Computer Scientist on China-Backed Cyberespionage - How It Happened & How We Can Prevent Future Attacks
Source Newsroom: University of Massachusetts Amherst
Topic: Computer scientist explains how the Chinese government-aided cybertheft occurred, and how the U.S. government, businesses and individuals can better protect themselves
Expert: Emery Berger, associate professor of computer science at the University of Massachusetts Amherst -- https://www.cs.umass.edu/faculty/directory/berger_emery
Available: Via satellite from on-campus studio in Amherst, Mass.
Contact: Jared Sharpe – 413-545-3809 / email@example.com
Emery Berger, associate professor of computer science at the University of Massachusetts Amherst, is available for interview at various times this week to discuss how hackers aided by the Chinese government were abele to steal U.S. government data and corporate trade secrets.
Berger can discuss:
-- “Spearphishing,” and how it was the weapon of choice for these hackers
-- The information that was targeted for theft by the hackers
-- Why cyberespionage may be the next wave of corporate crime, and why China is a major threat
-- The possible defenses that can be established by governments and corporations to protect against future attacks
Berger, a former Visiting Scientist at Microsoft Research, is the creator of various widely-used software systems including Hoard, a fast and scalable memory manager upon which the Mac OS X memory manager is based, used by companies including British Telecom, Cisco, Royal Bank of Canada, SAP, and Tata.
He also created DieHard, an error-avoiding memory manager that directly influenced the design of the Windows 7 Fault-Tolerant Heap, and DieHarder, a secure memory manager that was an inspiration for hardening changes made to the Windows 8 heap, which provides some of the highest degree of security from heap-based attacks of any practical allocator while imposing modest performance overhead.
Berger is also experienced in television interviews, and his previous on-screen appearances can be viewed on his website -- http://emeryblogger.com.
If you would like to schedule an interview with Emery Berger to discuss this topic or future cybersecurity issues, please contact: