Remove Cybercrime Remove Data collection Remove Surveillance Remove Technology
article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Where possible, favor openness and transparency over aggressive data collection or restrictions which erode civil liberties. Seek security policies and technologies that enhance society broadly rather than benefit special interests. Surveillance creep risks violating autonomy. Focus only on proportional responses.

article thumbnail

Privacy predictions 2022

SecureList

Governments in many countries push for easier identification of Internet users to fight cybercrime, as well as “traditional” crime coordinated online. Citizens, for their part, are increasingly concerned with surveillance capitalism , a lack of anonymity and dependence on online services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A chink in the armor of China-based hacking group Nickel

Malwarebytes

As a result, Nickel achieved long-term access to several targets, allowing the group to conduct activities such as regularly scheduled exfiltration of data. Microsoft Threat Intelligence Center (MSTIC) observed Nickel perform frequent and scheduled data collection and exfiltration from victim networks. Stay safe, everyone!

Hacking 99
article thumbnail

Microsoft disrupts China-based hacking group Nickel

Malwarebytes

As a result, Nickel achieved long-term access to several targets, allowing the group to conduct activities such as regularly scheduled exfiltration of data. Microsoft Threat Intelligence Center (MSTIC) observed Nickel perform frequent and scheduled data collection and exfiltration from victim networks. Stay safe, everyone!

Hacking 77
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

Confronting the ethics of security and privacy during the pandemic

SC Magazine

On the flip side, their employees had to grapple with the reality that their corporate devices could surveil their activities in their own homes. They have capitulated many of their customers’ surveillance-based demands to capitalize on the increased demand for device surveillance and management software.

article thumbnail

Advanced threat predictions for 2024

SecureList

APT targeting turns toward satellite technologies, producers and operators The only known case of an attack utilizing satellite technologies that happened in recent years was the KA-SAT network hack of 2022. The next WannaCry Fortunately for us, a new cyber epidemic did not happen. Verdict: prediction not fulfilled ❌ 4.

Hacking 106