article thumbnail

Identifying People by Their Browsing Histories

Schneier on Security

This work replicates and extends the 2012 paper Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns [ 48 ]. reproduce those results and extend the original work to detail the privacy risk posed by the aggregation of browsing histories.

article thumbnail

LLMs and Phishing

Schneier on Security

But while it’s an easy experiment to run, it misses the real risk of large language models (LLMs) writing scam emails. In 2012, researcher Cormac Herley offered an answer : It weeded out all but the most gullible. Today’s human-run scams aren’t limited by the number of people who respond to the initial email contact.

Phishing 282
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

There is definitely a national security risk in buying computer infrastructure from a country you don't trust. The risk of discovery is too great, and the payoff would be too low. But we need to make these decisions to protect ourselves deliberately and rationally, recognizing both the risks and the costs. Our allies do it.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments. a16z Investments.

article thumbnail

Alleged FruitFly malware creator ruled incompetent to stand trial

Malwarebytes

In 2012, as a senior soon to graduate with a physics degree, he worked on a project with faculty member Robert W. The IP address was linked to the malware using data collected by CWRU, Malwarebytes, and AT&T.) We don’t just report on threats—we remove them Cybersecurity risks should never spread beyond a headline.

Malware 85
article thumbnail

A Deep Dive Into the Residential Proxy Service ‘911’

Krebs on Security

Highlighting the risk that 911 nodes could pose to internal corporate networks, they observed that “the infection of a node enables the 911.re The website’s copyright suggests the ExE Bucks affiliate program dates back to 2012. Others are fairly opaque about their data collection and retention policies.

VPN 312
article thumbnail

SOC Technology Failures?—?Do They Matter?

Security Boulevard

I lamented on this back in 2012 , and this affliction has not truly subsided. Data collection failures still plague many SOCs. Now, again, one can also blame this on people and processes (especially, those people in IT who just didn’t give us the data). You don’t think it can be about the tool at all?