Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
Aisuru Botnet Shifts from DDoS to Residential Proxies
Aisuru Botnet Shifts from DDoS to Residential Proxies
Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and sustainable business: Renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy…
·krebsonsecurity.com·
Aisuru Botnet Shifts from DDoS to Residential Proxies
Autonomous AI Hacking and the Future of Cybersecurity - Schneier on Security
Autonomous AI Hacking and the Future of Cybersecurity - Schneier on Security
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything. Over the summer, hackers proved the concept, industry institutionalized it, and criminals operationalized it. In June, AI company XBOW took the top spot on HackerOne’s US leaderboard after submitting over 1,000 new vulnerabilities in just a few months. In August, the seven teams competing in DARPA’s AI Cyber Challenge ...
·schneier.com·
Autonomous AI Hacking and the Future of Cybersecurity - Schneier on Security
Infectio
Infectio
·infectio.filippofinke.ch·
Infectio
Visa Isn't Centralized—and Neither Is First Person Identity
Visa Isn't Centralized—and Neither Is First Person Identity
Visa isn't centralized. Instead, it's a trust framework that lets thousands of participants interoperate. First-person identity brings that same model to digital identity, enabling not one
·windley.com·
Visa Isn't Centralized—and Neither Is First Person Identity
Your private data isn't as private as you think
Your private data isn't as private as you think
How law enforcement and private parties can access your information without your knowledge, and what you can do about it.
·werd.io·
Your private data isn't as private as you think
The Cost of a Data Breach
The Cost of a Data Breach
The latest data breaches are a regular topic in the news. Raising awareness about the prevalence and severity of the issue, as well as how the financial impact on the business can be limited is what we contribute with this article.
·private-ai.com·
The Cost of a Data Breach
Digital Threat Modeling Under Authoritarianism - Schneier on Security
Digital Threat Modeling Under Authoritarianism - Schneier on Security
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling. In security, threat modeling is the process of determining what security measures make sense in your particular situation. It’s a way to think about potential risks, possible defenses, and the costs of both. It’s how experts avoid being distracted by irrelevant risks or overburdened by undue costs...
·schneier.com·
Digital Threat Modeling Under Authoritarianism - Schneier on Security
Early Access to Dynamic Authorization
Early Access to Dynamic Authorization
The first six chapters of my new book, Dynamic Authorization: Adaptive Access Control, are now available in Manning’s Early Access Program. The book explores why authorization is still misunderstood, and how new tools like Cedar enable secure, flexible systems that also improve employee and customer experience.
·windley.com·
Early Access to Dynamic Authorization
The DNSSEC Illusion: 16 TLDs revealed the hidden fragility in DNSSEC ops
The DNSSEC Illusion: 16 TLDs revealed the hidden fragility in DNSSEC ops
For years, a European TLD ran their DNSSEC toolchain without incident. Everything “just worked.” Updates were rare, and no one touched the setup. Then their only DNSSEC expert left. What looked like stability turned out to be fragility. The system wasn’t resilient — it was dependent on one person’s
·blog.nlnetlabs.nl·
The DNSSEC Illusion: 16 TLDs revealed the hidden fragility in DNSSEC ops
Privacy Is Like Broccoli
Privacy Is Like Broccoli
Improving privacy can get overwhelming at first. It's important to move one step at a time, but remain persistent. Good privacy is like good health habits.
·privacyguides.org·
Privacy Is Like Broccoli
It's Time to Evolve Authentication Security
It's Time to Evolve Authentication Security
Keep applications secure with strong authentication security. Apply actionable steps and learn key takeaways to securing and building apps that elevate identity assurances.
·developer.okta.com·
It's Time to Evolve Authentication Security
Ambient age verification
Ambient age verification
Newgrounds, a gaming forum, has some clever ways for non-intrusively complying with the shambling disaster that is the "UK Online Safety Act". For years, I've been doing something similar to this when generating internal reports on DNA Lounge demographics: e.g., if someone bought a ticket for an 18+ event 5 years ago, they must be at least 23 years old now. Newgrounds: Here is our current ...
·jwz.org·
Ambient age verification
Whimsical elliptic curves in Zcash zero knowledge proofs
Whimsical elliptic curves in Zcash zero knowledge proofs
Several elliptic curves which Zcash uses in zero knowledge proofs are named after characters from Lewis Carroll: Jubjub, Bandersnatch, Tweddledee, Tweedledum
·johndcook.com·
Whimsical elliptic curves in Zcash zero knowledge proofs
Identity and behaviour
Identity and behaviour
In Object Oriented programming, identity and behaviour are often conflated. But it can be usefuk to think of them as different concepts.
·ismaelcelis.com·
Identity and behaviour
Encrypting Files with Passkeys and age
Encrypting Files with Passkeys and age
Encrypting files with passkeys, using the WebAuthn prf extension and the TypeScript age implementation.
·words.filippo.io·
Encrypting Files with Passkeys and age
Zero Knowledge Proofs Alone Are Not a Digital ID Solution to
Zero Knowledge Proofs Alone Are Not a Digital ID Solution to
In the past few years, governments across the world have rolled out digital identification options, and now there are efforts encouraging online companies to implement identity and age verification
·eff.org·
Zero Knowledge Proofs Alone Are Not a Digital ID Solution to
The “Bubble” of Risk: Improving Assessments for Offensive Cybersecurity Agents - CITP Blog
The “Bubble” of Risk: Improving Assessments for Offensive Cybersecurity Agents - CITP Blog
Authored by Boyi Wei Most frontier models today undergo some form of safety testing, including whether they can help adversaries launch costly cyberattacks. But many of these assessments overlook a critical factor: adversaries can adapt and modify models in ways that expand the risk far beyond the perceived safety profile that static evaluations capture.  At […]
·blog.citp.princeton.edu·
The “Bubble” of Risk: Improving Assessments for Offensive Cybersecurity Agents - CITP Blog