Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

red paperclip
robot keyboard

Court of Justice of the European Union

No agreement as deadline to replace Safe Harbor nears

No replacement has yet been found for the transatlantic data-transfer agreement overturned last year by the European Union's top court, just days away from the deadline EU data protection authorities gave negotiators to come up with a...

security hacker code cyberespionage

Antivirus software could make your company more vulnerable

Cyberespionage groups could easily exploit vulnerabilities in antivirus programs to break into corporate networks, according to vulnerability researchers who have analyzed such products in recent years.

Digital Key

Continued support for MD5 endangers widely used cryptographic protocols

Researchers from the INRIA institute in France have devised several attacks which prove that the continued support for MD5 in cryptographic protocols is much more dangerous than previously believed.

victim identity theft computer problem

Over 650 terabytes of data up for grabs due to publicly exposed MongoDB databases

There are at least 35,000 publicly accessible and insecure MongoDB databases on the Internet, exposing 684.8 TB of data to potential theft.

hardware security embedded circuit board integrated controller

Vulnerability in popular bootloader puts locked-down Linux computers at risk

Pressing the backspace key 28 times can bypass the Grub2 bootloader's password protection and allow a hacker to install malware on a locked-down Linux system.

video

US, China cybersecurity hotline offers no guarantees

Speaking at the New England Cybercrime Conference the nation's top lawyer for national security also addressed the threat of cyber terrorists. He doesn't think they have advanced cyber weapons because if they did they would have used...

security code big data cyberespionage

Russian spy group adopts new tools to hack defense contractor networks

Pawn Storm has adopted new tools in an ongoing attack campaign against defense organizations with the goal of defeating network isolation policies.

Digital Key

No more security fixes for older OpenSSL branches

The OpenSSL Software Foundation has released new security patches, but for branches 0.9.8 and 1.0.0 these will likely be the last security updates.

malware payment terminal credit card

New attack campaign against SMBs uses a botnet to deliver PoS malware

A group of sophisticated attackers are breaking into the networks of small and medium-size businesses worldwide with the goal of infecting their point-of-sale systems with malware.

video

Volvo concept, Facebook Safety Check, Drone regulations - The Wrap

On The Wrap this week Volvo intros a new concept car that will pave the way for autonomous vehicles, Facebook enables Safety Check and there's a renewed push for chip and pin for new credit cards.

151119 paris attacks 2

How tech led to the death of France's public enemy number 1

The suspected mastermind of last week's terror attacks in Paris, Abdelhamid Abaaoud, has died in a police raid. Investigators were led to him by wiretaps and an abandoned telephone.

Microsoft CEO Satya Nadella

Microsoft touts new, holistic approach to enterprise security

Microsoft combines the attack protection, detection and response features built into Windows 10, Office 365, Azure and the Microsoft Enterprise Mobility Suite to help enterprises improve their operational security posture.

Siegfried Rasthofer Steven Arzt Black Hat Europe 2015

Millions of sensitive records exposed by mobile apps leaking back-end credentials

Thousands of mobile applications use cloud-based, back-end services in an insecure way, allowing anyone to access millions of sensitive records created by users, according to a recent study.

ian haken bheu black hat europe 2015

BitLocker encryption can be defeated with trivial Windows authentication bypass

A researcher disclosed a trivial Windows authentication bypass that puts data on BitLocker-encrypted laptops at risk.

self encrypting hard drives black hat europe 2015

Self-encrypting drives are hardly any better than software-based encryption

Two researchers demonstrated attacks against self-encrypting drives used in enterprise environments at the Black Hat Europe conference in Amsterdam.

comcast center philadelphia161

Comcast resets nearly 200,000 passwords after customer list goes on sale

Over the weekend, a reader directed Salted Hash to a post on a Dark Web marketplace selling a number of questionable, if not outright illegal goods. The post in question offered a list of 590,000 Comcast email addresses and...

intro title

7 ways hackers can use Wi-Fi against you

Wi-Fi — oh so convenient, yet oh so dangerous. Here are seven ways you could be giving away your identity through a Wi-Fi connection and what to do instead.

microsoft logo redwest a

Microsoft to acquire data protection firm Secure Islands

Microsoft announced Monday that it has made a deal to acquire Secure Islands, an Israeli company that focuses on protecting companies' data.

Load More