Remove Accountability Remove Antivirus Remove Book
article thumbnail

Report from the Cambridge Cybercrime Conference

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Report from the Cambridge Cybercrime Conference The Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here.

article thumbnail

Using Signal Groups for Activism

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Using Signal Groups for Activism Good tutorial by Micah Lee. It includes some nonobvious use cases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An Interview With the Target & Home Depot Hacker

Krebs on Security

That investigation detailed how the 38-year-old Shefel adopted the nickname Rescator while working as vice president of payments at ChronoPay , a Russian financial company that paid spammers to advertise fake antivirus scams, male enhancement drugs and knockoff pharmaceuticals. Vrublevsky Sr. “Hi, how are you?”

article thumbnail

That Time Tom Lehrer Pranked the NSA

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog That Time Tom Lehrer Pranked the NSA Bluesky thread. Here’s the paper , from 1957. Note reference 3.

article thumbnail

1 in 10 people do nothing to stay secure and private on vacation

Malwarebytes

38% of people said they will book their next travel opportunity through a general search, which could leave them vulnerable to malvertising. Take, for example, the 38% of people who told Malwarebytes that they would conduct a general search online in booking their next vacation. Use a password manager and 2FA. Consider a VPN.

article thumbnail

Tips to make your summer travels cyber safe

Webroot

As soon as you start booking your trip, the cybercriminals start circling. Fake travel websites and rental listings : When you find a killer price on a luxury cruise, a European tour or an oceanfront Airbnb, take another look before you book! Thieves often access loyalty accounts with credentials stolen in a data breach.

VPN
article thumbnail

Friday Squid Blogging: New Vulnerability in Squid HTTP Proxy Server

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Friday Squid Blogging: New Vulnerability in Squid HTTP Proxy Server In a rare squid/security combined post, a new vulnerability was discovered in the Squid HTTP proxy server.