article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. Image: FBI. Security analysts and U.S. Chengdu404’s offices in China.

article thumbnail

White House Releases Report on Big Data

Hunton Privacy

On May 1, 2014, the White House released a report examining how Big Data is affecting government, society and commerce. The White House’s Big Data report also recommends advancing the Consumer Privacy Bill of Rights released by the Obama administration in February 2012.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK ICO Launches 2012/13 Annual Report

Hunton Privacy

On June 20, 2013, the UK Information Commissioner’s Office (“ICO”) launched its Annual Report and Financial Statements for 2012/13 (the “Report”). During the financial year 2012/13, the ICO’s civil enforcement team investigated 1,300 cases, up 45% from the previous year. In 2012/13, the ICO raised £16.06 Enforcement.

FOIA 40
article thumbnail

Predictions 2024: It’s All About The Data

John Battelle's Searchblog

Enterprise Data Moves Beyond Marketing. For as long as “big data” has been a thing, its main purpose in large companies has been to inform marketing campaigns. If you want to experience the future of transportation, I suggest you look into an e-bike.

Marketing 121
article thumbnail

A Digital Transformation Lesson: Open Source Business Models

Bill Schmarzo - Dell EMC

Hadoop notably launched the open source Big Data market, laying the foundation for open source projects in IOT (Liota, Kafka, Nautilus, EdgeX Foundry), and machine learning and deep learning (TensorFlow, Apache Spark ML, Caffe, Torch). Let’s use the Value Chain technique to understand where and how to apply big data analytics.

article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

FLASHBACK The new clues about Rescator’s identity came into focus when I revisited the reporting around an April 2013 story here that identified the author of the OSX Flashback Trojan , an early malware strain that quickly spread to more than 650,000 Mac computers worldwide in 2012.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Isovalent Cloud security 2020 Private Illumio Cloud security 2015 Private SignalFx Monitoring 2015 Acquired: Splunk CipherCloud Cloud security 2012 Acquired: Lookout Lookout Mobile security 2011 Private. Mimecast Email security 2012 Nasdaq: MIME. a16z Investments. Bessemer Venture Partners. Greylock Partners.