article thumbnail

Five James Bond gadgets which use real world technologies

CyberSecurity Insiders

To celebrate the recent release of the latest film No Time to Die , here’s our top five gadgets from the quintessential spy series, and how they relate to technologies we see in everyday life. Microchip implant – Casino Royale (2006). Palm print-enabled Walther PPK – Skyfall (2012). While most cars we drive today (hopefully!)

article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

In a statement provided to KrebsOnSecurity, Group-IB said Mr. Kislitsin is no longer an employee, and that he now works for a Russian organization called FACCT , which stands for “ Fight Against Cybercrime Technologies.” “The company is monitoring developments.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

20 Years of SIEM: Celebrating My Dubious Anniversary

Anton on Security

BTW, lots of names for this technology space were in use back then, ultimately SIM/SEM won and then was forever fused together by Gartner. Definitely, the technology context has changed, but the security challenges remain the same to a very large extent. If you are curious, what did people care about those days? it wasn’t the auditors!

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access. Speaking at Fordham University in New York, he admitted that adding backdoors decreases security but that it is worth it. I wrote about all this, and more, in 2013.).

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access. Speaking at Fordham University in New York, he admitted that adding backdoors decreases security but that it is worth it. I wrote about all this, and more, in 2013.).

article thumbnail

When Your Smart ID Card Reader Comes With Malware

Krebs on Security

The trouble with Saicoo’s apparently infected drivers may be little more than a case of a technology company having their site hacked and responding poorly. “The Army Reserve started using CAC logon in May 2006,” Danberry wrote on his “About” page. Don’t worry.” Image: Militarycac.com.

Malware 352
article thumbnail

Detection as Code? No, Detection as COOKING!

Anton on Security

This 2006 (!) For the remaining “classic” detection technology , NDR , I see a mixed bag of open and modifiable detections (usually zeek-based) and opaque (usually those that are ML-heavy). My impression is that in the long run, the vendors with open signatures?—?like like Snort?—?won