article thumbnail

Identifying People by Their Browsing Histories

Schneier on Security

This work replicates and extends the 2012 paper Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns [ 48 ]. Wethen find that for users who visited 50 or more distinct do-mains in the two-week data collection period, ~50% can be reidentified using the top 10k sites.

article thumbnail

LLMs and Phishing

Schneier on Security

In 2012, researcher Cormac Herley offered an answer : It weeded out all but the most gullible. This is due not only to AI advances, but to the business model of the internet—surveillance capitalism—which produces troves of data about all of us, available for purchase from data brokers.

Phishing 341
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

While it's unlikely that China would bother spying on commuters using subway cars, it would be much less surprising if a tech company offered free Internet on subways in exchange for surveillance and data collection. China denied having done so , of course. The United States does it. Our allies do it.

article thumbnail

Inside TeraLeak: Exploring Thousands of Terabytes of Apple’s Hidden iOS Prototypes

Penetration Testing

Data collected from the servers of Apple TestFlight service between 2012 and 2015 has been leaked online.

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

Data provided in the reports are disconcerting, British telecommunications firms supported GCHQ in collecting a large volume of internet data from undersea cables, the overall amount of information from 2007 to 2012 registered a 7,000-fold increase, meanwhile, the spying system monitored nearly 46 billion private communications “events” every day.

Wireless 145
article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

I lamented on this back in 2012 , and this affliction has not truly subsided. Data collection failures still plague many SOCs. Now, again, one can also blame this on people and processes (especially, those people in IT who just didn’t give us the data). You don’t think it can be about the tool at all?

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

This game of cat and mouse continued until Ngo found a much more reliable and stable source of consumer data: A U.S. Ngo wasn’t interested in the data collected by Court Ventures, but rather in its data sharing agreement with a third-party data broker called U.S.