Over the years, we've written about this paradox of cryptocurrency, that it's semi-anonymous and inherently transparent. This is a story @strwbilly penned in 2018. #CyberSecureMIT technologyreview.com/2018/04/19/301…
We've also written about @chainalysis's reports that followed the crypto-breadcrumbs of the WannaCry heist. #CyberSecureMIT #TechReviewEvents technologyreview.com/2020/01/24/276…
Unlike, say, the US dollar or the Chinese Yuan, we can also see how much criminal activity is associated with cryptocurrencies. A lot of that in 2019 was driven by scams, as we wrote about then. #CyberSecureMIT #TechReviewEvents technologyreview.com/2020/01/30/275…
.@KimberlyGrauer says @chainalysis's forthcoming crime report for 2020 found that this illicit crypto-activity has decreased since 2019. #CyberSecureMIT #TechReviewEvents
The cryptocurrency paradox explained! Thanks @KimberlyGrauer! #CyberSecureMIT #TechReviewEvents

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with MIT Technology Review

MIT Technology Review Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @techreview

4 Dec
That not only means that countries face a huge logistical challenge to distribute them—which is complicated by the fact the two most promising vaccines require ultra-cold temperatures—but they also have to grapple with hard choices over who gets them first.
Here’s how the US, China, the UK, and other countries are planning to distribute covid-19 vaccines to their populations. technologyreview.com/2020/12/04/101…
Read 29 tweets
3 Dec
For the last session of #CyberSecureMIT, we’re speaking with @JamilFarshchi, Equifax’s CISO who was brought on after its data was breached in 2017. The Equifax hack was one of the biggest thefts of sensitive personal information of all time. technologyreview.com/2020/02/10/349…
“In the security industry today, we don’t have enough data to measure risk," says Farshchi. Most organizations have a dataset of one, which is their company. #CyberSecureMIT
To build a cyber-resilient organization, he says he asks:

-What are the predominant threat factors for any organization?
-What are the core controls that help you to be able to defend and minimize a particular threat?

#CyberSecureMIT #TechReviewEvents
Read 9 tweets
3 Dec
“It’s not too early to start thinking about a counter-strategy to the dilemmas we have” - Nazli Choucri of @MITPoliSci
#CyberSecureMIT #TechReviewEvents ImageImage
Bilateral agreements and global accords can be the beginnings of an international counter-strategy to cyberattacks, says Choucri. #CyberSecureMIT #TechReviewEvents Image
Read 4 tweets
3 Dec
"We’ve seen a 400% increase from 2018 to 2020 in the number of ransomware incidences we have responded to," says @JohnHultquist of @FireEye . "It’s clearly overshadowing other threats right now." Image
Why? Money.

"Money is just flooding in to these actors," says @JohnHultquist. "It’s clearly very profitable."

In one incident, a ransomware attacker demanded $36 million. From March 2019 to March 2020, another actor increased their ransomware demands 180%. #CyberSecureMIT
Both @JohnHultquist and @HalvorMolland agree that serious government policy responses are needed. Otherwise, ransomware will continue to rise. #CyberSecureMIT #TechReviewEvents
Read 5 tweets
3 Dec
You may remember the @NorskHydroASA ransomware attack on March 19, 2019. On that day, one of the world’s largest producers of aluminum had a unique response strategy to the attack: pay no ransom and admit the breach. #CyberSecureMIT #TechReviewEvents technologyreview.com/2019/03/19/136…
At #CyberSecureMIT, we’re speaking with the company’s senior vice president, @HalvorMolland, about this response strategy, which resulted in unprecedented transparency and a distributed workstream that included forensics, communication management, and rebuilding.
.@NorskHydroASA's decision to shut down its information-systems infrastructure happened at a relatively low level, says @HalvorMolland. It was “based on risk analysis and training we had in the past. This was the right decision to take.” #CyberSecureMIT #TechReviewEvents
Read 9 tweets
2 Dec
Mobile phishing is a topic @HowellONeill has written about quite a bit in the last year. #CyberSecureMIT #TechReviewEvents
You might remember Twitter's massive security breach in July. The company eventually confirmed that this hack was caused by a mobile phishing attack. #CyberSecureMIT #TechReviewEvents technologyreview.com/2020/07/15/100…
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!