article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Author’s musical preferences not included… No Longer Mine When I write, I like to listen to music. Since the pandemic I’ve fallen into the habit of reading paper books at night, and listening to books while walking. In short, everything could be minedmined for insights, for value, for untold usefulness.

Mining 52
article thumbnail

Hijacking Computers for Cryptocurrency Mining

Schneier on Security

Interesting paper " A first look at browser-based cryptojacking ": Abstract : In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code-bases.

Mining 54
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian cybercrime forums launch contests for cryptocurrency hacks

Security Affairs

. “Over the past month, operators of one of the top Russian-language cybercrime forums have been running a “contest,” calling for the community to submit papers that examine how to target cryptocurrency-related technology.” ” reads a post published by Intel 471. The submissions were accepted over a 30-days period.

Paper 145
article thumbnail

Experian Glitch Exposing Credit Files Lasted 47 Days

Krebs on Security

It’s not entirely clear whether Experian sent me this paper notice because they legally had to, or if they felt I deserved a response in writing and thought maybe they’d kill two birds with one stone. To make matters worse, a majority of the information in that credit report is not mine.

Mining 318
article thumbnail

INVDoS, a severe DoS issue in Bitcoin core remained undisclosed for two years

Security Affairs

” reads the paper published by the expert. “This could be through a loss of mining time or expenditure of electricity by shutting down nodes and delaying blocks or causing the network to temporarily partition.” ” continues the paper. ” The INVDoS flaw affects Bitcoin Core v0.16.0,

article thumbnail

Excel Data Forensics

Schneier on Security

And, yes, an author of a paper on dishonesty is being accused of dishonesty. In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand, so see the description at the link. There’s more evidence.)

Paper 90
article thumbnail

Archivists and Records Managers, part 12

The Schedule

” He also recounted his appraisal of the business records from a closed copper mining company, lamenting that “these important paper records were preserved by accident rather than design ; had they been electronic, they would have been lost to history.”