Remove tag accountability
article thumbnail

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

Krebs on Security

But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan , malware designed to surreptitiously intercept and forward text messages from Android mobile devices. Pushwoosh says it is a U.S. But Reuters found that while Pushwoosh’s social media and U.S.

article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

This is a little project I started whilst killing time in a hotel room in late 2013 after thinking "I wonder if people actually know where their data has been exposed?" And this is precisely why I'm writing this piece - to talk about how I'm assisting the UK and Australian governments with access to data about their own domains.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

Adaptive Monitoring and Tagging. This includes active tagging of workloads, threat hunting , and virus assessments, and consistent evaluation of traffic for mission-critical applications, data, or services. In 2019, the municipal government of New Orleans was forced to declare a state of emergency and paid over $7 million.

article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

Search for your account across multiple breaches [link] — Have I Been Pwned (@haveibeenpwned) December 4, 2013 And then, as they say, things kinda escalated quickly. And I never envisioned a time where dozens of national governments would be happy to talk about using the service. "Have I been pwned?"

article thumbnail

The Legitimisation of Have I Been Pwned

Troy Hunt

Transparency has been a huge part of that effort and I've always written and spoken candidly about my thought processes, how I handle data and very often, the mechanics of how I've built the service (have a scroll through the HIBP tag on this blog for many examples of each). — Jannis Tenbrink (@the_jannis) October 2, 2017.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

It also has a new focus on governance, which encompasses how organizations make and carry out informed decisions on cybersecurity strategy”. 30 April 2024 – ISO/IEC 27001:2013 certification unavailable Certification bodies must stop offering (re)certification to ISO 27001:2013 by 30 April. NIST CSF 2.0

article thumbnail

Fuel digital transformation with data security and data privacy

Collibra

Look at these price tags for some of the most expensive data breaches over the last 10 years: Equifax – $700 million settlement, ~143 million people affected, 2017. Exactis – $500 million, ~348 million user accounts, 2018. Target – $300 million, ~40 million customers, 2013. Target – $300 million, ~40 million customers, 2013.