article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. Then lay out the most salient criticisms of the book. Key Arguments: Analyze risks empirically using evidence, statistics, and probability rather than intuition. Secrecy enables abuses.

article thumbnail

Relax. Internet password books are OK

Malwarebytes

The big book of passwords. There’s one password management tool which experiences more than its fair share of derision—the oft-maligned Internet password book. These are, as you may expect, physical books which are little more than empty notepads with “Internet password book” written on the front. This isn’t uncommon.

Passwords 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Behaviors That Will Reduce Your Risk Online

Daniel Miessler

What follows is a set of basic security hygiene steps that will significantly reduce your risk online. Good passwords are long, random, and unique to each account, which means it’s impossible for a human to manage them on their own. Enable two-factor authentication on all critical accounts. Automatic Logins Using Lastpass.

Risk 345
article thumbnail

UK Fraud and Cybercrime Watchdog Warns of Travel-Related Scams in Anticipation of Holiday Booking Surge

Hot for Security

The UK has been dealing with some of the harshest lockdown restrictions since the coronavirus was declared a pandemic, and many citizens are looking forward to booking a much-needed vacation. If the person or agent insists that you give these details or risk forfeiting your spot, it’s a scam.

Scams 98
article thumbnail

Why May 2021 Represents a New Chapter in the “Book of Cybersecurity Secrets”

McAfee

The words and guidance outlined in the DoDZTRA and EO must be followed up with a clear path to action and all the stakeholders, both public and private, are not held accountable for progress. During his keynote remarks at the recent RSA Conference, McAfee CTO Steve Grobman talked about how “as humans, we are awful at perceiving risk.”

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Lots of accounts including Bezos, Elon Musk, Joe Biden, Barack Obama, Bill Gates, Mr Beast, and a ton more getting hacked for a bitcoin scheme. Bruce Schneier | @schneierblog.

article thumbnail

When Accounts are "Hacked" Due to Poor Passwords, Victims Must Share the Blame

Troy Hunt

It's just another day on the internet when the news is full of headlines about accounts being hacked. The second story was about a number of verified Twitter accounts having been "hacked" and then leveraged in Bitcoin scams. And then there's the account holder, the one who chose the password. Without doubt, blame lies with them.

Passwords 236