article thumbnail

Report from the Cambridge Cybercrime Conference

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Report from the Cambridge Cybercrime Conference The Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here.

article thumbnail

Pakistani Firm Shipped Fentanyl Analogs, Scams to US

Krebs on Security

and Pakistan whose employees are accused of using online ads to scam westerners seeking help with trademarks, book writing, mobile app development and logo designs, a new investigation reveals. com — alleging they scammed her out of $100,000 after she hired them to help write her book. ” Launched in 2017, eWorldTrade[.]com

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Phishers Love New TLDs Like.shop,top and.xyz

Krebs on Security

John Levine is author of the book “The Internet for Dummies” and president of CAUCE. ” In virtually all previous spam reports, Interisle found the top brands referenced in phishing attacks were the largest technology companies, including Apple, Facebook, Google and PayPal. But this past year, Interisle found the U.S.

article thumbnail

“Cybersecurity For Dummies” Third Edition Now Available

Joseph Steinberg

The third edition of Cybersecurity For Dummies , Joseph Steinberg ‘s best-selling introductory-level book about cybersecurity, is now available in both print and e-book format. The new book.

article thumbnail

Using Signal Groups for Activism

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Using Signal Groups for Activism Good tutorial by Micah Lee. It includes some nonobvious use cases.

article thumbnail

How Cybersecurity Fears Affect Confidence in Voting Systems

Schneier on Security

Digital systems have replaced poll books, taken over voter identity verification processes and are integrated into registration, counting, auditing and voting systems. This technological leap has made voting more accessible and efficient, and sometimes more secure. Today, over 95% of ballots are counted electronically.

article thumbnail

How Solid Protocol Restores Digital Agency

Schneier on Security

When journalist Julia Angwin attempted to correct her information across major data brokers for her book Dragnet Nation , she found that even after submitting corrections through official channels, a significant number of errors reappeared within six months.