Remove 11
Remove 2019 Remove Data breaches Remove Examples Remove Exercises Remove Security
article thumbnail

Nation-State-Sponsored Attacks: Not Your Grandfather’s Cyber Attacks

Data Matters

It used to be that data breaches were all about cyber-crooks hacking computer systems to steal personal information, followed by an affected company sending regretful notification letters offering a year or two of complimentary credit monitoring. All rights reserved. Agency (Feb. 14,028, 86 Fed. 26,633 (May 12, 2021).

article thumbnail

Pwned Passwords, Version 5

Troy Hunt

Shortly after that blog post I launched Pwned Passwords with 306M passwords from previous breach corpuses. cc @IcyApril pic.twitter.com/ZLi61e8qbY — Troy Hunt (@troyhunt) May 24, 2019 Today, after another 6 months of collecting passwords, I'm releasing version 5 of the service. Thanks everyone!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

My views are shaped by a life that's very public due to the nature of what I do and as such, my kids receive more exposure than most (the picture above, for example). For example, my son teaching kids to code in London a couple of weeks ago: Teaching kids to code at #NDCLondon with @CodeCombat. What say you, internet?

Privacy 140
article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

After 11 months of a very intensive process culminating in many months of exclusivity with a party I believed would ultimately be the purchaser of the service, unexpected changes to their business model made the deal infeasible. of the company. This is what the organisations bidding on HIBP were buying: trust in me.

IT 135
article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. For example, in John B.

Privacy 97
article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

Major data breaches in recent years are spurring state legislators and regulators across the US into action. Of particular concern to state-level policymakers and enforcement authorities are business practices that in their view may contribute to security incidents. NYDFS: Setting a new bar for state cybersecurity regulation.