What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.

https
By and large, HTTPS—the encrypted form of delivering websites – has proven to be a very effective mechanism for assuring the legitimacy of websites,...
data breach
By Eva Velasquez, Identity Theft Resource Center CEO and President Do you?  Currently and depending on who is speaking, there are varying and frequently opposing...
Customers of Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor can take some steps to preserve and secure their personal information after...
VPN
Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true...
breach liability
The U.S. Securities and Exchange Commission recently toughened cybersecurity reporting guidelines for public companies, and days later Yahoo agreed to pay $80 million to settle a milestone class-action lawsuit brought by investors...
Airgap
Researchers at Ben-Gurion University of the Negev made a startling discovery that may change the way cybersecurity is handled in the future. One standard...
stegano
Unless you live in a pineapple under the sea with a talking sponge, you’re probably familiar with the never-ending parade of cute animal pictures...
Cloud attack
Scenarios about the strategic importance of knocking out a rival nation's critical infrastructure in the early phases of any all-out cyber war have been widely discussed. Now comes a report from...
The data breach archive site HaveIBeenPwned.com just added records from 2,844 data breaches, providing users with one of the most up-to-date resources to check...
Fitbit Global Spying
In this episode of “Stupid Things Organizations Do with Connected Devices,” we take a look at the U.S. Defense Department, which gave 2,500 Fitbit...