Big Data News, Articles and Updates

Drupal zero-day opened door of Panama Papers law firm, report

Drupal zero-day opened door of Panama Papers law firm, report

By

A zero-day flaw in Drupal is now being said to be how hackers penetrated the network of law firm Mossack Fonseca and siphoned out 11.5 million files.

ODNI to monitor its spies through wearable tech

ODNI to monitor its spies through wearable tech

By

The Office of the Director of National Intelligence's (ODNI) advanced research funding unit is developing a project to assist U.S. intelligence firms in monitoring its spies through wearable devices.

Recycled hard drives rich with residual data, study

Recycled hard drives rich with residual data, study

By

The amount of digital information stored on recycled devices is staggering, a new study found.

Not OK, data on 70K OKCupid users exposed

Not OK, data on 70K OKCupid users exposed

By

A semi-private database consisting of the identities of 70K users of the dating website was published on the internet.

Safe passage: Case study

Safe passage: Case study

By

HR firm Pasona N A needed strong and flexible security for file-sharing around the globe, reports Greg Masters.

China to use big data surveillance a la 'Minority Report' to predict terrorism

China to use big data surveillance a la 'Minority Report' to predict terrorism

By

China has a contracted with China Electronics Technology Group to develop technology that can predict acts of terrorism before they occur based on surveillance data.

Is an NSA algorithm really killing 'thousands of innocent people'...probably not

Is an NSA algorithm really killing 'thousands of innocent people'...probably not

By

The NSA's SKYNET program earned some unwanted attention after a report said the agency's machine learning algorithm is inadequate.

Security 101: Is my sensitive data safe?

Join experts from Informatica who will address in detail the challenges companies face in knowing how to recognize sensitive data, discover where their data resides and how to protect it from attackers.

Telegram metadata allows for 'stalking anyone'

Telegram metadata allows for 'stalking anyone'

By

Researchers discovered more problems with Telegram, the messaging app founded by the Russian tech entrepreneur brothers Nikolai and Pavel Durov.

European and American authorities reportedly closing in on Safe Habor 2.0 agreement

European and American authorities reportedly closing in on Safe Habor 2.0 agreement

By

European and American diplomats are reportedly negotiating a "Safe Harbor 2.0" agreement to allow for data transfers to the United States while also addressing European privacy concerns, Reuters reported on Thursday.

SC Congress New York Photo Slideshow

By

Shots from around SC Congress New York 2015. The day-long event, held on October 20 at the Metropolitan Pavilion in Manhattan, featured 32 speakers, 350 guests and 32 exhibitors/sponsors.

 Into the spotlight: Cyberinsurance

Into the spotlight: Cyberinsurance

Data that can be monetized is, simply put, a magnet for the bad guys. No matter whether your organization is big or small, if you have desirable data, you can no longer afford to wonder whether or not to invest in cybersecurity insurance.

Corporations need to prioritize protecting keys and certificates

Corporations need to prioritize protecting keys and certificates

By

Businesses must prioritize protecting their security keys and certificates or leave themselves open to losing customers, system outages, audit failures and possibly failing, according to a report from the Ponemon Institute.

Microsoft exec clarifies Windows 10 data collection policy

Microsoft exec clarifies Windows 10 data collection policy

By

Microsoft released a statement on Tuesday that addressed the feedback and privacy concerns of Windows 10 data collection.

Roundtable: Identity and access management

Roundtable: Identity and access management

The SC Magazine UK roundtable convened with several industry experts to talk about the issues surround identity and access management

Data storage stolen at Lloyds, customer account data lost

Data storage stolen at Lloyds, customer account data lost

By

Lloyds Bank data storage device stolen from an RSA data centre two months ago contains customer names, addresses, sort codes and account numbers for Lloyds' Premier Account customers who had Royal Sun Alliance emergency home cover attached to their bank account between 2006 and 2012.

Fraudsters using credentials harvested from massive breaches, study finds

Fraudsters using credentials harvested from massive breaches, study finds

By

Digital identities are being exploited on a routine basis by sophisticated cybercriminals, says a just released ThreatMetrix study.

Google facility in Europe loses data due to lightning strikes

Google facility in Europe loses data due to lightning strikes

By

After lightning struck a local utility grid, one of Google's European data centers suffered a power outage that led to "some" permanent data loss.

10 Reasons You Need to Test, Not Guess

10 Reasons You Need to Test, Not Guess

How you are securing your sensitive information should not be a guessing game

American Airlines denies hack, but reinforces security efforts

American Airlines denies hack, but reinforces security efforts

By

American Airlines denied involvement in an apparent security incident at its one-time subsidiary Sabre, but is redoubling its own security measures as a precaution.

Dropbox, Google Drive and others vulnerable to Man-in-the-Cloud attacks

Dropbox, Google Drive and others vulnerable to Man-in-the-Cloud attacks

By

Imperva believes cloud storage sites like Google Drive, Dropbox, OneDrive will be the next area corporations will have to defend in their on-going battle to keep their data under wraps.

Apple to block advertisers from getting app data in iOS 9, reports say

By

Apple announced that the iOS 9 will block advertisers and other companies from scanning devices for app-download data.

Uber simplified privacy policies, specifies data use

By

Uber has updated its privacy policies to use less legal jargon, be more concise and easier to understand.

RadioShack, state coalition reach terms on sale of customer data

By

RadioShack and a coalition of 38 states have reached an agreement allowing RadioShack to sell the customer data under certain conditions.

FTC recommends conditions for sale of RadioShack consumer information

FTC recommends conditions for sale of RadioShack consumer information

By

The FTC has recommended a list of conditions that a bankruptcy court should impose on the sale of RadioShack's information assets.

Building a sophisticated endpoint defense strategy with full security lifecycle protection

Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more. The network is not the target—it's the endpoint where that data resides.

RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns

RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns

Gib Sorebo used his session at RSA to discuss the Internet of Things (IoT) and its possible repercussions.

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

By

At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.

Permira, CPPIB to acquire Informatica

By

Data software company Informatica announced, on Tuesday, that it is set to be acquired by private equity firm Permira and Canada Pension Plan Investment Board (CPPIB).

IBM will invest $3 billion in new IoT unit

IBM will invest $3 billion in new IoT unit

By

IBM will investing $3 billion over the next four years to establish a new Internet of Things (IoT) business unit along with a cloud-based platform to help build IoT solutions.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US