Tag Archive for: Questions

Questions still need answering in Australia’s largest health data breach – The Conversation AU


The Conversation AU

Questions still need answering in Australia's largest health data breach
The Conversation AU
In what is Australia's biggest data breach of medical information, more than 550,000 customers of the Australian Red Cross Blood Service had personal and medical details exposed online and leaked to an anonymous hacker last week. According to the …
Red Cross Blood Donation Service data breach: donors urged not to abandon serviceIllawarra Mercury

all 6 news articles »

“data breach” – Google News

Answers to ‘Is the internet broken?’ and other Dyn DDoS questions

The massive DDoS attacks that took down internet address-translation service Dyn and its customers last week raise a lot of need-to-know questions about the overall security of online infrastructure and its performance.

While the attacks were ultimately mitigated and have subsided, the means for carrying out others are still viable and could crop up at any time with other targets. Here are some questions and answers that address what happened, how it happened, whether it could happen again and what the consequences might be.

Is the internet broken?

No, or at least not any more than it was before. It’s made up of a system of independent vendors and institutions working cooperatively to provide access to sites around the world. Each works in its own best interests but also cooperates with the others to make the system work for everybody. Like any such system, it’s got flaws and weaknesses. The Dyn attackers targeted some of these vulnerabilities and exploited them for maximum effect.

To read this article in full or to leave a comment, please click here

Network World Tim Greene

5 security questions mobile app developers should be asked – The Next Web


The Next Web

5 security questions mobile app developers should be asked
The Next Web
Also too often overlooked is that mobile security doesn't end with the app itself. Backend APIs can present huge opportunities for attack, so each one should be tested and hardened. They should be able to validate the presence, length, range, type, and

“mobile security” – read more

Voter data breach leads to questions of tampering and state security – TechTarget


CNN

Voter data breach leads to questions of tampering and state security
TechTarget
Tran noted that voter registration data is placed in the public record domain and can be legally purchased from sites like NationBuilder and InstantCheckMate, but that doesn't necessarily lessen the value of a voter data breach for an attacker. "Public
Officials: Hackers breach election systems in Illinois, ArizonaCNN
USintelligence says Russian hackers behind voter data breach; Trump pooh-poohs debate prepMalaysia Sun (press release)
Hackers had a chance to hamper voting by deleting recordsComputerworld
MyAJC –PCWorld –Phys.Org
all 343 news articles »

“data breach” – Google News