article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

The amount of data in the world topped an astounding 59 zetabytes in 2020, much of it pooling in data lakes. We’ve barely scratched the surface of applying artificial intelligence and advanced data analytics to the raw data collecting in these gargantuan cloud-storage structures erected by Amazon, Microsoft and Google.

article thumbnail

Apple Mail stores parts of encrypted emails in plaintext DB

Security Affairs

The Apple Mail app available on macOS stores leave s a portion of users encrypted emails in plaintext in a database called snippets. The Apple expert Bob Gendler discovered that the Apple Mail app available on macOS stores leaves a portion of users encrypted emails in plaintext in a database called snippets. ” continues the post.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

Key Findings: MY2022, an app mandated for use by all attendees of the 2022 Olympic Games in Beijing, has a simple but devastating flaw where encryption protecting users’ voice audio and file transfers can be trivially sidestepped. Citizen Lab examined the app and found it riddled with security holes.

article thumbnail

The Future of Privacy: How Big Tech Is Changing the Way We Think About Our Data

Cytelligence

It heightens our awareness of extensive data collection about us, revealing potential uses and instigating concerns about potential misuse. Privacy policies from these tech giants, while intricate, are crucial in understanding the data collected and its uses. The impact of Big Tech on privacy is multifaceted.

article thumbnail

5G Security

Schneier on Security

To be sure, there are significant security improvements in 5G over 4G­in encryption, authentication, integrity protection, privacy, and network availability. But the enhancements aren't enough. The 5G security problems are threefold. First, the standards are simply too complex to implement securely. Susan Gordon, then-U.S. What's more, U.S.

article thumbnail

The nature of cyber incidents

SecureList

The report contains anonymized data collected by the Kaspersky Global Emergency Response Team (GERT), which is our main incident response and digital forensics unit. of those cases, cybercriminals had had access to target systems for more than a month before they started file encryption.

article thumbnail

What’s up with WhatsApp’s privacy policy?

Malwarebytes

Simply by having to explain the differences between forms of messaging, data collection is thrown into sharp relief. That is to say, you may not have known prior to this how much…or little…your favourite apps collect. The data collection genie is out of the bottle, and yet it may not matter too much.