Identity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking...
Read moreIdentifying People Using Cell Phone Location Data
January 9 2023The two people who shut down four Washington power stations in December were arrested. This is the interesting part:
Investigators identified Greenwood and Crahan almost immediately after the attacks...
Read more
In Memoriam: Remembering Those Who Passed
January 7 2023Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe.
Read moreFriday Squid Blogging: Squid Fetish
January 7 2023Seems that about 1.5% of people have a squid fetish. As usual, you can also use this squid post to talk about the security stories in the news that I...
Read moreUsing command-and-control servers from the decade-old Andromeda malware, the group is installing reconnaissance tools and a backdoor on previously infected systems to target Ukrainian victims.
Read moreIn what's become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied.
Read moreSchneier on Security Audiobook Sale
January 7 2023I’m not sure why, but Audiobooks.com is offering the audiobook version of Schneier on Security at 50% off until January 17. EDITED TO ADD: The audiobook of We Have Root...
Read moreCISOs Are Focused on These 3 Trends. Are You?
January 7 2023The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
Read moreThe Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger.
Read moreRSA crypto cracked? Or perhaps not!
January 7 2023Stand down from blue alert, it seems... but why not plan your cryptographic agility anyway?
Read more
Recent Comments