article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

In some cases, the scammers create dashboard accounts in the business’s names at Dun & Bradstreet’s credit builder portal; in others, the bad guys have actually hacked existing business accounts at DNB, requesting a new DUNS numbers for the business (a DUNS number is a unique, nine-digit identifier for businesses).

article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Subcommittee on Digital Commerce and Consumer Protection. I am a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an advisory board member of Electronic Privacy Information Center and VerifiedVoting.org.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Government Accountability Office Releases New Report On The Internet of Things (IoT)

Privacy and Cybersecurity Law

The GAO also convened a number of expert meetings during the drafting process, bringing together experts from various disciplines, including computer science, security, privacy, law, economics, physics, and product development. Cloud computing. Cloud computing allows for increased computer processing. Data analytics.

IoT 40
article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

It’s about challenging our expectations about people who hack for a living. companies like Verizon, Google, Microsoft, State Street Bank, mutual, BNP Paribas, some oil companies, and and then through our work at MIT Sloan, we also get very much involved with the Computer Science and Artificial Intelligence Laboratory which is CSAIL.