Juice Jacking: the LA DA’s office is warning about it, Snopes says it’s real, alright. But just what is juice jacking? And how real is the threat? Here’s all of the info you need about juice jacking and the threat it poses to you.
The same data uploads and downloads that make Teslas dream cars for some Tesla owners also may make them security hell for all Tesla drivers. That’s because Tesla vehicles are big, wheeled Internet of Things devices.
The largest data set of astronomical sky survey data in history has just been made available on the Internet, for free, and for anyone to access. The data, the second edition of data from the Panoramic Survey Telescope and Rapid Response System (Pan-STARRS), comprises over 1.6 petabytes of data.
Quora has just announced that it discovered a data breach on Friday, November 30th. Taking a move from the playbook of, apparently, nobody else, Quora did not wait weeks or months or even days to announce the breach – going from discovery to notifying their users in no more than 72 hours. Thank you for that, Quora!
Hot on the heels of California passing their California Consumer Protection Act (CCPA) which is actually a consumer data protection law, and on the slightly more distant heels of the passage and enactment of the General Data Protection Regulation (GDPR), Colorado has both passed and enacted the Colorado Consumer Data Protection Act (CCDPA).
Oh, the irony! Identity theft protection service LifeLock has exposed millions of their customers’ email addresses. And according to Krebs on Security, the exploitable vulnerability was so basic that it seems “that whoever put it together lacked a basic understanding of Web site authentication and security”!
Following the revelations in the past week that political data analysis outfit Cambridge Analytica somehow managed to harvest the private data of more than 50 million Facebook users, and without the users being alerted, there have been increasing calls for Facebook users to leave Facebook for more secure climes.
Last week we started hearing about the Equifax data breach, although Equifax had actually known about the data breach at least a month earlier. (The full text of the Equifax statement about the cybersecurity data breach is reprinted below.) The most stunning thing about this breach is the breadth of it: the Personally Identifiable Information (PII), including names, social security numbers, and driver’s license numbers of 143 million U.S. citizens were exposed in this breach. Here is what you need to do, right now, to protect yourself.
Yahoo today released a statement indicating that a data breach that occurred in 2014 may be the most massive breach yet. Moreover, Yahoo is claiming that they believe that the 2014 breach was “state-sponsored”.
Now here’s a novel idea: how about if your Internet service (ISP), telecom, or broadband provider had to get your permission before they could sell your information and data to third-parties? That’s just what FCC Chairman Tom Wheeler is proposing (full text of proposal below). What, you thought it was already that way? Think again, and the Internet, broadband and telecom providers are fighting it.
Experian, that keeper of your credit information and reputation, has been hacked, and the hackers got away with the personally identifiable information (PII) of 15 million T-Mobile customers and applicants.
As we told our readers last month, the ‘have an affair and cheat on your spouse’ website Ashley Madison was hacked, and information on their “37,765,000 anonymous users” was grabbed by the hackers, who call themselves The Impact Team. Now the Impact Team has dumped and revealed all of the data online, and many people are worrying “Is my email address in the Ashley Madison data?”
Last month the U.S. Justice department announced the takedown of the Darkode (get it? DarkCode – Dark Code?) international cybercrime ring, which the DOJ called one of the “gravest threats” to the security of online data. But what exactly does that mean to you, the average user sitting at home behind your computer?
With massive security data breaches happening more and more frequently, there is almost no way to avoid your own personal data being compromised. But what is the likelihood that your compromised data will actually be used for identity theft, fraud, or financial theft? Here’s how it breaks down.
Some are calling it Ubergate. Still others call it the reason they will no longer use the Uber service (fortunately there are alternatives to Uber, like Lyft in the U.S., and Hailo in the UK and Ireland). First there was Uber’s ‘Rides of Glory’ (i.e. rides of shame), then came the alleged threat of an “opposition research plan” against journalists to spend $1 million to dig up information on “your personal lives, your families.” And thus #Ubergate was born.