Terbium Labs has announced the release of Dark Web data analytics software Matchlight to corporate players that wish to be alerted to the theft of data immediately -- rather than days or months after the damage is done. On Tuesday, the Baltimore, MD.-based company said Matchlight is now available through either a web portal or API at what Terbium calls a "reasonable price point" so both SMBs and larger enterprise players can access the service. Now out of a private beta started in June 2015 with companies including MasterCard, IBM and LifeLock, the fully automated system allows companies to outsource part of their cybersecurity requirements and potentially mitigate the damage caused by data breaches. Terbium Labs calls itself a company which protects the enterprise from "relentless attempts to steal data for personal, monetary or political gain." The Dark Web, a small section of the Deep Web which is not indexed by common search engines including Google and Bing, is the most prolific area to acquire data stolen from businesses.
Millions of LinkedIn users' passwords leaked in a massive breach in 2012 have turned up for sale this week on a dark web market site for about 5 bitcoin, or approximately 2,200. It was intially reported that the security breach affected only 6.5 million users, but media reports Wednesday said 167 million accounts had been leaked, including 117 million featuring both emails and encrypted passwords. Members who used the same password for LinkedIn and other sites might face the most risk. The hacker behind the privacy breach put the LinkedIn credentials up for sale this week on a dark web market known as the Real Deal. It's unknown how the dealer, who goes by the name Peace, obtained the information.
All it takes is 300 "likes" while you're scrolling through your newsfeed -- that's the point at which Facebook knows you better than your own spouse or your best friend. So if you're averaging 10 "likes" a day, it will take just a month for the social network behemoth to have you figured out more accurately than the people you consider your soul mates. And if you're a compulsive clicker of the "thumbs up" icon, Facebook may have insight into your innermost thoughts and feelings in a mere week-and-a-half. If that alarms you, then you may want to take note of a conference coming up at Concordia University next week in which academics will meet to tackle the tricky issue of digital privacy and to ask the question: Are Google, Facebook, Apple, Amazon and Microsoft controlling our lives? Organizer Bipin Desai believes they are -- that's why he never uses Google to search for anything, nor Google maps to navigate.
Every internet-connected device is a potential weapon for a cyberattacker. A report examining the potential cybersecurity holes within an emerging connected technology notes that it's "slowly becoming more popular but the security built into the specification is a cause for concern". Furthermore, the document details how the technology contains security risks including "loss of confidentiality", which can stem from, among other things, "default configuration" and "person-in-the-middle" and "DoS [Denial of Service] attacks". It might sound like the recent warnings about the cybersecurity concerns facing the Internet of Things, but the text is in fact from a paper entitled'Bluetooth and Its Inherent Security Issues', which was published 14 years ago. As Bluetooth developed, so its security improved -- but the recent security problems with Internet of Things suggests that the same issues have to be dealt with all over again.
Read more About Boomi and Dell IoT and how it is preparing the IT sector to face the future. A It is an ecosystem where sensors, devices and equipment are connected to a network and can transmit and receive data for tracking, analysis and action. IoT is a concept that can be (and is already being) applied to many industries – healthcare, transport, civic management, manufacturing, auto sector etc. It affects all of us on a personal and professional front. A Creating secure and scalable Internet of Things solutions takes a tall stack of technology and, often, a robust set of partners.