#data-breaches

[ follow ]
Engadget
1 day ago
Web design

Proton Mail's paid users will now get alerts if their info has been posted on the dark web

Proton Mail introduces Dark Web Monitoring for paid users to provide alerts on breaches and leaks, enhancing proactive security measures. [ more ]
Privacy professionals
eLearning Industry
4 days ago
Privacy professionals

Ensuring eLearning Security: Safeguarding Your Online Education Venture Against Cyber Threats

eLearning security is crucial due to rising cybercrime costs and the increasing reliance on technology in education. [ more ]
BuzzFeed
3 weeks ago
Privacy professionals

AT&T Says Millions Of Customers' Data Was Leaked Online - Here's How To Tell If You Were Affected

AT&T experienced similar breaches in the past without acknowledging them, leading to potential legal consequences.
Consumers can protect themselves by using strong passwords, enabling multifactor authentication, monitoring account activities, and setting up credit freezes and fraud alerts. [ more ]
TeachPrivacy
1 month ago
Privacy professionals

The Failure of Data Security Law

Data security laws have three types: breach notification, security safeguards, private litigation. Law fails to prevent breaches, focuses on breached organizations, and lacks preventative measures. [ more ]
Ars Technica
4 weeks ago
Privacy professionals

Mozilla's privacy service drops a provider with ties to people-search sites

The $240 billion data broker industry profits from selling private information.
Mozilla cut ties with a key provider of privacy protections, Onerep, due to conflicts of interest. [ more ]
ReadWrite
1 month ago
Privacy professionals

Pornhub says adios! to Texas

Pornhub blocked access in Texas due to age verification laws
Concerns about data breaches prompted Pornhub's decision to restrict access in certain U.S. states [ more ]
TechCrunch
1 month ago
Privacy professionals

How to verify a data breach | TechCrunch

Verification of data breaches is crucial for both companies and victims to take prompt action.
Authenticating data breaches involves utilizing various tools and techniques tailored to each unique breach. [ more ]
morePrivacy professionals
Harvard Business Review
6 days ago
Business intelligence

How to Stay Ahead of a Cybersecurity Breach with the Right Resilience Strategy - SPONSOR CONTENT FROM COMMVAULT

Cybercriminals are advancing their tactics, causing widespread ransomware attacks across organizations of all sizes. [ more ]
EU data protection
www.theguardian.com
1 month ago
EU data protection

Home Office immigration database errors hit more than 76,000 people

Database at Home Office has errors for over 76,000 migrants
Merged identities in the database lead to severe issues for individuals [ more ]
Iapp
2 months ago
EU data protection

Ransomware hackers were paid more than $1.1B in 2023

Ransomware groups received over $1.1 billion in payments in 2023 for selling back stolen data.
Hackers targeted high-profile institutions and critical infrastructure using zero-day vulnerabilities. [ more ]
Iapp
2 months ago
EU data protection

Ransomware groups face challenges after law enforcement's cybersecurity crackdowns

Law enforcement crackdown is making it harder for ransomware groups to carry out data breaches
Law enforcement efforts have decreased the number of infected computers and vulnerabilities [ more ]
London Business News | Londonlovesbusiness.com
3 months ago
EU data protection

Does your side hustle need insurance?

Having a side hustle may require you to have insurance.
Cybercrime and data breaches are common risks associated with running a side hustle. [ more ]
Dark Reading
4 months ago
EU data protection

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
moreEU data protection
Axios
1 month ago
Privacy professionals

Ransomware attacks aren't as sophisticated as you'd think

Cybercriminals are self-centered and egotistical.
Ransomware gangs are known to scam and betray each other. [ more ]
Databreaches
1 month ago
Privacy technologies

Fraudster's fake data breach claims should remind media to be careful what we report

Reports on alleged hacking incidents should be handled with caution without verification.
Hoaxes in data breaches can lead to reputation damage and financial costs for falsely accused organizations. [ more ]
Databreaches
1 month ago
Privacy technologies

School cyber incidents on Long Island: Reported cases rose sharply in 2023

Increase in cyber incidents in Long Island schools in 2023 compared to the previous year
Human error is a major cause of exposing sensitive student information [ more ]
www.bostonherald.com
1 month ago
Privacy professionals

