Moody's is going to start building the risk of a business-ending hack into its credit ratings

Moody's is going to start building the risk of a business-ending hack into its credit ratings

"If you look at the history of data breach and data disclosure issues, they're not quite as impactful as the business disruption events," Vadala said.

Google needs to break up its all-or-nothing approach to permissions

Google needs to break up its all-or-nothing approach to permissions

"Since Google Home Hub uses the Google Assistant to interface with YouTube, web and app activity is a required permission to enable voice actions."

Pssst... Wanna buy a digital identity? Only $50

Pssst... Wanna buy a digital identity? Only $50

It finds that for under $50, criminals can sell a person's complete digital life on the dark web, including data from breached social media accounts; banking details; remote access to servers or desktops; data from popular services like Uber, Netflix, and Spotify; and accounts for gaming websites, dating apps and porn websites, which might include credit card information.

E-Mail

E-Mail

Susimail is a web-based email client intended primarily for use with Postman's mail servers, and is designed with security and anonymity in mind. Anonymity Friendly Email Provider List [ edit ]

Equifax Has Chosen Experian. Wait, What? — Krebs on Security

Equifax Has Chosen Experian. Wait, What? — Krebs on Security

The news came in an email Equifax is sending to people who took the company up on its offer for one year of free credit monitoring through its TrustedID Premier service.

Cathay Pacific Data Breach Exposes 9.4 Million Passengers

Cathay Pacific Data Breach Exposes 9.4 Million Passengers

Cathay Pacific, the Hong Kong-based international airline, acknowledged on Wednesday that its computer system had been compromised at least seven months ago, exposing the personal data and travel histories of as many as 9.4 million people.

The Chinese Surveillance State

The Chinese Surveillance State

I think, Matthew, you and I were talking about this earlier about, what was it, something like 15 million Chinese people have been placed on, because of their low score on one of these systems, they have been banned from being allowed to buy plane tickets or to ride trains.

Robbins v. Lower Merion School District

Robbins v. Lower Merion School District

Five months later—pursuant to a court order in the Robbins case—it informed Hasan for the first time that it had secretly taken the photographs.[18] The district was put on notice of a third parallel suit that a third student intended to bring against the district, for "improper surveillance of the Lower Merion High School student on his school issued laptop", which included taking over 700 webcam shots and screenshots between December 2009 and February 2010.[19]

Blockchain is disrupting the status quo

Blockchain is disrupting the status quo

The core model of a credit agency is to share costs among clients and charge excessive interest rates and transactional costs ensuring that the “good borrowers” cover those who don’t repay their debt.

Experian Flaw Just Revealed PINs Protecting Credit Data

Experian Flaw Just Revealed PINs Protecting Credit Data

Experian’s site exposed the personal identification numbers — the PINs needed to thaw credit freezes — after users answered their security questions with a blanket answer: None of the above.

DTA attacks China-style social credit claims about Govpass digital identity

DTA attacks China-style social credit claims about Govpass digital identity

The ASPI report also takes a swing at both federal government agencies (Govpass) and Australia Post (Digital iD) for developing broadly similar digital identity credentials, saying neither scheme “is governed by dedicated legislation, beyond existing laws such as the inadequate Privacy Act 1988, leaving Australians vulnerable to having their data misused.”

Hackers breach Healthcare.gov system, taking files on 75,000 people

Hackers breach Healthcare.gov system, taking files on 75,000 people

A government system used by insurance agents and brokers to help customers sign up for healthcare plans was breached, allowing hackers to siphon off sensitive and personal data on 75,000 people. CMS didn’t say exactly what kind of data was included in the stolen files, nor did it say how the breach happened.

An Unsend option is coming to Facebook Messenger

Jane Manchun Wong -- the fan of reverse engineering who tipped us off about Facebook dating and voice control in Messenger -- has unearthed the Unsend option in the Facebook Messenger app.

Whonix and Tor Limitations

Whonix and Tor Limitations

For example, it is poor operational security to use the same Whonix-Workstation to check email via Tor, while simultaneously publishing an anonymous document. If a user selects a new entry and exit relay each time the Tor network is used, the attacker can correlate all traffic sent with a probability of (c/n)2.

How to delete your Google account

How to delete your Google account

If you want to remove particular Google services from your account, click Delete products and sign into your account when prompted. You'll see a list of all the Google services associated with your account -- just click the trash can icon next to those you want to delete.

