recentpopularlog in

informationsecurity

« earlier   
Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing - The New York Times
- The Trump administration also plans to declassify intelligence reports to reveal Chinese efforts dating to at least 2014 to build a database containing names of executives and American government officials with security clearances
china  hacking  informationsecurity 
yesterday by renaissancechambara
Just who is Huawei listening to? | Business | The Sunday Times
“In the event of an international crisis — say, if the Chinese were to invade Taiwan — if you own a fleet of thousands and thousands of routers, you can launch service-denial attacks on a massive scale,” said Ross Anderson, professor of security engineering at Cambridge University. “You can potentially make the internet unavailable for days or weeks.”
huawei  networkandtelecoms  informationsecurity  totwitter 
4 days ago by renaissancechambara
Starwood Reservation Database Security Incident
name, mailing address, phone number, email address, passport number, Starwood Preferred Guest (“SPG”) account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences. For some, the information also includes payment card numbers and payment card expiration dates, but the payment card numbers were encrypted using Advanced Encryption Standard encryption (AES-128). There are two components needed to decrypt the payment card numbers, and at this point, Marriott has not been able to rule out the possibility that both were taken - oh Lordy!
informationsecurity  hacking  totwitter 
13 days ago by renaissancechambara
Ivanka Trump used a personal email account to send hundreds of emails about government business last year
The discovery alarmed some advisers to President Trump, who feared that his daughter’s practices bore similarities to the personal email use of Hillary Clinton.
trumpAristocracy  trumpIncompetence  informationSecurity  censorship 
23 days ago by joeybaker
Report: Microsoft’s enterprise products covertly gather personal data on users - Microsoft collects and stores personal data about the behavior of individual users of its enterprise offerings on a large scale, without any public documentation — accord
Microsoft collects and stores personal data about the behavior of individual users of its enterprise offerings on a large scale, without any public documentation — according to a new report by Privacy Company. The data protection impact assessment (DPIA) was commissioned by the Dutch government to guide its institutions — which includes 300,000 workstations in …
userIsTheProduct  corporateCorruption  surveillanceState  informationSecurity  informationObscurity 
25 days ago by joeybaker

Copy this bookmark:





to read