Remove Cybersecurity Remove Internet Remove Surveillance
article thumbnail

Surveillance of the Internet Backbone

Schneier on Security

Vice has an article about how data brokers sell access to the Internet backbone. It’s useful for cybersecurity forensics, but can also be used for things like tracing VPN activity. This is netflow data. At a high level, netflow data creates a picture of traffic flow and volume across a network.

Internet 363
article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

Pervasive surveillance capitalism­ -- as practiced by the Internet companies that are already spying on everyone -- ­matters. This isn't sustainable, either for this issue or any of the other policy issues surrounding Internet security. My cybersecurity policy class at the Harvard Kennedy School is just one example.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Alkove Jim Alkove , CEO, Oleria Identity is cybersecurity’s biggest challenge. Sundaresan Bindu Sundaresan , Cybersecurity Director, LevelBlue In 2025, cybercriminals will exploit supply chain vulnerabilities, ransomware, IoT botnets, and AI-driven phishing. Attackers arent hacking in theyre logging in.

article thumbnail

US NCSC and DoS share best practices against surveillance tools

Security Affairs

The US NCSC and the Department of State published joint guidance on defending against attacks using commercial surveillance tools. In the last years, we have reported several cases of companies selling commercial surveillance tools to governments and other entities that have used them for malicious purposes. Pierluigi Paganini.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

Pervasive surveillance capitalism -- ­as practiced by the Internet companies that are already spying on everyone­ -- matters. This isn't sustainable, either for this issue or any of the other policy issues surrounding Internet security. My cybersecurity policy class at the Harvard Kennedy School is just one example.

article thumbnail

Interview: Joseph Steinberg, CyberSecurity Expert and Author

Joseph Steinberg

CyberSecurity Expert, Joseph Steinberg, was recently interviewed by the team at Utopia — a group of networking-technology enthusiasts seeking to provide readers with wise insights on security, privacy, and cryptocurrency — insights gained through interviews of people with considerable related experience. The interview follows.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

It's also why the United States has blocked the cybersecurity company Kaspersky from selling its Russian-made antivirus products to US government agencies. We have credible reports that the Chinese hacked Gmail around 2010, and there are ongoing concerns about both censorship and surveillance by the Chinese social-networking company TikTok.