Remove 2010 Remove Communications Remove Computer and Electronics Remove Security
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

They affect national security. They're critical to national security as well as personal security. Before the Internet revolution, military-grade electronics were different from consumer-grade. That started to change in the 1980s, when consumer electronics started to become the place where innovation happened.

Military 103
article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

Spamit), an invite-only community for Russian-speaking people in the businesses of sending spam and building botnets of infected computers to relay said spam. Icamis and Sal were in daily communications with these botmasters, via the Spamdot forum and private messages. The Spamdot admins went by the nicknames Icamis (a.k.a.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums. Hieu Minh Ngo, in his teens. BEGINNINGS.

article thumbnail

Microsoft sued North Korea-linked Thallium group

Security Affairs

The group is charges of violations of the Computer Fraud & Abuse Act and Electronic Communications Privacy Act; federal trademark infringement, dilution, and false designation of origin; cyber squatting; com mon law trespass to chattels; unjust enrichment; conversion; intentional interference with contracts. 27 in the U.S.

article thumbnail

Failure to Secure Wireless Network Defeats ECPA Claims

Hunton Privacy

A computer user’s failure to secure his wireless network contributed to the defeat of his claim that a neighbor’s unwelcome access to his files violated the Electronic Communications Privacy Act (“ECPA”). The ECPA places restrictions on unauthorized interception of, and access to, electronic communications.

article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Broadcast or communicate? A fascinating example for me is that while most of the world was busy building out telephone communications infrastructure, the Soviets chose to focus on installing loudspeakers everywhere.

article thumbnail

Regulating Privacy Across Borders in the Digital Age

Hunton Privacy

On November 10, 2010, the American Bar Association’s Section of Antitrust Law’s International Committee and Corporate Counseling Committee hosted a webinar on “Regulating Privacy Across Borders in the Digital Age: An Emerging Global Consensus or Vive la Difference?”.

Privacy 40