article thumbnail

Book Review: Present Future — Business, Science and the Deep Tech Revolution

Lohrman on Security

Guy Perelmuter offers an insightful, easy to read, helpful guide to present and future technology in business areas ranging from the future of jobs to AI and from cryptocurrencies to quantum computing.

article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Let’s stick to mostly technology focused failures. Perhaps the tool vendor made some incorrect assumptions about how their technology is really used in the real world?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

StaryDobry ruins New Year’s Eve, delivering miner instead of presents

SecureList

Introduction On December 31, cybercriminals launched a mass infection campaign, aiming to exploit reduced vigilance and increased torrent traffic during the holiday season. Our telemetry detected the attack, which lasted for a month and affected individuals and businesses by distributing the XMRig cryptominer.

Malware 99
article thumbnail

2025 – The International Year of Quantum Science and Technology

Security Boulevard

2025 The International Year of Quantum Science and Technology divya Tue, 04/29/2025 - 07:48 It is no surprise that the United Nations declared 2025 as the International Year of Quantum Science and Technology (IYQ). Wherever you are in the world, you have a variety of resources at your disposal.

article thumbnail

Threat Model Thursday: Technology Consumers

Adam Shostack

The author critiques 'anticipatory data practices', a collection of techniques that include my own work, as presented to civil society activists. First, normal people don't "work on" technology the way technologists do. They're working on living their lives, and hoping technology helps.

article thumbnail

The Legal Risks of Security Research

Schneier on Security

Our Guide gives the most comprehensive presentation to date of this landscape of legal risks, with an eye to both legal and technical nuance.

Risk 357
article thumbnail

Introducing the DEF CON 32 Hackers' Almanack

Adam Shostack

Every year, thousands of hackers converge in Las Vegas for a joyous, crazy exploration of the edges of technology otherwise fondly called Hacker Summer Camp. Im proud to be a member of this community and grateful to present The DEF CON 32 Hackers Almanack. Grateful to introduce the Hackers' Almanack!