Bruce Schneier has some clarificaiton on the Schnorr paper:
Claus Schorr, a mathematician and cryptographer, mentions that prime factorization can be reduced to a shorter vector problem, which could be easier to decipher. The premise of his research, entitled “Fast Factoring Integers …
Eli Cyber Security
The recruiters you use may be sabotaging your job search.
One of the most desperate situations people find themselves in is when they are suddenly out of work and need a job. Those on LinkedIn or with a Monster account often quickly send out their resume to everyone and anyone, including recruitment agencies, they think can help them, no matter how remote. And while that is a desperate approach, it may also, in fact, be hijacking their efforts to find a new job.
There are two elements at play here. First, when you send your resume to a recruiter, you…
A non-scientific estimate tells me that almost everyone I know, and their friends use WhatsApp. WhatsApp has been in the news recently, with many stories, most of them negative, as their terms of service and privacy policies are changing. Most specifically, that WhatsApp will be sharing data with Facebook, their parent company.
While WhatsApp just pushed off those changes to March 2021, the underlying question is: should you stop using WhatsApp and use an alternative messaging application like Signal or Telegram that is more privacy oriented? Like most security and privacy questions, the answer is “it depends.”
If you are…
In 2021, if you get an unsolicited call, there is a high chance, almost a given, that it is a scammer calling. And why all these scam calls? As Willie Sutton (never really) said, “Because that’s where the money is.” Given that many of these calls originate in third-world countries where an annual salary may be in the range of $750, a scammer can easily make a year’s wage via a single call.
You can easily avoid being a victim of these multi-billion dollar frauds by knowing their techniques and characteristics, which is what this article is about.
It’s hard to believe that it’s been a year since I wrote The Best Information Security Books of 2019. With that, here is my list of the Best Information Security Books of 2020
Medical Device Cybersecurity for Engineers and Manufacturers — Axel Wirth, Christopher Gates and Jason Smith
In September, it was reported that a patient in Germany died when ransomware disrupted emergency care at the hospital. After an investigation, it was determined that the patient was in such poor health that she would have died anyway and that the ransomware attack was not ultimately responsible for her death.
In part 1 of this article, I gave an overview of the concept of cryptomining and cryptojacking.
Here in part 2, my Tapad colleague Husnain Bustam, cloud security engineering, and I will provide guidance and advice on securing your cloud environment from illegal cryptojacking.
It’s important to note that cryptojacking is not some theoretical attack from academic researchers. It is occurring in the real-world and numerous firms have been victims. As far back as 2014, a researcher misused National Science Foundation-funded supercomputers to mine bitcoins at two universities to generate bitcoins valued between $8,000 and $10,000. …
The ads are everywhere — online, YouTube, train stations, billboards, apps, and more. Casinos offering you free initial risk-free bets for their online sportsbooks. You’ll be enticed with offers like these:
At first glance, they seem to be an easy and risk-free way to make some quick money. It is the nirvana of gambling — betting with other people’s money with no risk.
But in the irrational exuberance of having the casinos show…
For many years, countless engineers around the world tried in vain to create a motor-operated airplane. That all changed in 1903 when the Wright Brothers Wright Flyer took flight at Kitty Hawk, and the rest is aviation history.
Part 1 in a series about protection your cloud environment against cryptojacking
It is not uncommon for people who own mansions in college towns to find that an illegal mansion party took place while they were away. Sometimes the party goers illegally enter the mansion. Other times it’s via an Airbnb rental. Either way, when the owners return, they see countless beer cans and bottles of alcohol strewn on the lawn. Entering their palatial home, it is as if a hurricane came through. And when they get to the bathrooms, let’s just say it’s not pretty.
Those who are casualties…
Criminal gangs are targeting you and your payment accounts during COVID — but this is not the type of popularity you want.
Winston Churchill famously said, “Never let a good crisis go to waste.” In other words, Churchill’s understanding of human nature can also be applied to the current COVID pandemic. This is especially true when it comes to cybercrime and fraud.
As I wrote in 20 ways to protect yourself from COVID-19 & stimulus payment scams, cybercriminals and scammers are also out in force. Ironically, they were relatively quick to mobilize during COVID, often quicker than the relief groups…
I work in information security at Tapad. Write book reviews for the RSA blog, & a Founding member of the Cloud Security Alliance and Cybersecurity Canon.