article thumbnail

Ransomware Gangs and the Name Game Distraction

Krebs on Security

Reinvention is a basic survival skill in the cybercrime business. Among the oldest tricks in the book is to fake one’s demise or retirement and invent a new identity. REvil’s last big victim was Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. Image: FBI.

article thumbnail

The Challenges in Building Digital Trust

SecureWorld News

According to Cliff Stoll, author of the book The Cuckoo's Egg , the community was small, and the level of trust was very high. System administrators didn't bother locking down their systems, because the possibility of bad actors using them didn't really cross their minds.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more.

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

.” I wrote about the pending Cyber Security Enhancement Act of 2002 (CSEA) and said: “ The problem with this legislation is that it's often very difficult to determine who is responsible for any given cybercrime. When people feel threatened by it they want to throw the book at Yeah. Who is responsible?

Hacking 52