"Michael said recent threats to the security of government-held data such as the census failure should raise real concerns about the storage of biometric data en masse.
"I am worried about theft, I don't buy the story that your data is safe. I think we've become almost complacent 'oh there's been another data breach. Oh they hacked in and stole the data'," she said. "Is the next phase of rollout going to be 'oh my e-health records were taken', 'oh my biometrics at border control were taken'?""
"The bank had no firewall and used second-hand routers that cost $10 to connect to global financial networks.
Better security and hardware would have hampered the attackers, Reuters said, quoting an official investigator."
"Dropbox is at the centre of a leak scandal, following the releasing of 400 usernames and passwords by an anonymous user on Pastebin.
The hacker claims the initial dump is just a portion of the 6,937,081 Dropbox accounts he claims to have compromised on Tuesday. He then requested Bitcoins in payment before he would allow access to more accounts."
"XKEYSCORE is a secret NSA program that indexes data slurped up from covert fiber-taps, hacked systems, and smartphones, including "full take" data and metadata. "
"The hackers who stole 4.5 million patient records from an American hospital network might have exploited the infamous Heartbleed bug to carry out the hack - the first time the bug has been reported to be at the center of a high-profile breach."
"And that means that there's now a financial incentive for going after just about anything. While the payoff of going after businesses' networks used to depend on the long play-working deep into the network, finding and packaging data, smuggling it back out-ransomware attacks don't require that level of sophistication today. It's now much easier to convert hacks into cash."
"he outlines three sources of dysfunction - 'deliberate, malicious intent, such as state-sponsored hacking and attacks, criminal behaviour, and online harassment'; 'system design' which has created 'perverse incentives where user value is sacrificed, such as ad-based revenue models that commercially reward clickbait'; and the 'viral spread of misinformation'. he also calls attention to the 'unintended negative consequences' of the web, which he said had led to 'the outraged and polarised tone and quality of online discourse'."
"Now they might finally get this thanks to a new $10 million contract the Defense Department's Defense Advanced Research Projects Agency (DARPA) has launched to design and build a secure voting system that it hopes will be impervious to hacking."
"If mediocre malware can power some of the largest DDoS attacks ever, and considering the sad state of security of the Internet of Things in general, we should probably brace for more cyberattacks powered by our easy-to-hack "smart" Internet of Things, as many, including ourselves, had predicted months ago."
""The person on the other line said, 'unplug your Alexa devices right now,'" Danielle told KIRO. "'You're being hacked.'" The couple had reportedly placed Amazon devices in every room of their house to control the heat, lights, and security system. All of the gadgets were pulled out after their colleague proved they had received the unauthorized recording."
"Hostile states are attempting to hack British universities and scientific facilities to steal research related to Covid-19, including vaccine development, cybersecurity experts have warned."
"But even cleverest AI can be fooled with the simplest of hacks. If you write out the word "iPod" on a sticky label and paste it over the apple, Clip does something odd: it decides, with near certainty, that it is looking at a mid-00s piece of consumer electronics. In another test, pasting dollar signs over a picture of a dog caused it to be recognised as a piggy bank."