Remove 2011 Remove Blockchain Remove Examples Remove Security
article thumbnail

Identifying the Person Behind Bitcoin Fog

Schneier on Security

Identifying the person behind Bitcoin Fog serves as an illustrative example of how hard it is to be anonymous online in the face of a competent police investigation: Most remarkable, however, is the IRS’s account of tracking down Sterlingov using the very same sort of blockchain analysis that his own service was meant to defeat.

article thumbnail

Google disrupts the Glupteba botnet

Security Affairs

The blockchain-enabled botnet has been active since at least 2011, researchers estimate that the Glupteba botnet is currently composed of more than 1 million Windows PCs around the world. For example, users who click on a link looking to download a free game instead unknowingly download and install Glupteba malware.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

Security experts who reviewed the leaked data say they believe the information is legitimate, and that i-SOON works closely with China’s Ministry of State Security and the military. In 2021, the Sichuan provincial government named i-SOON as one of “the top 30 information security companies.” ”

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. In 2011, there a was user in a chat room by the name of altoid, like the mint. Anyone talking about it in 2011 most likely had inside information.

Privacy 52
article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

identifiers such as a real name, alias, postal address, unique personal identifier, online identifier, internet protocol address, email address, account name, Social Security number, driver’s license number or passport number. 552 (2011), the U.S. Specific categories defined as personal information include. biometric information.

GDPR 79
article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

identifiers such as a real name, alias, postal address, unique personal identifier, online identifier, internet protocol address, email address, account name, Social Security number, driver’s license number or passport number. 552 (2011), the U.S. Specific categories defined as personal information include. biometric information.

GDPR 60
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. Consider another example: the 1972 Summer Olympics in Munich, when terrorists took Israeli athletes hostage.