Why health care has become a top target for cybercriminals

Healthcare organizations are increasingly targeted by cyberattacks due to the valuable patient data they hold.
Cybersecurity experts are concerned about the rising number of breaches in the healthcare sector causing disruptions and exposing sensitive information. [ more ]
Entrepreneur
1 month ago
Artificial intelligence

New Book Reveals Top 10 Dangers of AI Technology | Entrepreneur

AI presents threats like manipulation and misinformation
Job automation can lead to significant job losses and income inequality [ more ]
www.theguardian.com
2 months ago
Privacy professionals

Second accidental data leak in four months regrettable', Australian finance department says

Human errors are a significant cause of government data breaches.
Finance department mistakenly shared confidential information twice, leading to potential legal consequences. [ more ]
Databreaches
1 month ago
Law

True or false, Friday law enforcement edition

Law enforcement is making progress in disrupting ransomware groups.
Seizing onion sites and servers without arresting leaders may allow groups to reemerge. [ more ]
www.housingwire.com
1 month ago
Privacy professionals

Opinion: There is a crucial need for real estate cybersecurity

Real estate industry is vulnerable to cyber threats due to the abundance of sensitive data handled.
Choosing the right technology tools with robust cybersecurity features is crucial for protecting client information. [ more ]
www.nytimes.com
2 months ago
Tech industry

As China Expands Its Hacking Operations, a Vulnerability Emerges

Chinese hacking tools revealed through contractors and independent companies
FBI Director highlights the vast scale of Chinese hacking operations [ more ]
Harvard Business Review
2 months ago
Privacy professionals

Why Data Breaches Spiked in 2023

Data breaches continue to increase yearly, with a 20% rise from 2022 to 2023.
Primary reasons for increased data theft: cloud misconfiguration, new ransomware attacks, vendor system exploitation. [ more ]
www.cbc.ca
2 months ago
Digital life

Thieves stole $1,000 in Optimum points from this woman. Here's how to safeguard your points | CBC Radio

Fraudsters target loyalty points with real cash value.
Growing issue with account compromise and theft in loyalty points programs. [ more ]
TNW | Data-Security
4 months ago
Digital life

Can you 'deGoogle' a phone? Murena tried - and added a kill switch

Murena is a phonemaker that claims to have the ultimate pro-privacy smartphone with features like a physical kill switch and an anti-tracking operating system.
Multiple scandals involving government agencies and tech companies mishandling user data highlight the need for privacy-focused smartphones like the Murena 2.
The proliferation of surveillance and the potential misuse of personal data by big tech pose significant threats to average consumers. [ more ]
Acm
1 year ago
Digital life

NSA Says: Do These Things to Keep Your Home Network Cafe from Cyberattack

Remote working brings benefits for employees, but by working from outside the company's internal network, there's also the added threat that employees are left more vulnerable to cyberattacks.And if hackers can compromise a remote employee by stealing their corporate username and password, or infecting their computer with malware, it could become a costly network security risk for the entire organization.
Medium
2 months ago
Privacy professionals

Frontend Application Security: Tips and Tricks

Data breaches are becoming more common, with the average cost reaching $4.45 million.
Frontend application security is crucial for businesses to protect against modern-day attackers. [ more ]
TechRepublic
11 months ago
Information security

IBM snags Polar Security to boost cloud data practice

IBM acquired the Israeli firm founded in 2021 to grow its relevance in the nascent realm of data security posture management, or DSPM.In an effort to grow its hybrid cloud and artificial intelligence capabilities, IBM announced on Tuesday that it was acquiring Polar Security, an Israel-based company specializing in data security posture management.
Amazic
11 months ago
Privacy professionals

8 common security risks associated with cloud-based DevOps and how to mitigate them - Amazic

Cloud-based DevOps has become a popular approach to software development in today's technology-driven world, enabling organizations to build and deploy software faster and more efficiently.However, this new approach also brings a range of security risks that must be considered.Having robust security measures in place is essential when using cloud computing services to facilitate software application development, testing, and deployment.
ITPro
11 months ago
Information security

Microsoft links PaperCut server attacks to Cl0p, LockBit ransomware

Researchers have linked leading ransomware groups Cl0p and LockBit to the ongoing exploitation of critical-rated vulnerabilities in print management software from PaperCut.The vulnerabilities, CVE-2023-27350 and CVE-2023-27351, have a near maximum 9.8 severity score and have enabled remote code execution on vulnerable PaperCut servers since at least January 2023.
ComputerWeekly.com
1 year ago
Privacy professionals

