article thumbnail

Lucky MVP 13

Troy Hunt

In last year's MVP announcement blog post , I talked about one of my favourite contributions of all that year being the Pwned Passwords ingestion pipeline for the FBI. Reading my posts, watching my videos, turning up to my talks and consuming services like HIBP and Pwned Passwords.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites. Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

Microsoft blogged about its attack at the hands of LAPSUS$, and about the group targeting its customers. “They were calling up consumer service and tech support personnel, instructing them to reset their passwords. The Twitter hackers largely pulled it off by brute force, writes Wired on the July 15, 2020 hack.

Phishing 263
article thumbnail

What will be your decisive moment to secure your cloud applications in a Zero Trust world?

Thales Cloud Protection & Licensing

The study also revealed that 94% of IT professionals say their organizations’ security policies around access management was influenced by breaches of consumer services in the last 12 months. appeared first on Data Security Blog | Thales eSecurity.

Cloud 115
article thumbnail

Data monetization: driving the new competitive edge in retail

CGI

The 2019 CGI Client Global Insights reveals that harnessing the power of data analytics to drive real-time insights and improved personalization for new revenue streams is a top business priority for the retail and consumer services executives interviewed. Blog moderation guidelines and term of use. Add new comment.

Retail 96
article thumbnail

This is the old ChiefTech blog.: Another Web 2.0 service model risk blown away - Google and Postini

ChiefTech

This is the old ChiefTech blog. However, you need to come over and see my new blog at chieftech.com.au. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. blog I work at Headshift , a social media and social computing consultancy, as a Senior Business & Technical Consultant.

Risk 40
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Every time this very blog loads Font Awesome from Cloudflare's CDN, for example, it's verified against the hash in the integrity attribute of the script tag (view source for yourself). The 1 hash that won't yield any search results (until Google indexes this blog post.) is the middle one. And for what?

Passwords 122