What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast
What the Hack? Podcast

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.

Data Security
Given all of the big-name data breaches that have occurred during the past few years, there’s a good chance your personal or payment information has been compromised. There’s also a chance you’ve been offered some type of identity protection, usually in the form of free credit monitoring, by the company that suffered the breach. But how much (and what type of)...
If you have an account on Facebook, you may have noticed posts featuring a nicely designed cloud comprised of the words that your Facebook friends use most often. It’s powered by an app from a company called Vonvon, and it’s been getting a lot of attention this week from consumer privacy experts. The reason this app has privacy hawks screeching...
In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60% over the previous year. There will be 10 billion IoT devices connected to the Internet this year. A couple of years ago, a survey found that three out of four Americans had no clue that there was such an...
In my forthcoming book, Swiped, partially excerpted below, I examine some of the enterprise level, cybersecurity best practices. These are the questions organizations need to ask themselves if they want to protect the data they are sitting on. Some of the considerations: Does the organization use a standards-based security architecture that is integrated into all technology processes? In plain language,...
Account takeover fraud — which occurs when a cybercriminal gains unauthorized access to an online account — is growing rapidly, a new analysis by a major Canadian cybersecurity company shows. Vancouver, British Columbia-based NuData Security, which predicts and prevents online fraud, analyzed more than 15.7 million login interactions from May through June and identified 882,340 as high risk or potential...
Lipstick on collar
The other cufflink fell on the Ashley Madison hack Tuesday. According to Wired, 9.7 gigabytes of Ashley Madison data were dumped on the dark web, and the collection appears to “include account details and log-ins for some 32 million users.” Where we go from here is anyone’s guess. According to the Wired article, the hackers left a note with the quarry...
ransomware
Some secrets are more valuable than others. And some secrets are more valuable TO others. In perhaps the most predictable extortion hack ever, cheating website Ashley Madison has confirmed to Brian Krebs that some of its data has been stolen. It now appears that tens of millions of people are at risk of being exposed. As you’ve already deduced, Ashley Madison users...
True or False? There was no way the Office of Personnel Management could have prevented hackers from stealing the sensitive personal information of 4.1 million federal employees, past and present. If you guessed “False,” you’d be wrong. If you guessed, “True,” you’d also be wrong. The correct response is: “Ask a different question.” Serious data breaches keep happening because there is...
Cyber thief
One of the most popular sessions at the RSA Conference was the Cryptographers’ Panel, during which some of the founding fathers of modern cryptography discussed trends in research and cybersecurity in general. This year the panel consisted of Ron Rivest, Adi Shamir, Whit Diffie and Ed Georgio (former chief codemaker and chief codebreaker at NSA). During the session Shamir referred to his three laws of computer security,...
For the first time, according to a recent study, criminal and state-sponsored hacks have surpassed human error as the leading cause of health care data breaches, and it could be costing the industry as much as $6 billion. With an average organization cost of $2.1 million per breach, the results of the study give rise to a question: How...