Security Think Tank: As cyber pros, we need to articulate our needs better | TechTarget

We are coming to the end of the year, Black Friday has been and gone and the shops are full of Christmas offers.And the scammers, of course, are having a field day sending emails offering enticing deals, often with pictures of the items on offer and links to online shops.Many of those emails will carry malicious content or the links will connect to websites delivering a malicious payload.
DevOps.com
1 year ago
Privacy professionals

Implementing Shift Left Security in the Cloud

By: Arick Goomanovsky  on  
While ransomware has been the leading concern for enterprise security teams over the few past years, software vulnerabilities are nipping at its heels.The boom in cloud-based apps and services and increased digitization of work have been a boon for hackers, who are taking advantage of developers' and DevOps teams' attempts to work faster and smarter to keep up with demand.
App Developer Magazine
2 months ago
Software development

Illiterate coders endanger your personal data says Geonode| App Developer Magazine

72% of coders are illiterate in comprehending the codes they generate
Mechanized coding factories create openings for cyberattacks [ more ]
Coding Dojo Blog
1 year ago
Software development

Is Cybersecurity a Good Career? - Coding Dojo Blog

When you're ready to start or change careers, it's important to consider your priorities.What is most important to you in a job - Salary?Work-life balance?Job stability?And the most important question of all: Is this even a good career to get into?You might be wondering about all of these aspects and more if you're starting down a cybersecurity career path.
Medium
2 months ago
Privacy professionals

How Data Security Posture Management Protects Against Data Breaches

The number of annual data breaches continues to rise
Data breaches cause major financial and reputational damage [ more ]
BleepingComputer
2 months ago
Privacy professionals

Data breaches at Viamedis and Almerys impact 33 million in France

Over 33 million people in France have been impacted by data breaches at healthcare payment service providers Viamedis and Almerys.
The breaches exposed sensitive data such as names, dates of birth, insurer details, social security numbers, marital status, civil status, and guarantees open to third-party payment. [ more ]
Entrepreneur
2 months ago
Privacy professionals

3 Reasons to Increase Your Cybersecurity Protocols in 2024 | Entrepreneur

Cybersecurity is a major challenge for businesses
The average cost of a cyber attack for a business is $13 million [ more ]
Ars Technica
2 months ago
Privacy professionals

Mozilla targets scummy data brokers with Monitor Plus removal service

Mozilla has launched an alternative to people-search websites called Mozilla Monitor Plus which automatically monitors and removes personal information from data broker sites and known data breaches.
The Plus version of Mozilla Monitor costs $14 per month or $108 per year, and offers a faster removal process compared to the free version.
Data brokers gather information from online traces left by account sign-ups, advertising, web browsing, and other activities, and sell it to customers like the NSA and FBI. [ more ]
Data Breach Insights - Be Aware & Stay Secure
2 months ago
Privacy professionals

Largest Data Breaches in The World [Updated 2024] - Data Breach Insights Data Breach Insights

The top 100 largest data breaches are analyzed to provide key insights and lessons from major cybersecurity incidents.
The breaches involve a wide range of industries, with the healthcare sector being the most targeted. [ more ]
Above the Law
2 months ago
Privacy professionals

Great Law Firm Cybersecurity Without Breaking The Bank

Law firms need to prioritize cybersecurity to protect client data.
Multi-factor authentication (MFA) is a highly effective and low-cost solution for enhancing cybersecurity. [ more ]
ComputerWeekly.com
2 months ago
Privacy professionals

Security Think Tank: What to expect in cyber this year | Computer Weekly

2023 saw increased investment in generative AI (genAI) which will continue in 2024 as businesses embrace rapid experimentation and launch new genAI initiatives.
Organizations need to carefully balance the speed of innovation with governance and accountability in implementing AI-based technologies to mitigate security and privacy risks. [ more ]
WIRED
3 months ago
Privacy professionals

Your Medical Data Is Code Blue

Medical data companies do not do enough to protect patient information.
Patients are the ones who suffer when medical data is hacked and stolen. [ more ]
Databreaches
4 months ago
Privacy professionals

