Remove 2010 Remove Internet Remove Technology
article thumbnail

RSAC Fireside Chat: Jscrambler levels-up JavaScript security, slows GenAI-fueled privacy loss

The Last Watchdog

This brought to mind 2010, the year I wrote news stories for USA TODAY about Mark Zuckerberg declaring privacy was “ no longer a social norm ” and Google CEO Eric Schmidt admitting that Google’s privacy policy was to “ get right up to the creepy line and not cross it.” For a full drill down, please give the a listen.

article thumbnail

How to Protect Operational Technology (OT) from Cyber Threats

CyberSecurity Insiders

By Jayakumar (Jay) Kurup, Global Sales Engineering Director at Morphisec Securing operational technology (OT) creates unique challenges. Sometimes this is due to cultural reasons (management’s fear of even the slightest chance of disruption); other times, it is technological.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How security leaders can effectively manage Gen Z staff

CSO Magazine

Gen Z refers to those born between mid-to-late 1990s and 2010, making them between the ages of 11 and 28. This means they grew up experiencing a much faster rate in which technology evolves. In doing so, I had to educate myself on what they value and realized the many differences between Gen Z and previous generations.

Education 126
article thumbnail

No SOCKS, No Shoes, No Malware Proxy Services!

Krebs on Security

With the recent demise of several popular “proxy” services that let cybercriminals route their malicious traffic through hacked PCs, there is now something of a supply chain crisis gripping the underbelly of the Internet. com , a malware-based proxy network that has been in existence since at least 2010. Image: Spur.us.

Malware 281
article thumbnail

Tracing what went wrong in 2012 for today’s teens, with Dr. Jean Twenge: Lock and Code S04E10

Malwarebytes

After more than a decade of our most recent technological experiment, in turns out that having the entirety of the internet in the palm of your hands could be … not so great. In the same time period for the same group, there was in increase in diagnoses of depression by 106%, ADHD by 72%, bipolar by 57%, and anorexia by 100%.

Media 77
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

Before the Internet revolution, military-grade electronics were different from consumer-grade. The military responded by creating a category of military hardware called COTS: commercial off-the-shelf technology. They're used by election officials, police at all levels, nuclear power plant operators, CEOs and human rights activists.

article thumbnail

BORN Ontario data breach impacted 3.4 million newborns and pregnancy care patients

Security Affairs

. “The personal health information that was copied was collected from a large network of mostly Ontario health care facilities and providers regarding fertility, pregnancy, newborn and child health care offered between January 2010 and May 2023.”