Remove tag accountability
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter. accounts (59% of common email addresses had exactly the same password). " by @troyhunt is now up and running.

article thumbnail

What Is Our Professional Future?

Brandeis Records Manager

A recent futurist reading binge has been an exercise in masochism, or deer-in-the-headlights simulation, or emperor’s new clothes realization. Reading through Kelly’s book as a records manager or archivist is an exercise in marathon squirming. Chaotic, Counter-Control Culture . The Rise of the Machines (and Software).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US: The CCPA ‘Moving Target’ One Month Before Privacy Enforcement Begins

DLA Piper Privacy Matters

And even after the final regulations are approved by OAL, Appendix E to the Final Statement of Reasons states: To the extent that the regulations require incremental compliance, the OAG may exercise prosecutorial discretion if warranted, depending on the particular facts at issue. Data breach class action risk for email account credentials.

Privacy 84
article thumbnail

Gab Has Been Breached

Troy Hunt

pic.twitter.com/86klDc37nF — Troy Hunt (@troyhunt) March 2, 2021 I do actually agree with the quoted sentence insofar as someone could create an email address completely disassociated with them, register for Gab and then login with that account. It's just a placeholder email I used when creating the account almost five years ago.

Passwords 145