New leak site reveals yet two more U.S. medical sector victims

A new leak site called 'DragonForce' has appeared on the dark web, listing data breaches from previous attacks.
Two medical sector victims, Heart of Texas Behavioral Health Network and Greater Cincinnati Behavioral Health Services, were identified on the site. [ more ]
Databreaches
4 months ago
Privacy professionals

Apple report finds steep increase in data breaches, ransomware

Data breaches and ransomware attacks are increasing, with 2.6 billion personal records exposed in the past two years.
Apple is calling for greater use of encryption to combat these intrusions. [ more ]
Databreaches
4 months ago
Privacy professionals

Why we need legislation requiring more transparency in breach notices, Saturday edition (Bluefield University)

Legislation requiring more transparency in disclosures is needed to address cyberattacks and data breaches.
Bluefield University has experienced a cyberattack and data breach, with leaked data being published by a threat actor. [ more ]
TNW | Data-Security
4 months ago
Privacy professionals

Can you 'deGoogle' a phone? Murena tried - and added a kill switch

Murena is a phonemaker that claims to have the ultimate pro-privacy smartphone with features like a physical kill switch and an anti-tracking operating system.
Multiple scandals involving government agencies and tech companies mishandling user data highlight the need for privacy-focused smartphones like the Murena 2.
The proliferation of surveillance and the potential misuse of personal data by big tech pose significant threats to average consumers. [ more ]
TNW | Data-Security
4 months ago
Privacy professionals

Can you 'deGoogle' a phone? Murena tried - and added a kill switch

Murena is a phonemaker that claims to have the ultimate pro-privacy smartphone with features like a physical kill switch and an anti-tracking operating system.
Multiple scandals involving government agencies and tech companies mishandling user data highlight the need for privacy-focused smartphones like the Murena 2.
The proliferation of surveillance and the potential misuse of personal data by big tech pose significant threats to average consumers. [ more ]
Dark Reading
4 months ago
Privacy professionals

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
Dark Reading
4 months ago
Privacy professionals

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
Dark Reading
4 months ago
Privacy professionals

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
Dark Reading
4 months ago
Information security

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Strict data privacy regulations have not been able to fully safeguard consumer data and prevent data breaches.
Data de-identification is a key safeguard measure in privacy laws, but it has weaknesses and challenges in the digital world. [ more ]
Dark Reading
5 months ago
Information security

IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats

Generative AI is viewed as a growing cybersecurity threat by many organizations.
Data breaches and identity-based threats are also top concerns.
Organizations are focused on developing policies and training employees to mitigate cybersecurity risks. [ more ]
Dark Reading
5 months ago
Information security

IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats

Generative AI is viewed as a growing cybersecurity threat by many organizations.
Data breaches and identity-based threats are also top concerns.
Organizations are focused on developing policies and training employees to mitigate cybersecurity risks. [ more ]
The Verge
1 year ago
Information security

1Password is trying for zero passwords

1Password is announcing today that, one day soon, it will support the option to create and unlock 1Password accounts using biometric-based passkey technology, ditching the feature that is the name of its entire product."For passkeys to be the way forward, it's not enough for them to replace some of your passwords," said 1Password chief product officer Steve Won.
TechRepublic
1 year ago
Information security

Password management policy

Password-driven security may not be the perfect solution, but the alternatives haven't gained much traction.This policy defines best practices that will make password protection as strong and manageable as possible.From the policy:
Employee passwords are the first line of defense in securing the organization from inappropriate or malicious access to data and services.
CNET
4 months ago
Privacy professionals

AI Assistants Need to Know a Lot About You to Work Best. Is That OK?

The new wave of digital assistants are more advanced and can perform a wide range of tasks thanks to generative AI.
Despite their capabilities, these high-tech digital assistants require trust in Big Tech, which has been shaken by data breaches and privacy concerns.
The new AI tools connect different types of personal data, raising fresh privacy concerns. [ more ]
CNET
4 months ago
Privacy professionals

AI Assistants Need to Know a Lot About You to Work Best. Is That OK?

