Remove Cybercrime Remove Data collection Remove Whitepaper
article thumbnail

Thomson Reuters collected and leaked at least 3TB of sensitive data

Security Affairs

Either way, even if all of the data was essential, that doesn’t make it less sensitive if leaked. Cases like these raise questions about corporate data collection practices. The ramifications of a data leak of such scale are worrying to say the least,” Sasnauskas explained. Exposed in the past?

IoT 127
article thumbnail

‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

SecureList

within network activity logs collected by the Internet Service Provider (ISP), etc.). Below are some examples of the type of data collected and strategies of collection and analysis during the technical attribution process. What are the difficulties, uncertainties and limitations of technical attribution?