article thumbnail

Google sued by New Mexico attorney general for collecting student data through its Education Platform

Security Affairs

New Mexico sues Google for allegedly using the Google for Education platform to gather personal and private data from children. Google is facing a new lawsuit for allegedly using the Google for Education platform to gather personal and private data from students with an age of less than 13 years. Pierluigi Paganini.

article thumbnail

National Safety Council data leak: Credentials of NASA, Tesla, DoJ, Verizon, and 2K others leaked by workplace safety organization

Security Affairs

The National Safety Council leaked thousands of emails and passwords of their members, including companies such as NASA and Tesla. The National Safety Council has leaked nearly 10,000 emails and passwords of their members, exposing 2000 companies, including governmental organizations and big corporations.

Passwords 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Catches of the Month: Phishing Scams for August 2023

IT Governance

The first looks at an alarming rise in phishing scams that impersonate the tech firm, while the second discusses a new security feature that’s designed to protect users from password compromise. One of the ways it does that is by warning people about security threats when they enter their Windows password into websites and documents.

article thumbnail

GUEST ESSAY: A roadmap for the finance teams at small businesses to improve cybersecurity

The Last Watchdog

For example, your accounting technology should have features that work to protect your data, like internal controls, multi-factor authentication, or an audit trail that documents change to your data. Stay educated. These back-ups can also be used to form a disaster recovery plan in the event of a natural disaster. Stay proactive.

article thumbnail

Atomic macOS Stealer is advertised on Telegram for $1,000 per month

Security Affairs

The Atomic macOS Stealer allows operators to can steal various types of information from the infected machines, including Keychain passwords, complete system information, files from the desktop and documents folder, and even the macOS password. The threat actors spread the malware in the form of a ‘.dmg’

article thumbnail

GUEST ESSAY: 7 tips for protecting investor data when it comes to alternative asset trading

The Last Watchdog

This includes scanning all materials, such as investor onboarding documents and communication. It’s important to educate staff on the significance of data protection, potential security threats and proper handling of sensitive information. Implement strong data encryption.

IT 189
article thumbnail

MFA Advantages and Weaknesses

eSecurity Planet

Many stick with simple username and password combinations despite the weaknesses of this authentication method. The Problem with Passwords. Passwords are the most common method of authentication. As if their crackability wasn’t bad enough, many attackers already have the passwords and don’t need to apply brute-force attacks.