The new wave of digital assistants are more advanced and can perform a wide range of tasks thanks to generative AI.
Despite their capabilities, these high-tech digital assistants require trust in Big Tech, which has been shaken by data breaches and privacy concerns.
The new AI tools connect different types of personal data, raising fresh privacy concerns. [ more ]
www.nytimes.com
5 months ago
Privacy professionals

Opinion | What Google's Multibillion Payment to Apple Says About Privacy and Power in Tech

Lawyers gave money to a Supreme Court aide for a Christmas party through Venmo, sparking privacy concerns.
Companies like Venmo and Amazon often place the burden of privacy protection on users.
Opting out of public disclosures on platforms like Venmo may not fully guarantee privacy. [ more ]
TechRepublic
5 months ago
Privacy professionals

How Do Password Managers Work and Why Do You Need One?

Creating unique passwords for online accounts is crucial for preventing data breaches.
Password managers are tools that can generate and store secure passwords to enhance security. [ more ]
TechRepublic
5 months ago
Privacy professionals

How Do Password Managers Work and Why Do You Need One?

Creating unique passwords for online accounts is crucial for preventing data breaches.
Password managers are tools that can generate and store secure passwords to enhance security. [ more ]
London Business News | Londonlovesbusiness.com
5 months ago
Privacy professionals

Guarding against human error: The unseen weakness in cyber security

Human error is responsible for 95% of all cyber security breaches.
There are two types of human error in cyber security: decision-based errors and skill-based errors.
Misdelivery is a common cause of data breaches and refers to the act of sending sensitive information to the wrong recipient. [ more ]
London Business News | Londonlovesbusiness.com
5 months ago
Privacy professionals

Guarding against human error: The unseen weakness in cyber security

Human error is responsible for 95% of all cyber security breaches.
There are two types of human error in cyber security: decision-based errors and skill-based errors.
Misdelivery is a common cause of data breaches and refers to the act of sending sensitive information to the wrong recipient. [ more ]
Exchangewire
10 months ago
Marketing tech

Google Ad Tech May Break Up; Apple Threaten to Ban Damus Over Bitcoin Tipping

In today's ExchangeWire new's digest: Google may be forced to sell off part of its ad tech business; Apple threatens to remove Damus from the App Store over Bitcoin tipping; and a study finds that the majority of APAC consumers prefer dealing with companies who collect their data directly.Google may have to break up ad business
Google may have to sell part of its ad tech business after the EU Commission ruled that it had engaged in anti-competitive practices.
ComputerWeekly.com
1 year ago
Privacy professionals

NHS Highland rapped over data breach affecting HIV patients | Computer Weekly

The Information Commissioner's Office (ICO) has issued a reprimand to NHS Highland over a "serious breach of trust" after the health service inadvertently exposed personal details of patients likely to be accessing HIV services.The incident unfolded when someone at the organisation emailed 37 individuals likely to be accessing HIV services, inadvertently copying their email addresses into the carbon copy (CC) field rather than the blind carbon copy (BCC) field.
Theregister
1 year ago
Privacy professionals

Acer confirms someone broke into one of its servers

Acer has confirmed someone broke into one of its servers after a miscreant put up for sale a 160GB database of what's claimed to be the Taiwanese PC maker's confidential information."We have recently detected an incident of unauthorized access to one of our document servers for repair technicians," an Acer spokesperson told The Register on Tuesday.
Theregister
1 year ago
Privacy professionals

37m T-Mobile US customers hit in yet another privacy breach

T-Mobile US today said someone abused an API to download the personal information of 37 million subscribers.A regulatory filing [PDF] disclosed one or more miscreants were able to access potentially the "name, billing address, email, phone number, date of birth, T-Mobile account number and information such as the number of lines on the account and plan features" of each affected customer.
www.verifythis.com
1 year ago
Privacy professionals

Your credit score won't automatically take a hit after a data breach

Millions of Americans have had their personal information compromised this year in various data breaches.One VERIFY reader told us a family member's credit score dropped after they were notified that their information was compromised in a data breach.The reader wondered if there is a connection.If a company has a data breach and I'm on the list of possibly compromised customers, will my credit score drop just based on that?
www.aljazeera.com
1 year ago
Privacy professionals

Australian police blame Russian hackers for medical records leak

Hackers have demanded $10m to stop releasing sensitive medical information on dark web.Australian authorities have blamed Russia-based hackers for a cyberattack that exposed the personal information of private health insurance customers, including details of abortions and treatments for addiction and HIV.
SecurityWeek
11 months ago
Artificial intelligence

