article thumbnail

Identifying the Person Behind Bitcoin Fog

Schneier on Security

Identifying the person behind Bitcoin Fog serves as an illustrative example of how hard it is to be anonymous online in the face of a competent police investigation: Most remarkable, however, is the IRS’s account of tracking down Sterlingov using the very same sort of blockchain analysis that his own service was meant to defeat.

article thumbnail

Google disrupts the Glupteba botnet

Security Affairs

The blockchain-enabled botnet has been active since at least 2011, researchers estimate that the Glupteba botnet is currently composed of more than 1 million Windows PCs around the world. For example, users who click on a link looking to download a free game instead unknowingly download and install Glupteba malware.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

i-SOON’s “business services” webpage states that the company’s offerings include public security, anti-fraud, blockchain forensics, enterprise security solutions, and training. i-SOON CEO Wu Haibo, in 2011. Image: nattothoughts.substack.com.

article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

For example, if geolocation data shows that a consumer regularly visits a particular place of business, it may be inferred that consumer is a patron of such a business. For example, this may mean that an app that needs certain personal information to operate most efficiently would be allowable. 552 (2011), the U.S.

GDPR 79
article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. In 2011, there a was user in a chat room by the name of altoid, like the mint. Anyone talking about it in 2011 most likely had inside information. Why glorify the criminal hackers? And he had.

Privacy 52
article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

For example, if geolocation data shows that a consumer regularly visits a particular place of business, it may be inferred that consumer is a patron of such a business. For example, this may mean that an app that needs certain personal information to operate most efficiently would be allowable. 552 (2011), the U.S.

GDPR 60
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. Consider another example: the 1972 Summer Olympics in Munich, when terrorists took Israeli athletes hostage.