that there were no other issues left as I'm not a security pro.

Then you have things like https://www.bbc.com/news/technology-46222026 -- the cyber security MP has never used a computer. Even if their job is mostly to appoint the right people and manage that sort of thing, they still are doing a clearly terrible job of it.

[–] Trafficone@slrpnk.net 4 points 1 year ago

Oh jeez, the security nightmares I've seen here keep me up at night. You're doing good work, fixing what you could from the inside of where you worked.

[–] autotldr@lemmings.world 9 points 1 year ago (1 children)

🤖 I'm a bot that provides automatic summaries for articles:

Click here to see the summaryIn the fall of 2020, the National Security Agency made an alarming discovery: Chinese military hackers had compromised classified defense networks of the United States’ most important strategic ally in East Asia.

“Japan and the United States are currently facing the most challenging and complex security environment in recent history,” Prime Minister Fumio Kishida said at a news conference with President Biden in Washington in January.

The United States was debating how to respond to the massive Russian “SolarWinds” hack, which was uncovered during the Trump administration and had sowed malicious code and enabled cyberspies to steal information from several major U.S. government agencies.

“The government of Japan intends to strengthen its cybersecurity response capabilities to be equal to or surpass the level of leading Western countries,” Noriyuki Shikata, Kishida’s cabinet press secretary, said in an interview.

“Both within and beyond Asia, Japan faces more diverse threats and more complex international responsibilities, which call for intelligence that provides a better understanding of its national security needs,” stated the report, written by a bipartisan study group including foreign policy experts Richard Armitage and Joseph Nye.

Sensitive commercial and classified material has been stolen, the NSA’s own top-secret hacking tools have been released into the wild, Hollywood studios have been coerced and embarrassed, and the United States’ democracy has been assaulted.

[–] Silviecat44@aussie.zone 1 points 1 year ago