article thumbnail

Threat Model Thursday: Technology Consumers

Adam Shostack

It opens “While many forms of data-driven surveillance are now a ‘fact’ of contemporary life amidst datafication, obtaining concrete knowledge of how different institutions exploit data presents an ongoing challenge, requiring the expertise and power to untangle increasingly complex and opaque technological and institutional arrangements.”

article thumbnail

Symphony Technology to acquire Cybersecurity Firm McAfee for $4 billion

CyberSecurity Insiders

American Cybersecurity firm McAfee has made it official that it is going to sell its enterprise business to Symphony Technology Group (STG) for all cash $4bn. Note- In March 2021, John McAfee, who founded the security business in 1987 and resigned the company in 1994 was in news for all wrong reasons.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

They're critical to national security as well as personal security. The military responded by creating a category of military hardware called COTS: commercial off-the-shelf technology. They're used by election officials, police at all levels, nuclear power plant operators, CEOs and human rights activists.

article thumbnail

NY Man Pleads Guilty in $20 Million SIM Swap Theft

Krebs on Security

A 24-year-old New York man who bragged about helping to steal more than $20 million worth of cryptocurrency from a technology executive has pleaded guilty to conspiracy to commit wire fraud. “Now we’re seeing a lot more of what I would call normal people trying their hand at crypto, and that makes a lot more people a target.

article thumbnail

When Accounts are "Hacked" Due to Poor Passwords, Victims Must Share the Blame

Troy Hunt

I just can't wrap my head around why anyone would think that people should be able to take whatever shortcuts they want with their personal security and somehow, magically, have absolutely no responsibility whatsoever for the outcome.

Passwords 234
article thumbnail

Privacy Device Designed to Defend Against Illegal Wireless Tracking

SecureWorld News

As the world becomes increasingly digitized, our personal privacy and even physical safety are under threat from a variety of sources. One technology that has raised particular concerns is personal Bluetooth Low Energy (BLE) trackers. It is affordable and designed for anyone who values their privacy and security.

Wireless 103
article thumbnail

Unmasking 2024’s Email Security Landscape

Security Affairs

VIPRE Security Group’s latest report, “Email Security in 2024: An Expert Insight into Email Threats,” delves into the cutting-edge tactics and technologies embraced by cybercriminals this year. This scam cleverly manipulates trust and the routine nature of order confirmations to breach personal security.

Phishing 142