366 results for 'data leak'
Cybersecurity
Biggest Data Breaches And Cyber Hacks of 2023 And 2024
Every time you endlessly scroll down your social media feed, two cyberattacks will happen somewhere in the world, occurring at a rate of one attack every 39 seconds. Experts predict that data breaches will cost the global economy $9.5 trillion in 2024. Given that most of us will use the same email address for multiple […]
Cybersecurity
2M Student Records Leaked Through LectureNotes App
Cybernews researchers have discovered a misconfigured database on the LectureNotes Learning App, which has exposed the data of over 2 million student users on the internet. LectureNotes, which enables faculties to share notes with students via web, Android, and iOS, leaked 2,165,139 records, including username, first name, last name, email, password (encrypted), phone number, IP […]
Online Privacy
IP Leak
What Is an IP Leak? An IP leak occurs when your VPN unintentionally fails to properly mask your IP address, resulting in an exposure. Initially, VPNs (Virtual Private Networks) were designed to switch your native IP address with a temporary one belonging to a server in a selected country. If used correctly, the best VPNs […]
Cybersecurity
23andMe Data Breach: When Genetic Privacy Becomes a Commodity
In 2020, the business world took notice as investment firm Blackstone acquired Ancestry, a leading online platform for family history, in a staggering $4.7 billion deal. Owning an extensive database of 27 billion records and a DNA network of over 18 million individuals, the acquisition fueled debates about the commodification of genetic privacy. The inherent inability […]
Data Management
Why You Should Always Destroy Your Own Data
You’ve got technological defenses, robust IT governance, and a cyber-aware workforce. Your data is safeguarded, replicated, and backed up. That’s great, there’s just one more thing you need to know: Why you should destroy your own data. Why You Should Destroy Your Own Data Given the efforts we take to protect data and to satisfy […]
Machine Learning
Unstructured Data: A Hurdle in Embracing AI Technology
Artificial intelligence (AI) is capable of doing things that were previously unimaginable. It can distinguish between a pedestrian and a road sign to guide a self-driven car, review the tone of an article and provide feedback, provide helpful patient data to a doctor, and fulfil a thousand other time-saving and thoughtful jobs. However, to do […]
Information Assurance
10 Biggest Data Breaches of All Time - And How to Prevent Them
Data breaches. The term itself can ring alarm bells in most organizations, and for good reason. A data breach usually means thousands spent on remedial measures, millions in regulatory fines and the invaluable loss of customers' trust and confidence. (Also read: Massive Data Breaches: The Truth You Might Not Know About.) There have been numerous […]
Encryption
Encryption Just Isn't Enough: Critical Truths About Data Security
The high-tech world uses a centuries-old tradition to protect your information. It encodes or encrypts your data. That encryption is why you see “HTTPS” with a green padlock in the URL bar. Notice the “s” at the end. It means “secure hypertext transfer protocol”, telling you the data on this website is encrypted to ensure […]
Software-as-a-Service (SaaS)
Privacy Issues in the New Big Data Economy
To succeed in the new data economy, companies are collecting massive amounts of consumer data. But these collection efforts rarely involve transparent explanations regarding data usage — and that’s a legitimate reason for consumers and privacy advocates to be concerned. I first realized the problems posed by big data collection back in 2012. That’s when […]
Emerging Technology
Cloud Computing and Cloud Servers: How Do You Know Your Cloud Data is Protected?
We don't necessarily associate clouds with stability – after all, the clouds you see out your office window (hopefully you have one) will change shape multiple times throughout the course of, say, drafting and sending an email. But thanks to the meteoric rise of cloud computing over the past decade-plus (and the growth that’s widely […]
Latest News
Machine Learning
Can ByteDance’s OmniHuman-1 Outperform Sora & Veo? In-Depth Analysis
5 hoursAI JournalistPrivacy and Compliance
TikTok, WeChat, AliExpress: Will EU’s GDPR Privacy Rules Start to Turn Against China?
7 hoursSenior Technology JournalistBlockchain
Berachain Mainnet Launch & Airdrop: All You Need to Know
4 hoursCrypto & Blockchain WriterCyber Threats
Does “Bring Your Own AI” (BYOAI) Pose a Cyber Threat to Your Business?
24 hoursTech JournalistMachine Learning
EU’s $56M OpenEuroLLM Investment Isn’t Enough, Experts Say
1 dayTechnology JournalistCyber Threats