article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Author’s musical preferences not included… No Longer Mine When I write, I like to listen to music. Since the pandemic I’ve fallen into the habit of reading paper books at night, and listening to books while walking. The original MusicPlasma interface. So while I’ve heard a book, I don’t own it in any sense of the word.

Mining 52
article thumbnail

Hijacking Computers for Cryptocurrency Mining

Schneier on Security

Interesting paper " A first look at browser-based cryptojacking ": Abstract : In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code-bases.

Mining 50
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experian Glitch Exposing Credit Files Lasted 47 Days

Krebs on Security

It’s not entirely clear whether Experian sent me this paper notice because they legally had to, or if they felt I deserved a response in writing and thought maybe they’d kill two birds with one stone. To make matters worse, a majority of the information in that credit report is not mine.

Mining 278
article thumbnail

LemonDuck Shows Malware Can Evolve, Putting Linux and Microsoft at Risk

eSecurity Planet

The LemonDuck malware that for the past couple of years has been known for its cryptocurrency mining and botnet capabilities is evolving into a much broader threat, moving into new areas of cyber attacks, targeting both Linux and Microsoft systems and expanding its geographical reach, according to security researchers with Microsoft.

Risk 144
article thumbnail

Archive-It Partner News, October 2023

Archive-It

Wrapping up Legal Literacies for Text and Data Mining – Cross-Border (LLTDM-X) As this project has ended, Thomas Padilla (Deputy Director, Archiving and Data Services at the Internet Archive) details the resulting publication of an instructive case study for researchers and a white paper in this blog post.

article thumbnail

INVDoS, a severe DoS issue in Bitcoin core remained undisclosed for two years

Security Affairs

” reads the paper published by the expert. ” reads the paper published by the expert. “This could be through a loss of mining time or expenditure of electricity by shutting down nodes and delaying blocks or causing the network to temporarily partition.” ” continues the paper. server crash).

article thumbnail

Excel Data Forensics

Schneier on Security

And, yes, an author of a paper on dishonesty is being accused of dishonesty. In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand, so see the description at the link. There’s more evidence.)

Paper 81