article thumbnail

Book Review: Present Future — Business, Science and the Deep Tech Revolution

Lohrman on Security

Guy Perelmuter offers an insightful, easy to read, helpful guide to present and future technology in business areas ranging from the future of jobs to AI and from cryptocurrencies to quantum computing.

article thumbnail

WhatsApp Case Against NSO Group Progressing

Schneier on Security

“Defendants cannot claim, on the one hand, that its intent is to help its clients fight terrorism and child exploitation, and on the other hand say that it has nothing to do with what its client does with the technology, other than advice and support,” she wrote. ” I have written about the issues at play in this case. .

Hacking 234
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Let’s stick to mostly technology focused failures. Perhaps the tool vendor made some incorrect assumptions about how their technology is really used in the real world?

article thumbnail

StaryDobry ruins New Year’s Eve, delivering miner instead of presents

SecureList

Introduction On December 31, cybercriminals launched a mass infection campaign, aiming to exploit reduced vigilance and increased torrent traffic during the holiday season. Our telemetry detected the attack, which lasted for a month and affected individuals and businesses by distributing the XMRig cryptominer.

Malware 96
article thumbnail

Threat Model Thursday: Technology Consumers

Adam Shostack

The author critiques 'anticipatory data practices', a collection of techniques that include my own work, as presented to civil society activists. First, normal people don't "work on" technology the way technologists do. They're working on living their lives, and hoping technology helps.

article thumbnail

The Legal Risks of Security Research

Schneier on Security

Our Guide gives the most comprehensive presentation to date of this landscape of legal risks, with an eye to both legal and technical nuance.

Risk 358
article thumbnail

Introducing the DEF CON 32 Hackers' Almanack

Adam Shostack

Every year, thousands of hackers converge in Las Vegas for a joyous, crazy exploration of the edges of technology otherwise fondly called Hacker Summer Camp. Im proud to be a member of this community and grateful to present The DEF CON 32 Hackers Almanack. Grateful to introduce the Hackers' Almanack!