article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums. Secret Service. Hieu Minh Ngo, in his teens. BEGINNINGS.

article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Microchips are just one example of the increasing variety of smart devices that are near to, attached to, or reside inside the human body. Once connected, data can be exchanged, and the body and device can be remotely monitored and controlled.” These devices are no longer relegated to science fiction and spy thrillers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

For Digital Transformation, You Need Content AI

AIIM

Of course, we've been digitizing content and delivering electronically -- and wrestling with metadata, search, information governance, and compliance -- for decades. What's new is the explosion of mobile and social data and Internet of Things. I'll point AIIM readers to my deck and retrace key points in this article.

article thumbnail

What is smart transportation?

IBM Big Data Hub

Every time a city improves upon its existing structures to incorporate more data-driven or connected technologies, it becomes more intelligent. A smart transportation overview Also known as smart mobility, the rise of ubiquitous data collection and automation has led local governments to embrace smart transportation.

article thumbnail

Two hacker groups attacked Russian banks posing as the Central Bank of Russia

Security Affairs

The emails were disguised to look as if they come from the Central Bank of Russia and FinCERT, the Financial Sector Computer Emergency Response Team. In March 2016, for example, cybercriminals sent phishing emails from info@fincert.net. All messages sent via email contain FinCERT’s electronic signature.”.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: Right, the Trusted Foundry program I guess is a good example. BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? Of course, some nations have more capability than others to sift through huge amounts of data they’re collecting.

Security 203
article thumbnail

GDPR and The Data Governance Imperative

AIIM

The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information. Predictive analytics is fundamentally changing the definition of data.

GDPR 91