article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Kottmann also reportedly even posted some of the videos on Twitter, which later deleted the hacker’s account and their offending tweets. That type of information can be extremely valuable for things like identity theft.”. Thought leaders advise reducing or eliminating the use of these skeleton key-like accounts.

article thumbnail

The Rise of an Overlooked Crime – Cyberstalking

Security Affairs

These evils include hacking, identity theft, online surveillance, and cyberstalking. We all know the dangers associated with hacking, identity theft, and internet surveillance, thanks to Facebook and other social networking platforms. Most cyber stalkers are skilled hackers as well.

article thumbnail

Notification no-nos: What to avoid when alerting customers of a breach

SC Magazine

For instance, Winick cited a 2017 New York Post article that suggested credit rating company Equifax had blamed its software vendor for a major breach, “thus violating another crisis communications commandment of ‘Be accountable.’” Sometimes, however, a business offers very little in the way of comfort, helpful information or restitution.