Cook County Leaks 320,000 Court Records

Cook County Leaks 320,000 Court Records

Over 320,000 court records belonging to the second most populous county in the US have been discovered sitting on a misconfigured online database. Security researcher Jeremiah Fowler and a team from Website Planet soon found that the data was all from Cook County, Illinois, which is home to America’s third-largest city, Chicago. “There have been several high -profile data exposures of private companies that affected Cook County residents in the past few years including a…

Read More

Misconfigured Cloud Server Exposes 66,000 Gamers

Misconfigured Cloud Server Exposes 66,000 Gamers

Tens of thousands of users have had their personal details exposed after a popular online gaming site misconfigured the Elasticsearch server they were sitting on. A research team at WizCase found the wide-open server, with zero encryption and no password protection, through a simple search. It was traced back to VIPGames.com, a popular free-to-play card and board game platform with 100,000 Google Play downloads and roughly 20,000 active daily players globally. The site features games…

Read More

2020 cyber security statistics – IT Governance UK Blog

2020 cyber security statistics – IT Governance UK Blog

In 2020, we recorded 1,120 breaches and cyber attacks that were reported on in mainstream media, which accounted for 20,120,074,547 leaked records. Compiling this information enables us to see how security incidents occur and the trends to look out for. Did you know, for example, that the number of disclosed incidents shot up in the second half of the year, showing the impact that COVID-19 has had on organisations? Or that there was a 50%…

Read More

5 minutes with Wade Lance – Ransomware and lateral movement

5 minutes with Wade Lance – Ransomware and lateral movement

5 minutes with Wade Lance – Ransomware and lateral movement | 2021-01-26 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Climate-influenced weather was key driver of $268B in global damage in 2020

Climate-influenced weather was key driver of 8B in global damage in 2020

Climate-influenced weather was key driver of $268B in global damage in 2020 | 2021-01-26 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Reliable asset tracking: The importance of IoT, battery life and location accuracy

Reliable asset tracking: The importance of IoT, battery life and location accuracy

Reliable asset tracking: The importance of IoT, battery life and location accuracy| Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

A Look at the Legal Consequence of a Cyber Attack

A Look at the Legal Consequence of a Cyber Attack

Is your system 100% ready to face the severest cyber-attack and mitigate the risk of a possible data breach? If you are unsure about your cyber-safety structure, then it’s time to upgrade it. Otherwise, you could be at risk of lengthy legal battles that result in hefty fines. Beyond that, the cost in terms of reputational loss could be catastrophic if not handled meticulously by professionals within a reasonable time. Despite the best cybersecurity practices,…

Read More

New Docker Reporting Provides Teams with Tools for Higher Efficiency and Better Collaboration – Docker Blog

New Docker Reporting Provides Teams with Tools for Higher Efficiency and Better Collaboration – Docker Blog

Today, we are very excited to announce the release of Audit Log, a new capability that provides the administrators of Docker Team subscription accounts with a chronological report of their team activities. The Audit Log is an unbiased system of record, displaying all the status changes for Docker organizations, teams, repos and tags.  As a tracking tool for all the team activities, it creates a central historical repository of actionable insights to diagnose incidents, provide a…

Read More

Gartner: The future of AI is not as rosy as some might think

Gartner: The future of AI is not as rosy as some might think

A Gartner report predicts that the second-order consequences of widespread AI will have massive societal impacts, to the point of making us unsure if and when we can trust our own eyes. Image: iStockphoto/Feodora Chiosea More about artificial intelligence Gartner has released a series of Predicts 2021 research reports, including one that outlines the serious, wide-reaching ethical and social problems it predicts artificial intelligence (AI) to cause in the next several years. In Predicts 2021:…

Read More

Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) | McAfee Blogs Ten Tips for Protecting Your Personally Identifiable Information (PII) | McAfee Blog

Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) | McAfee Blogs Ten Tips for Protecting Your Personally Identifiable Information (PII) | McAfee Blog

Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something else that follows us around as well—a growing body of personally identifiable information, also known as PII. What is PII?…

Read More
1 2,432 2,433 2,434 2,435 2,436 2,545