Feminisecurity. Com Business Analysis

967 Words 4 Pages
I, along many people have wondered where and who does spam comes from, who is buying this merchandise advertised in our junk folder like Viagra, who is profiting from sending these spam emails or even if these drugs are real or ineffective. Brian Krebs, founder of the award winning cybersecurity website, krebsonsecurity.com takes us into the dark world of hacking and spamming. He explains a lot of the hacking and spamming comes from Russia and that they are the true “spam nation.” McAfee, a large antivirus company detected 14 million new pieces of malware in the first quarter of 2013 alone. Krebs mainly focuses on Russian hackers, Igor “Desp” Gusev and Dmitry “SaintD” Stupin who are co-administrators of SpamIt and GlavMed which were the world …show more content…
Companies like MasterCard and Visa are threatening banks with large fines if they process deals of illicit drugs. Because of this, online sales of these illegal medicine has lessened. As well as MasterCard and Visa, big technology companies like Microsoft have taken initiative and had success to battle these botnets and lessen spam emails. Although spam emails have lessened, hackers will find different ways to make money. For example, hackers use botnets to steal bank account and credit card information from weak or infected …show more content…
Tensions between two or more countries can take place. In this case, if Russia does not crack down on these hackers the United States has the power to hit them with sanctions that can have a negative impact on their economic growth. This can affect business and trading between countries. Another casualty due to cybersecurity that can impact international business is countries would want to bump up their security potentially causing software companies to reveal their intellectual property. For example, China has proposed an anti-terrorism law which caused alarms. Barack Obama told Reuters on March 2nd, "We have made it very clear to them [China] that this is something they are going to have to change if they are to do business with the United States." The bill gives authority too much power to authorities and potentially worsen human rights violations in China. As well as human right violations, President Obama fears business secrets will be at risk. Article 15 of the bill requires telecommunications carriers and internet service providers to preinstall mechanisms that will allow authorities to inspect their networks anytime and access information about encryption systems without consent. This bill will also be able to be used by China to access secrets behind the intellectual property of companies that supply devices, software and services to telecom carriers and internet service providers in China.

Related Documents