article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

This week, we discuss the Australian government’s loss of thousands of classified documents, DCMS Secretary of State Matt Hancock’s buggy new app and the growing trend of cybercriminals using cryptocurrency miners. Hello and welcome to the IT Governance podcast for Friday, 2 February 2018. Here are this week’s stories.

Mining 66
article thumbnail

MY TAKE: What if Big Data and AI could be intensively focused on health and wellbeing?

The Last Watchdog

The blue-sky mission is to bring modern data mining and machine learning technologies to bear delivering personalized services that ameliorate not just physical ailments, but also mental and even emotional ones. across the whole ecosystem, whether it’s personal health, mental health, social health or worker wellness.”. “We

Big data 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 450 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA and ENISA enhance their Cooperation CISA adds Qlik bugs to exploited vulnerabilities catalog Report: 2.6

article thumbnail

New Breach Exposes an Entire Nation: Living and the Dead

Adam Levin

A misconfigured database has exposed the personal data of nearly every Ecuadorian citizen, including 6.7 The data included official government ID numbers, phone numbers, family records, birthdates, death dates (where applicable), marriage dates, education histories, and work records. million children. It contained 20.8

Mining 50
article thumbnail

Weekly podcast: Reports galore and more cryptojacking

IT Governance

This week, we discuss new reports from Cisco, McAfee and the CSIS, and Big Brother Watch, and hear more about malicious Monero mining. Hello and welcome to the IT Governance podcast for Friday, 23 February 2018. I neglected to reveal the sum the criminals managed to mine in the few hours before they were detected.

Mining 66
article thumbnail

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

Siev also couldn’t say exactly what the attackers were looking for or how they were manipulating the devices but did say that generally bad actors target IoT devices to either steal personal information or money like credit card numbers and to manipulate home systems like gates, safes and door locks. IoT a Security Concern. billion in 2018.

IoT 145
article thumbnail

Russia’s watchdog Roskomnadzor threatens to fine Twitter and Facebook

Security Affairs

The Russian government has already blocked the p rofessional social network L inkedIn in 2016 under the data-localization legislation. This week the Russian government has blocked the ProtonMail end-to-end encrypted email service and ProtonVPN VPN service. ” states the p ress release p ublished by the Russian watchdog.

Mining 46