Remove tag privacy-rights
article thumbnail

7 Ways to Keep Employees Safe from the Scariest Cyber Threats

KnowBe4

Data privacy is all over the news these days , and many more regulations about allowable use of PII are being enacted. Tagging or posting photos with co-workers, publicizing team projects and accomplishments, highlighting job promotions or life events—all of this can be pieced together by bad actors to inform phishing attacks.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

I mean, they’re criminals, right? It's basic privacy hygiene. So privacy in my opinion, is on a sliding scale. And I’m not talking about services that can quote remove your buddy’s Instagram photos where you are tagged doing something Not Safe For Work. But I view internet privacy differently.

Privacy 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Facial Recognition Software for Enterprises In 2022

eSecurity Planet

With nothing more than an employee’s face needed to gain access, accounts can be set up and access levels changed relatively easily, without the hassle or insecurity of improperly saved passwords. Another concern is that of false negatives in identification, which can deny the right person access.

article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. "You know they're just trying to get you to DC so they can arrest you for all that stolen data you have, right?! So, in 2017, Pwned Passwords was born.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111
article thumbnail

Gab Has Been Breached

Troy Hunt

But Gab is also different, having grown dramatically in recent months as an alternative to mainstream incumbent platforms such as Twitter and Facebook and drawing a crowd primarily focused on right wing American politics. "It is standard practice for passwords to be hashed. If your password is "maga2020!"

Passwords 145