article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

They're critical to national security as well as personal security. Before the Internet revolution, military-grade electronics were different from consumer-grade. That changed with the rise of Internet commerce, because the needs of commercial applications more closely mirrored the needs of the military.

article thumbnail

500M Avira Antivirus Users Introduced to Cryptomining

Krebs on Security

But what bugs me most is they will be introducing hundreds of millions of perhaps less savvy Internet users to the world of cryptocurrency, which comes with its own set of unique security and privacy challenges that require users to “level up” their personal security practices in fairly significant ways.

Antivirus 362
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How consumer-grade VPNs are enabling individuals to do DIY security

The Last Watchdog

These patterns highlight the potential for more and more consumers to recognize personal VPNs for what they truly are: a low-cost tool that empowers the user to very directly preserve online privacy while at the same time taking proactive steps to improve personal security. I’ll keep watch and keep reporting.

B2C 214
article thumbnail

Norton 360 Now Comes With a Cryptominer

Krebs on Security

I guess what bothers me most about Norton Crypto is that it will be introducing millions of perhaps less savvy Internet users to the world of cryptocurrency, which comes with its own set of unique security and privacy challenges that require users to “level up” their personal security practices in fairly significant ways.

article thumbnail

When Accounts are "Hacked" Due to Poor Passwords, Victims Must Share the Blame

Troy Hunt

It's just another day on the internet when the news is full of headlines about accounts being hacked. I just can't wrap my head around why anyone would think that people should be able to take whatever shortcuts they want with their personal security and somehow, magically, have absolutely no responsibility whatsoever for the outcome.

Passwords 269
article thumbnail

GUEST ESSAY: Until we eliminate passwords, follow these 4 sure steps to password hygiene

The Last Watchdog

More Americans than ever are working remotely and seeking out entertainment online, and this increase of internet activity has fueled a dramatic spike in cybercrime. Two-factor authentication may seem technically complicated, but “2FA” is a security measure you already know. Related: Training human sensors.

Passwords 244
article thumbnail

Mother of all Breaches may contain NEW breach data

Malwarebytes

This consists of personal stashes of data breaches existing all over the place, fueling an exchange ecosystem that creates copies of billions of records of personal data over and over again. It has Terms of Service that include: You may only use this service for your own personal security and research.