How to Test Your Internet Anonymity – CyberDrifters.com

How to Test Your Internet Anonymity – CyberDrifters.com

Anonymity networks such as Tor and consumer VPN services are the alternatives to the privacy-aware user, but some common default settings may still be giving away your info.

The World Wide Web And Your Privacy

The World Wide Web And Your Privacy

Indeed, the reader may have today used online banking services, purchased goods or services from websites, researched a specific topic, sourced travel information, browsed entertainment or news sites, communicated with friends on social media, or shared opinions in forums with like-minded people.

Intel Management Engine

Intel Management Engine

[18] [19] [20] Additional major security flaws in the ME affecting a very large number of computers incorporating ME, Trusted Execution Engine (TXE), and Server Platform Services (SPS) firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on 20 November 2017 (SA-00086).

Windows File Discreetly Stores Touch Devices' Sensitive Text

Windows File Discreetly Stores Touch Devices' Sensitive Text

According to digital forensics and incident response expert Barnaby Skeggs, there is a file in Windows 8.1 and Windows 10 operating systems, called WaitList.dat, that can collect sensitive information, such as email text and passwords, such a manner that many users might not know about it.

For real Windows 10 privacy, you need the China Government Edition

For real Windows 10 privacy, you need the China Government Edition

Of course, you could try to get a copy of Windows 10 China Government Edition.

Leave no dark corner

Leave no dark corner

Social credit is like a personal scorecard for each of China's 1.4 billion citizens. Dandan's financial behaviour will be an important measure for the national social credit score.

Report: Anonymity could be the answer to feeling happier online

Report: Anonymity could be the answer to feeling happier online

Platforms like YouTube and Netflix, which focus on entertainment and content and largely eschew social interaction or personal identity, were the ones impacting their users in a positive way.

12 months on from Equifax breach: No change?

12 months on from Equifax breach: No change?

A year ago … 145.5 million U.S. adults had their social security numbers stolen in an easily preventable breach. Equifax is one of many problems that will keep happening if people continue to use SSN for identity.

British Airways hack exposes personal and financial details of 380,000 customers

British Airways hack exposes personal and financial details of 380,000 customers

In all, 380,000 payment cards are affected, and British Airway urges anyone who believes their details may have been compromised to get in touch with their bank or credit card company.

Computer Security Education

Computer Security Education

There are few options available that are truly "free" (open-source), affordable, and provide suitable processing power to run "secure" operating systems like Qubes-Whonix, because specific hardware requirements like VT-d and VT-x are necessary for compatibility with future software releases.

China’s Social Credit System: Privacy Invasion or State Innovation?

China’s Social Credit System: Privacy Invasion or State Innovation?

In 2014, the Chinese government released its plans to extend financial credit scoring systems to include measures of social behaviour by 2020. In 2013, China’s National Bureau of Statistics signed 11 major data-sharing agreements with Chinese companies, including Baidu, Alibaba, and China Unicom.

Google Reportedly Bought Your Banking Data in Secret, and That's Not Even the Bad News

Google Reportedly Bought Your Banking Data in Secret, and That's Not Even the Bad News

The worse news is that Google has reportedly been doing a significant part of it in secret, and other tech companies like Facebook and Amazon are exploring ways to get ahold of your banking data, too.

Google and Mastercard in credit card data deal

Google and Mastercard in credit card data deal

Google has reportedly bought Mastercard credit card data in the US to help it track users' offline spending in stores. Mastercard told the BBC it offers its own "media measurement services" to retailers, in which the merchant provides advertising campaign details and it supplies spending data for the duration of the campaign.

Google, Mastercard allegedly had an ad-vantageous tracking deal

Google, Mastercard allegedly had an ad-vantageous tracking deal

According to the site’s sources, Google paid Mastercard for credit card transaction data. Naturally, privacy advocates will go nuts over this report, especially since it involves Google as well as one of the world’s largest credit card companies.

This Happens Every 60 Seconds Online in 2018 – Marko Vidrih – Medium

This Happens Every 60 Seconds Online in 2018 – Marko Vidrih – Medium

Exactly how important the online web is, this infographic shows facts and figures. The numbers show what happens online in 1 minute. Would you like to know more about the online activities that take place within 60 seconds?

More