article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Author’s musical preferences not included… No Longer Mine When I write, I like to listen to music. Since the pandemic I’ve fallen into the habit of reading paper books at night, and listening to books while walking. In short, everything could be minedmined for insights, for value, for untold usefulness.

Mining 52
article thumbnail

Hijacking Computers for Cryptocurrency Mining

Schneier on Security

Interesting paper " A first look at browser-based cryptojacking ": Abstract : In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code-bases.

Mining 51
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian cybercrime forums launch contests for cryptocurrency hacks

Security Affairs

. “Over the past month, operators of one of the top Russian-language cybercrime forums have been running a “contest,” calling for the community to submit papers that examine how to target cryptocurrency-related technology.” ” reads a post published by Intel 471. The submissions were accepted over a 30-days period.

Paper 137
article thumbnail

Experian Glitch Exposing Credit Files Lasted 47 Days

Krebs on Security

It’s not entirely clear whether Experian sent me this paper notice because they legally had to, or if they felt I deserved a response in writing and thought maybe they’d kill two birds with one stone. To make matters worse, a majority of the information in that credit report is not mine.

Mining 278
article thumbnail

LemonDuck Shows Malware Can Evolve, Putting Linux and Microsoft at Risk

eSecurity Planet

The LemonDuck malware that for the past couple of years has been known for its cryptocurrency mining and botnet capabilities is evolving into a much broader threat, moving into new areas of cyber attacks, targeting both Linux and Microsoft systems and expanding its geographical reach, according to security researchers with Microsoft.

Risk 144
article thumbnail

Excel Data Forensics

Schneier on Security

And, yes, an author of a paper on dishonesty is being accused of dishonesty. In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand, so see the description at the link. There’s more evidence.)

Paper 82
article thumbnail

Archivists and Records Managers, part 12

The Schedule

” He also recounted his appraisal of the business records from a closed copper mining company, lamenting that “these important paper records were preserved by accident rather than design ; had they been electronic, they would have been lost to history.”