Block on Trump's Asylum Ban Upheld by Supreme Court
According to a recent report out of local Silicon Valley newspaper, the Mercury News, tech companies in the Silicon Valley area being targeted by Russian spies employing the "honeypot" routine.
What's a "honeypot" routine, you ask? Well, it's basically the stuff movies are made of. In short, it involves a spy engaging in a romantic relationship with a target in order to extract information. And in Silicon Valley, where tech companies rely on investor confidence, these honeypot spies present a potential security hole that tech visionaries might not be equipped to handle.
According to the Mercury News report, a local, prominent, high-end Silicon Valley hotel, as well as other local businesses, have been the at center of many honeypot schemes. Allegedly, sex workers are used as spies for Russian intel officers. The spies target high level executives at tech companies, in order to gain sensitive information.
While the hotel denies the allegations, the report explains that the hotel has earned itself a certain reputation due to it being a popular drinking establishment, as well as hosting "cougar nights."
Interestingly, tech companies are easy targets for corporate espionage activity, due to the fact that most are reluctant to publicly disclose a data breach, even when the information wasn't stolen via hackers, but rather blackmailers or honeypots. The reluctance to disclose a data breach comes from the concern over investor confidence, as investors are generally nervous about trusting any company that can't safe guard their own data, let alone a tech company.
Notably, for many tech companies, a honeypot scheme is nothing new, but in tech, a honeypot is a little bit different. In tech, honeypots are used to identify, track, and stop hackers.
In tech terms, a honeypot isn't a spy, but rather, it's a red herring used to attract hackers who infiltrate a company's systems. Think of it as a folder on your desktop titled "Confidential Financial Information," and that folder contains fake/decoy information and an alarm that notifies network security when it is accessed.
While tech companies are usually ready to deal with high tech hackers, don't forget to advise them to be on the lookout for analog threats too.
Meeting with a lawyer can help you understand your options and how to best protect your rights. Visit our attorney directory to find a lawyer near you who can help.
Sign into your Legal Forms and Services account to manage your estate planning documents.Sign In
Create an account allows to take advantage of these benefits: