Remove 2012 Remove Data collection Remove Risk Remove Surveillance
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

There is definitely a national security risk in buying computer infrastructure from a country you don't trust. The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. This is a complicated topic.

article thumbnail

LLMs and Phishing

Schneier on Security

But while it’s an easy experiment to run, it misses the real risk of large language models (LLMs) writing scam emails. In 2012, researcher Cormac Herley offered an answer : It weeded out all but the most gullible. Today’s human-run scams aren’t limited by the number of people who respond to the initial email contact.

Phishing 288
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments. a16z Investments.