How to Check If Cambridge Analytica Could Access Your Facebook Data
WIRED Threat Level
APRIL 9, 2018
Facebook has released a tool that lets you see if you were caught up in the Cambridge Analytica fiasco—and what other apps know about you know.
WIRED Threat Level
APRIL 9, 2018
Facebook has released a tool that lets you see if you were caught up in the Cambridge Analytica fiasco—and what other apps know about you know.
Data Breach Today
APRIL 11, 2018
Second Congressional Hearing Probes Privacy Issues At a U.S. House hearing Wednesday, Facebook CEO Mark Zuckerberg said the company would eventually comply worldwide with the European Union's tough privacy law, the General Data Protection Regulation.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
The Guardian Data Protection
APRIL 10, 2018
People who fear their information may have been used by Cambridge Analytica can go to a new help page Tell us how you’ve been affected by the Facebook data breach Facebook has started the process of notifying the approximately 87 million users whose data was harvested by the election consultancy Cambridge Analytica. The social network eventually hopes to inform every user who was affected with a warning at the top of their Facebook news feed.
Schneier on Security
APRIL 9, 2018
This vulnerability is a result of an interaction between two different ways of handling e-mail addresses. Gmail ignores dots in addresses, so bruce.schneier@gmail.com is the same as bruceschneier@gmail.com is the same as b.r.u.c.e.schneier@gmail.com. (Note: I do not own any of those email addresses -- if they're even valid.) Netflix doesn't ignore dots, so those are all unique e-mail addresses and can each be used to register an account.
Advertiser: ZoomInfo
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
WIRED Threat Level
APRIL 10, 2018
A Facebook permission allowed an app to read messages between 1,500 Facebook users and their friends until October 2015—data that Cambridge Analytica could have accessed.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
The Guardian Data Protection
APRIL 12, 2018
Government moves ahead with legislation despite criticism from the opposition The Australian government is pushing ahead with controversial legislation it says will create “back doors” into encrypted communication services – but still can’t say when it will introduce the bill. After originally aiming to have the legislation before parliament in the first quarter of this year, the government has delayed its introduction.
Dark Reading
APRIL 9, 2018
Retailer says customer payment and other information may have been exposed via the breach of [24]7.ai online chat provider.
WIRED Threat Level
APRIL 9, 2018
Some network communication protocol vulnerabilities have been known for more than a decade and still aren't fixed. Now they're being exploited.
Data Breach Today
APRIL 9, 2018
Time Inc.'s Deputy CISO on the Challenge of Ensuring Content Security In this era of "fake news," Time Inc. Deputy CISO Preeti Palanisamy takes seriously the challenge of maintaining the integrity of journalism from content creation through production and eventual publication.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
The Guardian Data Protection
APRIL 11, 2018
Senators let Facebook’s founder off the hook – but that’s got nothing to do with them being tech dinosaurs Mark Zuckerberg: Facebook CEO faces second day of questioning – live When Mark Zuckerberg appears on Capitol Hill again for a second round of questioning, he will be hoping for nothing so much as a rerun of yesterday’s performance. That went so well, Facebook’s share price leapt 4.5% on the day – with most of the boost coinciding with Zuckerberg’s supposed grilling by a committee of senator
AIIM
APRIL 9, 2018
When you’re working to document your processes, an initial goal is to map the workflow of the typical, standard task, getting the most common branches outlined. This will comprise of the steps you know well, the steps that already run fairly smoothly. Yes, this will not cover every scenario, but that’s ok at this stage. An interpretation of Pareto’s Principle , otherwise known as The 80/20 Rule is that 80% of the completed work will come from 20% of the scenarios.
WIRED Threat Level
APRIL 12, 2018
A study finds that Android phones aren't just slow to get patched; sometimes they lie about being patched when they're not.
Data Breach Today
APRIL 12, 2018
At Least Eight U.S. Organizations Hit So Far This Year The Department of Health and Human Services is warning the healthcare sector about ongoing attacks involving SamSam ransomware that have impacted at least eight U.S. organizations so far this year. What mitigation steps are recommended?
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
The Guardian Data Protection
APRIL 7, 2018
Online surveillance is rife but there are plenty of tools available to help preserve your privacy If a picture is worth a thousand words, then a good metaphor must be worth a million. In an insightful blog post published on 23 March, Doc Searls, one of the elder statesman of the web, managed to get both for the price of one. His post was headed by one of those illustrations of an iceberg showing that only the tip is the visible part, while the great bulk of the object lies underwater.