France Punishes Clearview AI For Failing To Pay Fine

France's privacy watchdog doled out further penalties to US firm Clearview AI Wednesday for failing to pay a 20-million-euro fine imposed last year over data breaches.The company collects images of faces from the internet without seeking permission and sells access to a trove of billions of pictures to clients, including law enforcement agencies.
Amazic
1 year ago
Privacy professionals

This is why you want to apply for a position in cyber security - Amazic

Are you looking for an exciting and challenging career that is in high demand?Look no further than cyber security.With the increasing frequency of cyber attacks and data breaches, companies and organizations are in desperate need of skilled cyber security professionals to protect their networks and data.
www.nytimes.com
1 year ago
Tech industry

Alexa, Why Do We Keep Buying You?'

When Amazon released Alexa in 2014, the company had big dreams for the technology.The voice assistant, the company suggested, could succeed smartphones as the next essential consumer interface.Alexa, which was embedded in Amazon's voice-activated Echo smart speakers, soon became one of the most popular voice assistants, alongside Apple's Siri and Google's Assistant.
www.aljazeera.com
1 year ago
Privacy professionals

Australia bets on facial recognition for problem gamblers

Critics say burgeoning technology is invasive, dangerous and undermines basic rights.As guests arrive at eastern Australia's Warilla Hotel, a small camera equipped with facial recognition software scans their faces as part of a scheme to tackle problem gambling.The tech  which uses artificial intelligence (AI) to identify addicts who have asked to be barred from betting sites  is set to be rolled out across gambling venues in the state of New South Wales next year.
Amazic
11 months ago
DevOps

Mirantis Releases New Version of Openstack for Kubernetes with Improvements in Security and User Experience - Amazic

Mirantis, cloud-native infrastructure expert, just announced the release of the latest version of their virtualized Infrastructure-as-a-Service offering, Mirantis OpenStack for Kubernetes (MOSK), with improved OpenStack security and enhanced user experience.OpenStack, the world's foremost open-source, private cloud IaaS framework, offers a feature-rich environment for hosting virtual machines, networks, and storage.
New Relic
11 months ago
DevOps

Obfuscate Logs using Fluent Bit in New Relic

If you need to protect sensitive information and follow data privacy regulations, it's critical to obfuscate your log data, which means obscuring personally identifiable information (PII).But effectively concealing PII in logs might take time to implement, can increase compute resources, and might not work well with all types of logs.
Amazic
1 year ago
DevOps

What does a Kubernetes security strategy involve? - Amazic

According to CNCF's annual survey, 96% of organizations are using or evaluating Kubernetes, while 93% are using or planning to use containers in production already.Kubernetes is a robust platform that can orchestrate containers at scale.However, security is critical when using Kubernetes, and companies need strict guidelines and strategies to ensure system safety.
Ars Technica
11 months ago
Privacy professionals

T-Mobile discloses 2nd data breach of 2023, this one leaking account PINs and more

T-Mobile on Monday said it experienced a hack that exposed account PINs and other customer data in the company's second network intrusion this year and the ninth since 2018.The intrusion, which started on February 24 and lasted until March 30, affected 836 customers, according to a notification on the website of Maine Attorney General Aaron Frey.
HousingWire
11 months ago
Real estate

Mortgage fintech Maxwell launches SSO tool for lenders

Maxwell, the mortgage fintech backed by Wells Fargo and Fin Capital, has launched Maxwell Single-Sign On, an SSO (single sign-on) tool for lenders to enhance security and reduce the risk of data breaches, the company announced on Monday.The tool is designed to address the issue of sensitive data being handled by lenders and loan officers on a daily basis, including social security numbers, paystubs, and tax returns.
Engadget
1 year ago
Privacy professionals

FBI says it has 'contained' a cybersecurity incident on its network | Engadget

STR/NurPhoto via Getty Images
The FBI is dealing with another attack on its digital infrastructure, although the severity isn't yet clear.The law enforcement agency tells CNN it has "contained" a recent cybersecurity incident on its network.The bureau isn't commenting on the perpetrator, scope or damage, but says it's gathering "additional information."
Electronic Frontier Foundation
1 year ago
Privacy professionals

Age Verification Mandates Would Undermine Anonymity Online

Age verification systems are surveillance systems.Mandatory age verification, and with it, mandatory identity verification, is the wrong approach to protecting young people online.It would force websites to require visitors to prove their age by submitting information such as government-issued identification.
Theregister
1 year ago
Privacy professionals

FBI and international cops catch a NetWire RAT

International law enforcement agencies have claimed another victory over cyber criminals, after seizing the website, and taking down the infrastructure operated by crims linked to the NetWire remote access trojan (RAT).Police in Croatia on Tuesday arrested a suspect who allegedly administered the worldwiredlabs website, which has sold the NetWire malware for several years.
www.cbc.ca
1 year ago
Canada news

Ransomware attack stole some employee data, Indigo says | CBC News

A ransomware attack compromised the data of current and former employees at Canada's biggest bookstore chain, Indigo Books & Music Inc. says.In a statement on its website, Indigo said the breach on Feb. 8 left no indication that personal customer information, such as credit card numbers, had been accessed, but that "some employee data was."
The Verge
1 year ago
Privacy professionals

Hackers stole encrypted LastPass password vaults, and we're just now hearing about it

/
Last month, the company announced that threat actors had accessed "certain elements" of customer info.Just as many US workers are leaving for a holiday break, the company reveals that meant their encrypted passwords.LastPass has a doozy of an updated announcement about a recent data breach: the company - which promises to keep all your passwords in one, secure place - is now saying that hackers were able to "copy a backup of customer vault data," meaning they theoretically now have access to all those passwords if they can crack the stolen vaults ( via TechCrunch).
LogRocket Blog
1 year ago
Business intelligence

What is data democratization and why does it matter? - LogRocket Blog

Data is becoming increasingly important for modern businesses.As it becomes more accessible, using data to drive business decisions is no longer a good case practice - it's a new norm.If you don't use data to inform your strategy, you'll be quickly outcompeted by others who do.The ever-increasing importance of data in driving product outcomes led to the birth of new data approaches.
Independent
1 year ago
Privacy professionals

Apple says most iCloud data can now be end-to-end encrypted

Apple has said it will now offer full end-to-encryption for nearly all the data its users store in its global cloud-based storage system, which will make it more difficult for hackers, spies and law enforcement agencies to access sensitive user information.he world's most valuable company has long placed customer security and privacy at a premium.
Bronx Times
1 year ago
Public health

Montefiore nurses are fighting to keep a maternal health program open in a borough where maternal health outcomes are grim - Bronx Times

One of the cries for Montefiore employees rallying against the hospital administrators in recent years is "profits over patients," the notion that recent decisions by management to cut programs and underpay and overwork its nurses and hospital staff are indicative of a corporation, and not a health care provider.
www.france24.com
1 year ago
Marketing

Top EU bodies ban TikTok on staff phones citing security concerns

The TikTok app is shown on the screen of a smartphone.FRANCE 24 screenshot The European Union's two biggest policy-making institutions have banned TikTok from staff phones for cybersecurity reasons, marking growing concerns about the Chinese short video-sharing app and its users' data.TikTok, which is owned by Chinese firm ByteDance, is under scrutiny from governments and regulators because of concerns that China's government could use its app to harvest users' data or advance its interests.
Independent
1 year ago
Privacy professionals

Gardai and Fastway among those reprimanded by watchdog for data breaches in 2022

An Garda Siochana and the Fastway delivery firm are among the organisations that were reprimanded over data breaches, according to a watchdog's annual report.ardai reported a breach to the Data Protection Commission (DPC) involving the names and addresses of 108 individuals, some of whom were children, processed at Kilmainham Garda Station.
Futurism
1 year ago
Privacy professionals

Insurance Company Refuses to Pay Ransom, So Hackers Start Releasing Health Records of Up To 10 Million People

Breaching Whales
Hackers plundered the health records of millions of customers from Australian health insurance provider Medibank, then dumped them on the dark web after Medibank refused to pay the demanded ransom.The hack first came to light in October, when it was unclear how much the hackers demanded in ransom money or how much data had been compromised.
The Verge
1 year ago
Privacy professionals

The FTC isn't happy about Chegg's data breaches

The Federal Trade Commission filed a complaint on Monday against education technology provider Chegg, which has experienced four data breaches since 2017 ( via The New York Times).In one 2018 incident, a former Chegg contractor gained access to one of its third-party cloud databases, exposing personal information such as names, email addresses, and passwords in addition to students' religion, sexual orientation, disabilities, and parents' income.
Engadget
1 year ago
Privacy professionals

