article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

The Last Watchdog

Machine identities are what make hybrid business networks possible; they are nothing less than the key to stitching together emerging IoT- and 5G-centric systems. At the end of the day the CSO the CIO and the CEO all left the company. Hudson : The Government Accountability Office examined the Equifax breach.

Marketing 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Rise of an Overlooked Crime – Cyberstalking

Security Affairs

These evils include hacking, identity theft, online surveillance, and cyberstalking. We all know the dangers associated with hacking, identity theft, and internet surveillance, thanks to Facebook and other social networking platforms. He writes about online security and privacy, IoT, AI, and Big Data.

article thumbnail

Theme of Cooperation Resounds at 10th Annual Denver Conference

SecureWorld News

It could be your IT systems, your operation technology, your IoT, your industrial control systems, or SCADA environments.". Jason Miller, CSO of Paper Excellence, tackled an interesting topic in "Physical and Digital Cyber Defense: Building Culture and Collaboration." It's all about forcing people to think on their feet, Collins said.

CISO 73