article thumbnail

Relax. Internet password books are OK

Malwarebytes

There’s one password management tool which experiences more than its fair share of derision—the oft-maligned Internet password book. These are, as you may expect, physical books which are little more than empty notepads with “Internet password book” written on the front. The big book of passwords. It’s not in your threat model.

Passwords 138
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

They're critical to national security as well as personal security. Before the Internet revolution, military-grade electronics were different from consumer-grade. That changed with the rise of Internet commerce, because the needs of commercial applications more closely mirrored the needs of the military.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

500M Avira Antivirus Users Introduced to Cryptomining

Krebs on Security

But what bugs me most is they will be introducing hundreds of millions of perhaps less savvy Internet users to the world of cryptocurrency, which comes with its own set of unique security and privacy challenges that require users to “level up” their personal security practices in fairly significant ways.

Antivirus 362
article thumbnail

MY TAKE: How consumer-grade VPNs are enabling individuals to do DIY security

The Last Watchdog

These patterns highlight the potential for more and more consumers to recognize personal VPNs for what they truly are: a low-cost tool that empowers the user to very directly preserve online privacy while at the same time taking proactive steps to improve personal security. I’ll keep watch and keep reporting.

B2C 214
article thumbnail

Norton 360 Now Comes With a Cryptominer

Krebs on Security

I guess what bothers me most about Norton Crypto is that it will be introducing millions of perhaps less savvy Internet users to the world of cryptocurrency, which comes with its own set of unique security and privacy challenges that require users to “level up” their personal security practices in fairly significant ways.

article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

Stashes of breaches like this are all over the place and they fuel an exchange ecosystem that replicates billions of records of personal data over and over again. You may only search information about yourself, or those you are authorized in writing to do so. That's not going to keep you out of trouble!

article thumbnail

GUEST ESSAY: Until we eliminate passwords, follow these 4 sure steps to password hygiene

The Last Watchdog

More Americans than ever are working remotely and seeking out entertainment online, and this increase of internet activity has fueled a dramatic spike in cybercrime. Two-factor authentication may seem technically complicated, but “2FA” is a security measure you already know. Related: Training human sensors.

Passwords 244