FTC says ed tech company Chegg exposed data of 40 million users | Engadget

Leah Klafczynski/Akron Beacon Journal/Tribune News Service via Getty Images  You may trust Chegg with your textbooks or tutoring, but regulators aren't quite so confident.The Federal Trade Commission has filed a complaint accusing education tech provider Chegg of "careless" security practices that compromised personal data since 2017.
www.dw.com
1 year ago
Privacy professionals

T-Mobile: 37 million US customers' data breached DW 01/20/2023

TechnologyUnited States of America 01/20/2023January 20, 2023 Less than a year after settling a data leak lawsuit was settled for $350 million, T-Mobile has reported that details of 37 million customers were hacked.The Telecom company T-Mobile revealed on Thursday that the data of 37 million customers was hacked in November 2022.
Theregister
1 year ago
Privacy professionals

India partners with private firm to monetize railway Wi-Fi

An announcement from Indian government-owned telecom company, RailTel, detailing efforts to monetize existing free railway Wi-Fi in partnership with a private company has drawn criticism that it will lead to data collection, breaches, unwanted ads and more.The five-year agreement with a consortium led by IT company 3i Infotech covers over 6,100 railway stations across India.
Theregister
1 year ago
Privacy professionals

Uber falls victim to supply chain attack, staff left exposed

Ride-sharing giant Uber, which saw an ex-executive convicted in October for covering up one data loss years ago and got hit with another one in September, is now dealing with the fallout from more information being stolen, this time through one of its vendors.A cybercriminal calling themselves "UberLeaks" over the weekend leaked data on BreachForums, a site that popped up in April after another site, RaidForums, was shut down.
Futurism
1 year ago
Privacy professionals

The FBI Says Apple's New Encryption Is "Deeply Concerning"

Wall to Wall
Apple is planning on broadening its end-to-end data encryption services, closing a privacy loophole that previously allowed law enforcement to access a wide-reaching swath of data, including photos and messages, stored in user iCloud accounts.But while proponents of the change are applauding the change as a win for user privacy, its detractors - which include a little organization known as the FBI - are none too thrilled.
InfoWorld
1 year ago
Node JS

GitHub bolsters NPM access control

Looking to improve the safety and security of NPM JavaScript packages, GitHub is adding granular access tokens to enable fine-grained permissions for NPM accounts, and making its NPM code explorer capability free to users.GitHub on December 6 explained that stolen credentials are a main cause of data breaches.
The Verge
1 year ago
Privacy professionals

Meta fined $276 million over Facebook data leak involving more than 533 million users

Ireland's Data Protection Commission hit Meta with a €265 million fine (about $276 million USD) after an April 2021 data leak exposed the information of more than 533 million users.The DPC started the investigation shortly after news of the leak broke and involved an examination into whether Facebook complied with Europe's General Data Protection Regulation (GDPR) laws.
The Daily Dot
1 year ago
Remote teams

'It's not about efficiency, it's about control': Worker says there's no point to hybrid work, sparking debate

A TikTok user has sparked widespread debate after criticizing businesses that force remote workers to show up in person multiple times per week.In a self-described rant, Deran Christian, who works with brands to create user-generated content, argues that being required to regularly work from his employer's office provides no actual benefit.
Exchangewire
1 year ago
Marketing tech

Musk Meme Sees Dogecoin Soar by USD$2bn; Shein to Open Physical Shop in Japan

In today's ExchangeWire news digest: a meme tweeted by Elon Musk sees Dogecoin's value soar by USD$2bn (~£1.7bn);Chinese retail giant Shein is set to open a physical shop in Japan; and the FTC orders edtech giant Chegg to inform users of data breaches.Musk tweet takes Dogecoin to six-month high
One of the world's largest cryptocurrencies, Dogecoin, skyrocketed in value on Tuesday (1st  November) after a tweet from Elon Musk .
ComputerWeekly.com
1 year ago
Privacy professionals

Security Think Tank: Know your networks, know your suppliers

Ransomware changes rapidly.At a technical level, attack infrastructure can change by the minute, operationally changing attack techniques while strategically targeting certain sectors, industries or regions at appropriate times.Access brokers work across multiple groups, operators switch botnets, and malware developers continuously refine their techniques.
[ Load more ]