Remove Accountability Remove Blog Remove Surveillance
article thumbnail

Report from the Cambridge Cybercrime Conference

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Report from the Cambridge Cybercrime Conference The Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here.

article thumbnail

What LLMs Know About Their Users

Schneier on Security

I’ll quote the last section, “User Interaction Metadata”, in full because it includes some interesting specific technical notes: [Blog editor note: The list below has been reformatted for as a numbered list for readability.] User’s account is 237 weeks old. User is currently in United States.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Happy 15th Anniversary, KrebsOnSecurity!

Krebs on Security

Maybe it’s indelicate to celebrate the birthday of a cybercrime blog that mostly publishes bad news, but happily many of 2024’s most engrossing security stories were about bad things happening to bad guys. A surveillance photo of Connor Riley Moucka, a.k.a. Image: Shutterstock, Dreamansions.

Scams 258
article thumbnail

How Solid Protocol Restores Digital Agency

Schneier on Security

Your personal information is scattered across hundreds of locations: social media companies, IoT companies, government agencies, websites you have accounts on, and data brokers you’ve never heard of. Developers no longer need to build and maintain extensive data storage systems, surveillance infrastructure, or analytics pipelines.

article thumbnail

Privacy Roundup: Week 13 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Privacy Services Ente Photos v1 ente blog Ente has released version 1.0 Private search engines generally avoid connecting users to their searches. The browser also recently released version 33.6.1, of its photos app.

VPN 59
article thumbnail

APT trends report Q3 2024

SecureList

The second, an article published in 2024 by the Google Threat Analysis Group, described the business model of various companies that provide commercial surveillance solutions. A year later, Sophos published a blog post describing the latest change in the group’s TTPs, which included double side-loading DLLs.

Malware 113
article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. Ethics The ethical challenges posed by advancing AI technologies will demand urgent attention in 2025.