Pretty Complex

Pretty Complex

Article from Issue 218/2019
Author(s):

Modern cyberwarfare and its resulting monetary allocations have significantly impacted the exploit market, but where does that lead?

In October 2018, at a European Union data privacy conference, Apple CEO Tim Cook attacked competitors, Facebook and Google. According to Cook, Facebook and Google's business models had become a "surveillance industry" and likened their services (unlike Apple's devices) to a "data industrial complex" [1].

Analysts quickly agreed that Cook's underlying intention might have been to spin better public relations for Apple after several unfriendly articles about Apple's tax-evasion strategies. However, Cook's comments provoked more than the expected rebukes from Google and Facebook – it drew the attention of people who have been following American politics and military strategies since WWII.

Many were reminded of US President Dwight D. Eisenhower's legendary farewell adress in 1961. The former five-star general and commander of Allied forces in Europe warned the American public about the risks and dangers the "military-industrial complex" (installed during and after WWII) posed for the free and democratic Western world. Even though Eisenhower wrote his speech in a time when tanks and oil dominated warfare, some of his words remain as powerful today as they were during the cold war [2].

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Old Vulnerabilities Are Kept Alive Through Bad Configuration

    HP's annual Cyber Risk report offers a bleak look at the state of IT.

  • Zero Day Exploits Target Flash

    Adobe scrambles to release patches for vulnerable Flash Player.

  • Hacker-Powered Security

    Mårten Mickos is one of the most respected members of the open source world. The former CEO of MySQL AB during its prime now serves as the CEO of HackerOne, a vulnerability coordination and bug bounty platform. I sat down with Mickos to understand HackerOne's purpose and his perspective on the security of open source software.

  • Welcome

    I have used this space in the past to highlight a certain tendency in our culture to overstate the power, stability, and safety of our emerging technologies. For lack of a better term, I'll refer to this trait as technical naiveté.

  • Insecure Candidates: Chrome Wins Hacking Contest

    At the CanSecWest Vancouver 2009 conference's PWN2OWN hacker's competition the Safari, Internet Explorer 8 and Firefox browsers were successfully hacked to run code on their systems. The Chrome browser was recognized as being the least impacted by the hackers.

comments powered by Disqus

Direct Download

Read full article as PDF:

Price $2.95

News