article thumbnail

Interview with the Author of the 2000 Love Bug Virus

Schneier on Security

No real surprises, but we finally have the story. The story he went on to tell is strikingly straightforward. De Guzman was poor, and internet access was expensive. He felt that getting online was almost akin to a human right (a view that was ahead of its time).

Passwords 343
article thumbnail

OT attacks increased by over 2000 percent in 2019, IBM reports

Security Affairs

According to IBM, OT attacks increased by over 2000 percent in 2019, most of them involved the Echobot IoT malware. According to IBM X-Force, attacks targeting operational technology (OT) infrastructure increased by over 2000 p ercent in 2019 compared to 2018, and most of them involved the Echobot malware. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Interpol arrests 2000 criminals launching social engineering attacks

CyberSecurity Insiders

In what appears as an operation first of its kind, Interpol has arrested over 2000 criminals who launched social engineering attacks worldwide. The post Interpol arrests 2000 criminals launching social engineering attacks appeared first on Cybersecurity Insiders. More details about the scam will be updated shortly! .

article thumbnail

New ZLoader malware campaign hit more than 2000 victims across 111 countries

Security Affairs

The malware campaign is still active and threat actors have already stolen data and credentials of more than 2000 victims across 111 countries as of 2 Jan 2022. The post New ZLoader malware campaign hit more than 2000 victims across 111 countries appeared first on Security Affairs. Pierluigi Paganini.

Malware 145
article thumbnail

Facial Scanning by Burger King in Brazil

Schneier on Security

In 2000, I wrote : “If McDonald’s offered three free Big Macs for a DNA sample, there would be lines around the block.” ” Burger King in Brazil is almost there , offering discounts in exchange for a facial scan. ” The stunt runs until January 2nd.

Marketing 328
article thumbnail

CVE-2025-2000 (CVSS 9.8): Qiskit SDK Vulnerability Allows Arbitrary Code Execution

Penetration Testing

The issue, tracked as CVE-2025-2000 The post CVE-2025-2000 (CVSS 9.8): Qiskit SDK Vulnerability Allows Arbitrary Code Execution appeared first on Cybersecurity News. A security vulnerability has been discovered in the Qiskit Software Development Kit (SDK).

article thumbnail

Bypassing a Theft Threat Model

Schneier on Security

I wrote about this kind of thing in 2000, in Secrets and Lies (page 318): My favorite example is a band of California art thieves that would break into people’s houses by cutting a hole in their walls with a chainsaw. Thieves cut through the wall of a coffee shop to get to an Apple store, bypassing the alarms in the process.

278
278