article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I wrote the essay below in September 2013. So would the FBI breaking into my home and seizing my personal electronics. Transferring files electronically is what encryption is for.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums. Secret Service. Hieu Minh Ngo, in his teens. BEGINNINGS.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ex-NSA contractor Harold Thomas Martin pleads guilty to federal charge of willful retention of national defense information

Security Affairs

According to the Politico website, sources informed of the events reported that Kaspersky learned about Martin after he sent strange Twitter messages to two researchers of the firm in 2016, minutes before The Shadow Brokers began leaking the NSA dump online. “The The case unfolded after someone who U.S. A first message sent on Aug.

article thumbnail

German DPAs Address a Wide Range of Topics at Annual Conference and Adopt Resolutions

Hunton Privacy

On October 2, 2013, the 86th Conference of the German Data Protection Commissioners concluded in Bremen. securing electronic communications by implementing and developing end-to-end encryption. The DPAs state that they are committed to the promotion of the confidentiality and integrity of electronic communications.

article thumbnail

Plaintiff is Able to Get Some Subpoenas for Personal Data Quashed, But Not All: eDiscovery Case Law

eDiscovery Daily

With regards to the pre-incident phone records, Judge Lasnik indicated that “defendants have identified a specific need to confirm events and authenticate communications that are directly relevant to a determination of whether defendants’ negligence and/or the vessel’s unseaworthiness caused plaintiff’s injuries.

article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

18, 2013, KrebsOnSecurity broke the news that U.S. retail giant Target was battling a wide-ranging computer intrusion that compromised more than 40 million customer payment cards over the previous month. By the first week of December, 2013, Rescator’s online store — rescator[.]la

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Malware, a combination of the terms ‘malicious’ and ‘software,’ includes all malicious programs that intend to exploit computer devices or entire network infrastructures to extract victim’s data, disrupt business operations, or simply, cause chaos. Unfortunately, this could be your computer trying to give away the presence of malware.