What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.

https
By and large, HTTPS—the encrypted form of delivering websites – has proven to be a very effective mechanism for assuring the legitimacy of websites, while also protecting the privacy of website visitors. Many of the largest, best known companies have embraced HTTPS. And yet the vast majority of websites still use the much less secure HTTP protocol. That’s about to...
data breach
By Eva Velasquez, Identity Theft Resource Center CEO and President Do you?  Currently and depending on who is speaking, there are varying and frequently opposing answers – even among experts – leaving consumers grasping for a better understanding of what it means for them.  This is a significant problem that creates some serious issues that need to be addressed as...
Customers of Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor can take some steps to preserve and secure their personal information after Hudson’s Bay, the Canadian corporation that owns these retailers, revealed on Sunday that cybercriminals had stolen the credit and debt card information of five million customers.
VPN
Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true online privacy has never seemed more remote. The use of a VPN (Virtual Private Network) has long been viewed as a silver bullet. Historically, VPNs have been used by dissidents trying to avoid persecution from...
breach liability
The U.S. Securities and Exchange Commission recently toughened cybersecurity reporting guidelines for public companies, and days later Yahoo agreed to pay $80 million to settle a milestone class-action lawsuit brought by investors who claimed the company misled them about their cybersecurity practices. This will set public companies into scramble mode as general counsels try to discern risk in an area where they lack expertise. The knowledge gap when it comes...
Airgap
Researchers at Ben-Gurion University of the Negev made a startling discovery that may change the way cybersecurity is handled in the future. One standard precaution to safeguard data is to store it on an air-gapped device. That’s IT-speak for a machine that is never connected to the Internet or any other machine or network that’s connected to it. The same...
stegano
Unless you live in a pineapple under the sea with a talking sponge, you’re probably familiar with the never-ending parade of cute animal pictures sent by text and email—friend to friend, email list to subscriber—and everywhere you look on social media. Hackers are counting on that. You’re no fool. You keep current on the news—specifically with regard to cyber security. You’ve...
Cloud attack
Scenarios about the strategic importance of knocking out a rival nation's critical infrastructure in the early phases of any all-out cyber war have been widely discussed. Now comes a report from insurance underwriting giant Lloyd's of London and risk modeling consultancy Air Worldwide that introduces some fresh granularity to what some call cybergeddon. The upshot is that Amazon Web Services, Google Cloud and Microsoft Azure may need to...
The data breach archive site HaveIBeenPwned.com just added records from 2,844 data breaches, providing users with one of the most up-to-date resources to check the security of their accounts. The site, operated and updated by Troy Hunt, allows visitors to enter either an email address or a login name check if there information has been compromised in any of...
Fitbit Global Spying
In this episode of “Stupid Things Organizations Do with Connected Devices,” we take a look at the U.S. Defense Department, which gave 2,500 Fitbit personal trackers to military personnel in 2013 to fight obesity. Fast-forward to 2018, and The Global Heat Map published by Strava Labs. According to the Washington Post report, the project “uses satellite information to map the...