Remove Computer and Electronics Remove Education Remove Events
article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware. Unfortunately, contemporary events seem to confirm this.

article thumbnail

Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe

Krebs on Security

A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is facing questions about his credentials and an inquiry from the Federal Bureau of Investigation (FBI). Lanterman’s LinkedIn profile that has a degree from Harvard University.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. My conclusion is that CTFs are intrinsically an eSport with the attribute of having a strong educational value. This is true in gaming, and especially true in CTF events. Spoiler alert!

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

” The crates and boxes being delivered to his erstwhile office space were mostly computers and other high-priced items ordered from 10 different Office Depot credit cards that also were not in his name. The application listed our home address with me and some woman who was not my wife’s name.” ” RECYCLING VICTIMS.

article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. My conclusion is that CTFs are intrinsically an eSport with the attribute of having a strong educational value. Capture the Flag events, a collective obsession. Spoiler alert!

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. Transferring files electronically is what encryption is for.

article thumbnail

How should you investigate a data breach?

IT Governance

This might be, for example,the victim’s computer, a web page or a physical space in which documents were compromised. The scene of the incident will generally provide you with the clues you need to work out – or at least make an educated guess regarding – who was responsible for the breach and how it occurred. The crime scene.