article thumbnail

The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying.

Schneier on Security

Before the internet, putting someone under surveillance was expensive and time-consuming. Surveillance has become the business model of the internet, and there’s no reasonable way for us to opt out of it. The technologies aren’t perfect; some of them are pretty primitive. Spying is another matter. But so do humans.

article thumbnail

Should There Be Limits on Persuasive Technologies?

Schneier on Security

But as with many things, technology is fundamentally changing the nature of persuasion. Democratic societies, in particular, are in dire need of a frank conversation about the role persuasion plays in them and how technologies are enabling powerful interests to target audiences. All of this is not intended to be alarmist.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. The homepage of Stark Industries Solutions.

DDOS 274
article thumbnail

Who tracked internet users in 2021–2022

SecureList

Worried about this lack of transparency, users and privacy watchdogs put pressure on technology companies. DNT (disabled by default) is part of Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud. Compared to smaller advertising providers, Facebook Custom Audiences covers a significantly larger audience.

article thumbnail

HOW DO PROVIDERS IMPLEMENT INTERNET BLOCKING IN BELARUS?

Security Affairs

The Internet was shutdown several days and more than 80 websites, most of them news and political sites, were blocked. Some of the blocking techniques used include Domain Name System spoofing, transparent proxies with hijacked HTTPS certificates and Deep Packet Technology (DPI) implementations. SecurityAffairs – hacking, Internet).

Internet 116
article thumbnail

Treasury Sanctions Creators of 911 S5 Proxy Botnet

Krebs on Security

From 2015 to July 2022, 911 S5 sold access to hundreds of thousands of Microsoft Windows computers daily, as “proxies” that allowed customers to route their Internet traffic through PCs in virtually any country or city around the globe — but predominantly in the United States.

VPN 223
article thumbnail

AI and the Evolution of Social Media

Schneier on Security

There is a lot we can learn about social media’s unregulated evolution over the past decade that directly applies to AI companies and technologies. In both cases, the solution lies in limits on the technology’s use. #1: 1: Advertising The role advertising plays in the internet arose more by accident than anything else.

Media 294