Remove ip-theft-definition-and-examples
article thumbnail

IP Theft: Definition and Examples

Digital Guardian

IP theft can have a long term damaging effects on a company. In this blog, we look at nearly 50 different examples of IP theft to help you better understand the threat.

109
109
article thumbnail

The ultimate guide to Cyber risk management

CyberSecurity Insiders

This blog was written by an independent guest blogger. We’ll discuss control categorization and approaches with an example. We’ll discuss control categorization and approaches with an example. Cyber risk assessment example. Let's understand the stages of risk assessment with the help of an example.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IRL Analogies Explaining Digital Concepts are Terrible

Troy Hunt

I got to thinking about this again over the weekend after watching responses to this blog post: Regarding the case of the 19-year-old Canadian bloke accused of "hacking" by modifying the URL to pull down other documents, I wanted to write down some thoughts on it: Is Enumerating Resources on a Website "Hacking"?

Internet 210
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Four and a half years ago now, I rolled out version 2 of HIBP's Pwned Passwords that implemented a really cool k-anonymity model courtesy of the brains at Cloudflare. Later in 2018, I did the same thing with the email address search feature used by Mozilla, 1Password and a handful of other paying subscribers. It's insecure and deprecated.

Passwords 308
article thumbnail

The Have I Been Pwned API Now Has Different Rate Limits and Annual Billing

Troy Hunt

Here goes: The Rate Limits and (Some) Pricing is Different The launch blog post for the authenticated API explained the original rationale behind the $3.50 Here goes: The Rate Limits and (Some) Pricing is Different The launch blog post for the authenticated API explained the original rationale behind the $3.50

article thumbnail

Detecting and Preventing Insider Threats in the Cloud

McAfee

For example, in a recent lawsuit that Google subsidiary Waymo filed against Uber in February 2017, the company alleges that a former Google employee downloaded 14,000 sensitive documents related to self-driving car technology before leaving the company. As cloud use in the enterprise has evolved, so have cloud security priorities.

article thumbnail

RM3 – Curiosities of the wildest banking malware

Fox IT

But if you would like to understand the rather tortured history of this particular malware a little better, the research and blog posts on the subject by Check Point are a good starting point. fumik0_ & the RIFT Team. Our Research and Intelligence Fusion Team have been tracking the Gozi variant RM3 for close to 30 months. Introduction.

Banking 98