This article was originally published in CSO in 2015. See important update at the end.
In his book The Psychological Edge: Strategies For Everyday Living, clinical psychologist Dr. Samuel Shein writes that while we have a National Transportation Safety Board (NTSB), there is no National Psychological Research Board (NPRB). A group like the NPRB could investigate national disasters caused by those with psychological issues. Even with tragedies such as the Columbine High school and Sandy Hook Elementary school massacres, to the Heaven’s Gate mass suicide, 9/11, and more, the US still lacks a central agency dealing with psychological-based tragedies. …
Here is an ongoing list of audio recordings from scammers, based on my articles An easy & foolproof way to get phone scammers to hang up on you, and From Amazon Returns to Extended Auto Warranties — How Not to Get Scammed When Your Phone Rings.
Listen to their method, understand their tactics, so you, your friends and family, can avoid being their next victims.
Nearly everyone has an Amazon account. Which makes nearly everyone a target.
77 — the last 2 minutes where he goes into a foul-mouth tirade is deleted.
87 — This…
There is no lie, we did land on the moon. There is no basis to this conspiracy theory.
Suppose the US really did lie and the entire moon landing program was a hoax. How would we know that? Very simple, Russia would have brought it to the world’s attention.
Russia and the US were in a cold war. Russia had moles and spies in NASA who would have known it was a hoax. Russia would have been the first to highlight that fact. And their silence says a lot.
Yes, we landed on the moon, and there is no conspiracy at all.
Claus Schorr, a mathematician and cryptographer, mentions that prime factorization can be reduced to a shorter vector problem, which could be easier to decipher. The premise of his research, entitled “Fast Factoring Integers …
Eli Cyber Security
Bruce Schneier has some clarificaiton on the Schnorr paper:
The recruiters you use may be sabotaging your job search.
One of the most desperate situations people find themselves in is when they are suddenly out of work and need a job. Those on LinkedIn or with a Monster account often quickly send out their resume to everyone and anyone, including recruitment agencies, they think can help them, no matter how remote. And while that is a desperate approach, it may also, in fact, be hijacking their efforts to find a new job.
There are two elements at play here. First, when you send your resume to a recruiter, you…
A non-scientific estimate tells me that almost everyone I know, and their friends use WhatsApp. WhatsApp has been in the news recently, with many stories, most of them negative, as their terms of service and privacy policies are changing. Most specifically, that WhatsApp will be sharing data with Facebook, their parent company.
While WhatsApp just pushed off those changes to March 2021, the underlying question is: should you stop using WhatsApp and use an alternative messaging application like Signal or Telegram that is more privacy oriented? Like most security and privacy questions, the answer is “it depends.”
If you are…
In 2021, if you get an unsolicited call, there is a high chance, almost a given, that it is a scammer calling. And why all these scam calls? As Willie Sutton (never really) said, “Because that’s where the money is.” Given that many of these calls originate in third-world countries where an annual salary may be in the range of $750, a scammer can easily make a year’s wage via a single call.
You can easily avoid being a victim of these multi-billion dollar frauds by knowing their techniques and characteristics, which is what this article is about.
It’s hard to believe that it’s been a year since I wrote The Best Information Security Books of 2019. With that, here is my list of the Best Information Security Books of 2020
Medical Device Cybersecurity for Engineers and Manufacturers — Axel Wirth, Christopher Gates and Jason Smith
In September, it was reported that a patient in Germany died when ransomware disrupted emergency care at the hospital. After an investigation, it was determined that the patient was in such poor health that she would have died anyway and that the ransomware attack was not ultimately responsible for her death.
In part 1 of this article, I gave an overview of the concept of cryptomining and cryptojacking.
Here in part 2, my Tapad colleague Husnain Bustam, cloud security engineering, and I will provide guidance and advice on securing your cloud environment from illegal cryptojacking.
It’s important to note that cryptojacking is not some theoretical attack from academic researchers. It is occurring in the real-world and numerous firms have been victims. As far back as 2014, a researcher misused National Science Foundation-funded supercomputers to mine bitcoins at two universities to generate bitcoins valued between $8,000 and $10,000. …
The ads are everywhere — online, YouTube, train stations, billboards, airports, apps, and more. Casinos offering you free initial risk-free bets for their online sportsbooks. You’ll be enticed with offers like these:
At first glance, they seem to be an easy and risk-free way to make some quick money. It is the nirvana of gambling — betting with other people’s money with no risk.
But in the irrational exuberance of having the casinos…
I work in information security at Tapad. Write book reviews for the RSA blog, & a Founding member of the Cloud Security Alliance and Cybersecurity Canon.