Remove us en
article thumbnail

Weekly Update 369

Troy Hunt

We're (us as end users) still reusing credentials, still not turning on MFA and still trying to sue when we don't do these things. And we as builders are still creating systems that allow this to happen en mass. here's a blog post about how stupid class actions like this are! Protect your identity now.

article thumbnail

Weekly Update 384

Troy Hunt

I suspect many of us are prone to looking at this in a very binary fashion: if the data is publicly accessible anyway, scraping it poses no risk. That's before we even get into the issue of whether in Trello's case, it should ever be possible for a third party to match email address to username and IRL name.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside the Massive Alleged AT&T Data Breach

Troy Hunt

We're here at "alleged" for two very simple reasons: one is that AT&T is saying "the data didn't come from us", and the other is that I have no way of proving otherwise. Are you an AT&T customer and if not, are you a customer of another US telco?

article thumbnail

Are you using a Sophos UTM appliance? Be sure it is up to date!

Security Affairs

” explained the expert in a blog post. Accept : text/javascript, text/html, application/xml, text/xml, */* Accept-Language : en-US,en;q=0.5 “I grabbed ISOs for versions 9.510-5 and 9.511-2 of the Sophos UTM platform and spun them up in a lab environment. Host : 192.168.50.17 User-Agent : Mozilla/5.0 (X11;

IT 98
article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 April 2024

IT Governance

Stamm explain how a constrained neural network can be used to detect synthetic videos “at 98% accuracy”. US Department of Homeland Security announces AI Safety and Security Board The US DHS (Department of Homeland Security) has announced the establishment of its Artificial Intelligence Safety and Security Board.

article thumbnail

Seized Genesis Market Data is Now Searchable in Have I Been Pwned, Courtesy of the FBI and "Operation Cookie Monster"

Troy Hunt

Specific guidance prepared by the FBI in conjunction with the Dutch police on further steps you can take to protect yourself are detailed at the end of this blog post on the gold background. And in turn, the criminals adapt, which brings us to Genesis Market. Or that "data is the currency of the digital economy"?

Marketing 136
article thumbnail

Just in Time for Angular 17 - It’s Ignite UI 17.0.0!

Enterprise Software Blog

Plus, more things that are explored in detail in the Angular 17 Release blog – Introducing Angular v17 As Minko Gechev, Product and DevRel lead for Angular at Google, points out; " Angular’s renaissance has been going with full steam for the past couple of versions. Use the specific component string imports instead.