Remove 2001 Remove Cryptocurrency Remove Social Engineering
article thumbnail

Types of Encryption, Methods & Use Cases

eSecurity Planet

Phishing and social engineering are common ways threat actors can obtain a symmetric key, but cryptanalysis and brute force attempts can also break symmetric key ciphers. By 2001, the NIST dubbed it the Advanced Encryption Standard (AES) and officially replaced the use of DES.

article thumbnail

Bytes, Books, and Blockbusters: The NetSPI Agents’ Top Cybersecurity Fiction Picks

NetSpi Executives

Cryptonomicon basically predicted Bitcoin and the rise of cryptocurrency. It has it all: Biohacking, social engineering, physical security penetration. – Kyle Fowers, Security Consultant II 6. The film prominently features themes of social engineering and cybersecurity.

article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Social engineering attacks soon found use in the digital space. Going Mobile and Going Global: 2001-2010. In July 2001, the Code Red Worm attempted to subject the entire Internet to a distributed denial of service (DDoS) attack. In fact, China itself would fall prey to the second iteration of Code Red in August 2001.

Malware 140