BTC $57761.7510
ETH $2926.2052
BNB $550.3166
SOL $131.6719
XRP $0.5134
stETH $2921.2294
DOGE $0.1271
TON $4.7536
ADA $0.4448
AVAX $32.6930
TRX $0.1218
wstETH $3409.2161
DOT $6.8834
WETH $2923.4051
WBTC $57731.7481
BCH $414.8539
LINK $13.2979
MATIC $0.6929
ICP $13.3409
UNI $6.9505
LTC $79.1365
DAI $1.0000
FDUSD $1.0006
CAKE $2.4669
IMX $2.0084
RNDR $7.3679
ETC $25.3263
NEAR $5.8946
HBAR $0.0978
FIL $5.6362
MNT $0.9334
STX $2.0599
PEPE $0.0000
OKB $48.2259
ATOM $8.7419
WIF $2.6028
KAS $0.1075
VET $0.0344
TAO $373.5409
MKR $2693.9981
USDE $0.9991
XMR $124.2553
GRT $0.2348
XLM $0.1074
FET $1.9463
INJ $22.8256
THETA $1.9827
BTC $57761.7510
ETH $2926.2052
BNB $550.3166
SOL $131.6719
XRP $0.5134
stETH $2921.2294
DOGE $0.1271
TON $4.7536
ADA $0.4448
AVAX $32.6930
TRX $0.1218
wstETH $3409.2161
DOT $6.8834
WETH $2923.4051
WBTC $57731.7481
BCH $414.8539
LINK $13.2979
MATIC $0.6929
ICP $13.3409
UNI $6.9505
LTC $79.1365
DAI $1.0000
FDUSD $1.0006
CAKE $2.4669
IMX $2.0084
RNDR $7.3679
ETC $25.3263
NEAR $5.8946
HBAR $0.0978
FIL $5.6362
MNT $0.9334
STX $2.0599
PEPE $0.0000
OKB $48.2259
ATOM $8.7419
WIF $2.6028
KAS $0.1075
VET $0.0344
TAO $373.5409
MKR $2693.9981
USDE $0.9991
XMR $124.2553
GRT $0.2348
XLM $0.1074
FET $1.9463
INJ $22.8256
THETA $1.9827
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Nihon Keizai: Japanese infrastructure vulnerable to cyber attacks


    A study by Nihon Keizai has shown that Japan's key infrastructure is vulnerable to cyberattacks. Hackers use security holes to flood cities and interfere with power grids. However, as the newspaper notes, the government does not react.

    Experts note the presence of vulnerabilities in the cyber infrastructure of Japan. It is reported that drainage control systems are connected to an external network. At least 877 social infrastructure facilities in the country are at high risk of hacker attacks.

    Economic Security Minister Sanae Takaichi commented in writing on the results of the Nihon Keizai study. “Improving security throughout the supply chain is an urgent task. We must teach management to see the cost and time spent on cyber defense measures not as an “inevitable expense”, but as an investment that will be highly valued in the market,” she said.

    For example, as a result of a cyber attack, attackers can block the remote control of a drainage pump. Initially, it was supposed to work in municipal networks, but the pump turned out to be connected directly to the external network.

    At the same time, the device did not have any restrictions on connected devices and did not support two-factor authentication using fingerprints or other methods.

    Author DeepWeb
    Grouping BlackByte learned how to disable security systems using a legitimate driver
    Modified version of Tor Browser spies on Chinese users

    Comments 0

    Add comment