article thumbnail

Chinese threat actors extract big data and sell it on the dark web

SC Magazine

Among the incidents data stolen by Chinese hackers involved a Twitter database. Researchers on Monday reported that cybercriminals are taking advantage of China’s push to become a leader in big data by extracting legitimate big data sources and selling the stolen data on the Chinese-language dark web.

Big data 100
article thumbnail

Financial Services Data – More at risk than you’d believe

Thales Cloud Protection & Licensing

With digital transformation technologies like cloud, big data, IoT, containers, mobile payments and blockchain all in play, there are many new attack surfaces and risks to financial data. Each and every environment and instance requires a data security plan and implementation tuned to the environment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

The increasing trend of using mobile payments for in-store purchases (especially during the pandemic) is leading criminals to increasingly focus their efforts on defrauding people through online fraud and scams. As more and more people and businesses rely on mobile banking applications, they become vulnerable to fraud.

Retail 143
article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks — there’s no denying that. Related: How Russia uses mobile apps to radicalize U.S. The Creeper worm would jump from one computer to another.

article thumbnail

Win the connected and autonomous car race while protecting data privacy

Thales Cloud Protection & Licensing

Employing big data analytics to gather insights to capitalize on customer behavior, understand product performance, and predict failures. More data in more places means more risks. This honeypot of information puts manufacturers at major risk from cyber attacks.

article thumbnail

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Mobile app? It includes multi-disciplinary risk and compliance management solutions and tools, including: IT & security risk management.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Indeed, APIs have opened new horizons of cloud services, mobile computing and IoT infrastructure, with much more to come. Yet, API security risks haven’t gotten the attention they deserve. Salt Security is taking a big data and automation approach to this monumental challenge, Isbitski told me.

Big data 240