USB Cable Kill Switch for Laptops

BusKill is designed to wipe your laptop (Linux only) if it is snatched from you in a public place: The idea is to connect the BusKill cable to your Linux laptop on ...
Security and the Open Office Environment

Security and the Open Office Environment

Once upon a time, employees spent their days in offices or cubicles, in their own space apart from other employees. Today it’s much different, with employees working in open-plan offices, where large, ...
Security Boulevard

Details of the Cloud Hopper Attacks

Reuters has a long article on the Chinese government APT attack called Cloud Hopper. It was much bigger than originally reported. The hacking campaign, known as "Cloud Hopper," was the subject of ...
Cryptocurrency Malware App Discovered In Googleplay

Cryptocurrency Malware App Discovered In Googleplay

| | Insecure Commerce, theft
Another reason to avoid the Androidsphere: Poor Store Governance ...

Banks Attacked through Malicious Hardware Connected to the Local Network

Kaspersky is reporting on a series of bank hacks -- called DarkVishnya -- perpetrated through malicious hardware being surreptitiously installed into the target network: In 2017-2018, Kaspersky Lab specialists were invited to ...
07-shoplifter.w710.h473.jpg

Thievery in The USA & UK: The Self-Checkout First-World Miscreant

Apparently, a first-world problem has arisen: An unexpeteced outcome in an effort to realize efficiences at scale ...
Inside Job Behind Theft of $3M from Bitcoin Exchange, Says CEO

Inside Job Behind Theft of $3M from Bitcoin Exchange, Says CEO

The chief executive officer of a Bitcoin exchange believes the theft of more than $3 million from the platform was an inside job. On 12 April, the team behind Coinsecure replaced the ...
New Scam Targeting Corporations’ Chip Cards, Warns Secret Service

New Scam Targeting Corporations’ Chip Cards, Warns Secret Service

The United States Secret Service is warning of a new scam in which thieves are targeting the chip-based debit cards issued to corporations. As reported by Brian Krebs, the scam involves criminals ...

Tracing Stolen Bitcoin

Ross Anderson has a really interesting paper on tracing stolen bitcoin. From a blog post: Previous attempts to track tainted coins had used either the "poison" or the "haircut" method. Suppose I ...
Facebook

The Shared Security Weekly Blaze – Malicious Healthcare Workers, New Attacks on Mobile Networks, Facebook Messenger for Kids

This is the Shared Security Weekly Blaze for March 12, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions. This episode was hosted by Tom ...