-
PII May Have Been Stolen in Virginia County Ransomware Attack
PRIVACY PRIVACY A W-2 form was reportedly published on a dark web forum with stolen, sensitive data Read More
-
US Census Bureau Head Fends Off Critics of ‘Differential Privacy’ Tool
PRIVACY PRIVACY Santos defended differential privacy against prominent researchers Read More
-
Ransomware attackers allegedly demand ransom from AIIMS: police deny report
PRIVACY PRIVACY A hacker has allegedly demanded Rs 200 crore in cryptocurrency from the All India Institute of Medical Science (AIIMS) after it was hit by a ransomware attack on November 23, according to a report by Press Trust of India (PTI). The Delhi police, however, have denied the report. In a Tweet on Monday night, the law…
-
BrandPost: SASE: The Only Way to Improve Network Security Without Added Complexity
PRIVACY PRIVACY By: Mike Spanbauer, Field CTO, Security at Juniper Networks The future of network security has a new shiny architecture to meet organizational needs with Secure Access Service Edge (SASE). Still, most network administrators are either not ready or able to decommission their existing on-premisessecurity solutions. Organizations are much more likely to need to support…
-
What Are Tailgating Attacks and How to Protect Yourself From Them
PRIVACY PRIVACY Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you are in a safe environment. While most of us know to take precautions when online — protecting ourselves from things like phishing attacks and other cyber threats — we should also attend to…
-
CTA “mud” Actively Leaking K-12 Directories on Breach Forums
PRIVACY PRIVACY A cyber threat actor (CTA) on “Breach Forums” who’s employing the username “Mud” is actively leaking K-12 entities’ student/faculty directories. Read More
-
Charles V of Spain Secret Code Cracked
PRIVACY PRIVACY Diplomatic code cracked after 500 years: In painstaking work backed by computers, Pierrot found “distinct families” of about 120 symbols used by Charles V. “Whole words are encrypted with a single symbol” and the emperor replaced vowels coming after consonants with marks, she said, an inspiration probably coming from Arabic. In another obstacle,…
-
5 Tips for protecting your connected vehicle against Cyberattacks
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As more connected vehicles hit the road, cyberattacks are increasing. Deloitte estimates that there will be over 470 million connected cars…
-
Police Shutter 13,000 Sites in Piracy Crackdown
PRIVACY PRIVACY Fourteen detained as part of Europol operation Read More
-
Ireland’s DPC Fines Meta €265m Following Large-Scale Data Leak
PRIVACY PRIVACY The fine followed an inquiry into data processing by Meta in response to a major data breach Read More