IBM Big Data Hub
APRIL 9, 2018
There’s a general need for next-gen executives to not only understand corporate regulations, but be able to adhere to and follow them using metadata solutions like data governance. As the business world’s top asset becomes data, data governance will ensure that data and information being handled is consistent, reliable and trustworthy. Establishing and deploying an analytics platform that embeds data governance and data integration, amongst other solutions, has never been more critical.
WIRED Threat Level
APRIL 11, 2018
Russian agents used Facebook to influence the 2017 election. Congress missed the chance to delve into what the company knows about it—and how they’ll stop it in 2018.
Data Breach Today
APRIL 13, 2018
Company Must Submit More Audit Reports, Keep Bug Bounty Records Uber has agreed to stricter monitoring by the U.S. Federal Trade Commission following its concealment of a 2016 data breach while it was negotiating with the agency for a settlement tied to a separate, yet similar, breach two years prior.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
The Guardian Data Protection
APRIL 11, 2018
As embattled Facebook founder appears before Congress again, here is what should be put to him Zuckerberg made the rookie error of leaving out his notes, which an AP reporter promptly snapped. One section said: “Break up FB? US tech companies key asset for America; break up strengthens Chinese companies.” Really? That’s the best you’ve got? The senators need to drive this one home hard.
Imperial Violet
APRIL 10, 2018
In 2016, my colleague, Matt Braithwaite, ran an experiment in Google Chrome which integrated a post-quantum key-agreement primitive ( NewHope ) with a standard, elliptic-curve one (X25519). Since that time, the submissions for the 1 st round of NIST’s post-quantum process have arrived. We thus wanted to consider which of the submissions, representing the new state of the art, would be most suitable for future work on post-quantum confidentiality in TLS.
WIRED Threat Level
APRIL 9, 2018
A new study from Pew Research shows that the bulk of links on Twitter don't come from actual humans.
Data Breach Today
APRIL 10, 2018
Agari's Dan Hoffmann Outlines the Scale and Cost Business email compromise attacks that impersonate executives and business partners to trick employees are "the biggest security issue in all of technology today," says Dan Hoffmann of Agari.
Advertiser: ZoomInfo
ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!
The Guardian Data Protection
APRIL 12, 2018
New portability tool will allow users to extract copy of own content posted on social network Instagram has confirmed it will let users download their personal data, including previously shared photos, videos and messages, as it prepares for the European data regulation GDPR. While its parent company, Facebook, had announced a suite of GDPR controls, which Mark Zuckerberg emphasised during his testimony to Congress this week, Instagram had been quiet on the issue.
Lenny Zeltser
APRIL 9, 2018
Is it better to perform product management of information security solutions at a large company or at a startup? Picking the setting that’s right for you isn’t as simple as craving the exuberant energy of a young firm or coveting the resources and brand of an organization that’s been around for a while. Each environment has its challenges and advantages for product managers.
WIRED Threat Level
APRIL 10, 2018
[In his testimony to Congress, Facebook CEO Mark Zuckerberg repeatedly misrepresented the amount of control Facebook users really have over their data.]([link].
Data Breach Today
APRIL 10, 2018
Florida Sen. Bill Nelson: 'Facebook Failed Us' Facebook CEO Mark Zuckerberg informally met with U.S. lawmakers on Monday ahead of two congressional hearings, where he is expected to face a bruising examination. One senator was blunt with Zuckerberg, contending that on data privacy "Facebook failed us.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
The Guardian Data Protection
APRIL 13, 2018
We have no idea how much data tech firms have on us – but more companies are using it to personalize their prices We all know that ride-share companies like Uber and Lyft operate dynamic, or “surge”, pricing: they change their prices in real time, according to supply and demand. But is there something else behind these fluctuations in fees? Is your taxi fare actually being personalized according to how much the company thinks you are willing to pay?
TAB OnRecord
APRIL 12, 2018
Our most popular resources this month cover RIM software success, records protection and recovery, and green file storage solutions. Learn about strategies to ensure your RIM software is successful, how your RIM program strategy can help your organization after a large scale disaster in a hybrid environment, and how to reduce your environmental impact through [.
WIRED Threat Level
APRIL 10, 2018
Balint Seeber found that cities around the US are leaving their emergency siren radio communication systems unencrypted and vulnerable to spoofing.
Let's personalize your content