Remove Data breaches Remove Examples Remove Exercises Remove Mining
article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. The next few parts of this series all focus on cures - how do we fix data breaches once bad code has already been written or bad server configurations deployed? Best of all, it's about prevention rather than cure.

article thumbnail

Selling and utilising personal data in an insolvency situation

Data Protection Report

But this is a tricky area to navigate, particularly following the General Data Protection Regulation ( GDPR ), since both the ICO and the FCA have started to pay more attention to this area.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

Many people will land on this page after learning that their email address has appeared in a data breach I've called "Collection #1". It's made up of many different individual data breaches from literally thousands of different sources. Collection #1 is a set of email addresses and passwords totalling 2,692,818,238 rows.

article thumbnail

Have I Been Pwned Domain Searches: The Big 5 Announcements!

Troy Hunt

Here's mine: One of the problems the dashboard approach helps tackle is unsubscribing on an individual domain basis. It was an all or nothing affair that nuked the lot of them whereas now, it's a domain-by-domain exercise. This doesn't fix the pain of doing it once, but it does mean that it's now a one-off pain.

IT 93
article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

My views are shaped by a life that's very public due to the nature of what I do and as such, my kids receive more exposure than most (the picture above, for example). For example, my son teaching kids to code in London a couple of weeks ago: Teaching kids to code at #NDCLondon with @CodeCombat. They can't change their passcodes.

Privacy 141
article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

For example, I was regularly asked if I'd ever received any legal threats which is apparently pretty normal for any M&A process, but you can imagine why it'd be particularly interesting when dealing with a heap of data originally obtained via illegal methods. of the company.

IT 136
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Back in 2013, I was beginning to get the sense that data breaches were becoming a big thing. Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter.