article thumbnail

GCHQ on Quantum Key Distribution

Schneier on Security

QKD also seems unsuitable for some of the grand future challenges such as securing the Internet of Things (IoT), big data, social media, or cloud applications. QKD technology cannot replace the flexible authentication mechanisms provided by contemporary public key signatures. I agree with them.

Big data 258
article thumbnail

MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

The Last Watchdog

Related: Cyber risks spinning out of IoT Credential stuffing and account takeovers – which take full advantage of Big Data, high-velocity software, and automation – inundated the internet in massive surges in 2018 and the first half of 2019, according to multiple reports.

Big data 164
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese threat actors extract big data and sell it on the dark web

SC Magazine

Among the incidents data stolen by Chinese hackers involved a Twitter database. Researchers on Monday reported that cybercriminals are taking advantage of China’s push to become a leader in big data by extracting legitimate big data sources and selling the stolen data on the Chinese-language dark web.

Big data 100
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

“CHENGDU 404 developed a ‘big data’ product named ‘ SonarX ,’ which was described…as an ‘Information Risk Assessment System,'” the government’s indictment reads. Chengdu404’s offices in China. Image: DOJ.

Antivirus 363
article thumbnail

Data-Centric Security and Big Data

Thales Cloud Protection & Licensing

Enter data-centric security… a set of technologies that lower the value of data through encryption, tokenization, data masking and access control methods. Data-centric security has been around for years but doesn’t receive the same level of media coverage, hype or attention that other security technologies do.

article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

He explained how Exabeam has taken some of the same data analytics techniques that banks have long used to staunch credit card fraud and applied them to filtering network data logs. Here are a few takeaways: Very Big Data. And now, Big Data is about to become Very Big Data. Coming of age.

Big data 157
article thumbnail

GUEST ESSAY: Did you know these 5 types of digital services are getting rich off your private data?

The Last Watchdog

Now more than ever before, “big data” is a term that is widely used by businesses and consumers alike. Consumers have begun to better understand how their data is being used, but many fail to realize the hidden privacy pitfalls in every day technology. Related: Europe tightens privacy rules.

Media 174