Month: December 2017
It seems our anti-virus cybersecurity protection software may apparently be putting us at risk. This juxtaposition is reportedly shared by the British Government who will avoid using the Russian-made Kaspersky anti-virus software over national security concerns.
The software works by accessing a lot of information; scanning it all for malicious coding. It’s this access to large amounts of information that is apparently worrying the British government.
Read More “Security concerns over Russian-made Kaspersky anti-virus software”
The U.S. Supreme Court is to hear a second significant case on digital privacy. Although digital data privacy is something that is fast becoming a common issue of debate, there remains a struggle to distinguish what the boundaries are when it comes to owning it or using it.
In this case, the dispute is between technology-giant Microsoft and the U.S. federal government. In 2013, U.S. prosecutors in a drug trafficking investigation obtained a warrant to search a suspect’s emails. It took the warrant to Microsoft demanding access to emails, and they put up a fight to stop access to them.
Read More “Supreme Court to consider data protection implications for Microsoft email storage”
Cybersecurity consultancy firm Accenture reportedly held an incredible amount of sensitive customer data on four cloud servers that were not password-protected. There were some 137GB of data on Amazon’s cloud bucket that included decryption keys, and without a password, the account was essentially available for access by the public.
The unsecured servers were discovered by a security research firm, UpGuard, in mid-September. They found:
- Secret Application Programming Interfaces
- Authentication credentials
- Decryption keys
- Customer information
The U.S. National Football League has reportedly seen a huge data leak where 1,113 players had their personal information posted online.
The website for the NFL Players Association also included contact information for the players and their agents in the reach. Exposed information apparently included:
- Email addresses and mobile telephone numbers
- Home addresses of agents
- IP addresses for users when signing in
- Logged information for the website was accessed
- Advisor fee percentages