article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. ” The government alleges the group monetized its illicit access by deploying ransomware and “ cryptojacking ” tools (using compromised systems to mine cryptocurrencies like Bitcoin). Image: FBI.

article thumbnail

GUEST ESSAY: Tapping Bitcoin’s security — to put a stop to ‘51% attacks’ of cryptocurrency exchanges

The Last Watchdog

In Bitcoin, for example, a process known as “Proof-of-Work” (“PoW”) involves miners solving a difficult mathematical problem with powerful computers. The presence of hashrate rental marketplaces like NiceHash make acquiring the required mining power easy; an attacker could rewrite an entire day of Bitcoin SV’s blockchain for less than $150k.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

With Google’s 2012 Zeitgeist, You Won’t Learn Much. Why?

John Battelle's Searchblog

The post With Google’s 2012 Zeitgeist, You Won’t Learn Much. Imagine if Google took its massive search query database and worked with some of the leaders in the open data movement to mine true insights? The post With Google’s 2012 Zeitgeist, You Won’t Learn Much. Guess what? This guy was big this year.

article thumbnail

Searching for Email Addresses Can Have Lots of Permutations Too: eDiscovery Throwback Thursdays

eDiscovery Daily

This post was originally published on November 15, 2012 – when eDiscovery Daily was early into its third year of existence and continues the two-part series we started last week. I suspect most of your hands are raised – I know mine is.

Mining 46
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.” ZB in 2012, and the forecast is a mind-boggling 175 ZB by 2025! IDC estimated the world created.16

article thumbnail

The Decreasing Usefulness of Positive Visual Security Indicators (and the Importance of Negative Ones)

Troy Hunt

— Scott Hanselman (@shanselman) April 4, 2012. No, of course we shouldn't trust it and it's a perfect example of where a positive visual indicator is, in fact, misleading. I saw another perfect example of this just the other day, this time by way of a Spotify phish: Ouch, can think of a lot of people who would fall for this.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

But, this case – where an attorney sought sanctions against another for hanging up on him – is a unique example of lack of cooperation: Court Denies Sanction Request for Attorney Who Hung Up on Opposing Counsel One Time : In Ewing v. 2012: Part 1 , Part 2 , Part 3 , Part 4. Here they are: 2018: Part 1 , Part 2 , Part 3 , Part 4.