article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

The amount of data in the world topped an astounding 59 zetabytes in 2020, much of it pooling in data lakes. We’ve barely scratched the surface of applying artificial intelligence and advanced data analytics to the raw data collecting in these gargantuan cloud-storage structures erected by Amazon, Microsoft and Google.

article thumbnail

For months, JusTalk messages were accessible to everyone on the Internet

Malwarebytes

JusTalk, a popular mobile video calling and messaging app with 20 million global users, exposed a massive database of supposedly private messages to the public Internet for months. The open database is a logging database the company, Ningbo Jus Internet Technology , uses to keep track of app bugs and errors. Zack Whittaker, TechCrunch.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

For months, JusTalk messages were accessible to everyone on the Internet

Malwarebytes

JusTalk, a popular mobile video calling and messaging app with 20 million global users, exposed a massive database of supposedly private messages to the public Internet for months. The open database is a logging database the company, Ningbo Jus Internet Technology , uses to keep track of app bugs and errors. Zack Whittaker, TechCrunch.

article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

Key Findings: MY2022, an app mandated for use by all attendees of the 2022 Olympic Games in Beijing, has a simple but devastating flaw where encryption protecting users’ voice audio and file transfers can be trivially sidestepped. Citizen Lab examined the app and found it riddled with security holes.

article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

Invariably, Internet of Things (IoT) strategies form the backbone of those efforts. Enormous quantities of data can be generated by and collected from a wide variety of IoT devices. Finally, it is difficult to underemphasise the importance of encryption to protect sensitive data collected by IoT devices.

article thumbnail

Data Brokers: What They Are and How to Safeguard Your Privacy

IT Security Guru

Data brokers are businesses or individuals who collect and sell people’s personal information, including phone details and browsing behavior. In this post, we will look at how data brokers operate and some critical steps we can take to protect our personal information better. The Internet is also a rich source of information.

article thumbnail

DNS-over-HTTPS takes another small step towards global domination

Malwarebytes

Firefox recently announced that it will be rolling out DNS-over-HTTPS (or DoH) soon to one percent of its Canadian users as part of its partnership with CIRA (the Canadian Internet Registration Authority), the Ontario-based organization responsible for managing the.ca ” The downside of encrypting DNS.

DNS 106