article thumbnail

Threat Model Thursday: Technology Consumers

Adam Shostack

It opens “While many forms of data-driven surveillance are now a ‘fact’ of contemporary life amidst datafication, obtaining concrete knowledge of how different institutions exploit data presents an ongoing challenge, requiring the expertise and power to untangle increasingly complex and opaque technological and institutional arrangements.”

article thumbnail

Strong toolsets and a focus on risk makes security a business enabler

SC Magazine

The security team at bp built a risk barometer that put the company more in touch with its security performance. Today’s columnist, Monzy Merza of Databricks, says by combining a focus on risk with strong tools companies can make security a business enabler. JeepersMedia CreativeCommons Credit: CC BY 2.0.

Risk 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Navigating the Web of Romance Scams: A Guide for Businesses and Consumers

Webroot

These scams don’t just harm individuals financially and emotionally; they can also pose significant risks to businesses. When their judgment is clouded by personal issues, such as those stemming from a romance scam, this line of defense can weaken, exposing the organization to increased risk.

Scams 80
article thumbnail

Privacy Device Designed to Defend Against Illegal Wireless Tracking

SecureWorld News

As the world becomes increasingly digitized, our personal privacy and even physical safety are under threat from a variety of sources. One technology that has raised particular concerns is personal Bluetooth Low Energy (BLE) trackers. It is affordable and designed for anyone who values their privacy and security.

Wireless 101
article thumbnail

Unmasking 2024’s Email Security Landscape

Security Affairs

VIPRE Security Group’s latest report, “Email Security in 2024: An Expert Insight into Email Threats,” delves into the cutting-edge tactics and technologies embraced by cybercriminals this year. This scam cleverly manipulates trust and the routine nature of order confirmations to breach personal security.

Phishing 119
article thumbnail

Apple Guidance on Intimate Partner Surveillance

Adam Shostack

Apple has released (or I’ve just come across) a document Device and Data Access when Personal Safety is At Risk. What you share, and whom you share it with, is up to you — including the decision to make changes to better protect your information or personal safety.

article thumbnail

When Accounts are "Hacked" Due to Poor Passwords, Victims Must Share the Blame

Troy Hunt

In fact, the FTC in the US has been very clear about this: if customer data was put at risk by credential stuffing, then being the innocent corporate victim is no defence to an enforcement case. They made a decision of their own free volition which put them at risk and now they're suffering as a result.

Passwords 238