Your car will eventually live-stream video of your driving to the cloud

Credit to Author: Lucas Mearian| Date: Fri, 28 Apr 2017 10:40:00 -0700

As self-driving cars become more advanced with a greater number of onboard computers, sensors, cameras and WiFi, the amount of data is expected to balloon, providing automakers, insurers and others with rich information to harvest.

A single autonomous car could generate as much as 100GB of data every second, said Barclays analyst Brian Johnson, in a note published Wednesday.

autonomous cars big data Barclays

If extrapolated out to the entire U.S. fleet of vehicles — 260 million in number — autonomous cars and trucks could potentially produce about 5,800 exabytes, Johnson stated.

To read this article in full or to leave a comment, please click here

Read more

Fertility patient data breach fine would have been much higher under GDPR

Credit to Author: John Bryan CIPP/E| Date: Fri, 28 Apr 2017 14:35:17 +0000

What happened at Lister Hospital serves as an example to all businesses as how easy it is to fall foul of the new data privacy legislations.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=33331&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/oNd7hMLrB5o” height=”1″ width=”1″ alt=””/>

Read more

An Obscure App Flaw Creates Backdoors In Millions of Smartphones

Credit to Author: Andy Greenberg| Date: Fri, 28 Apr 2017 11:00:26 +0000

An Obscure App Flaw Creates Backdoors In Millions of Smartphones

Researchers at the University of Michigan expose how an obscure feature of thousands of apps can give hackers remote access into your phone’s most sensitive guts. The post An Obscure App Flaw Creates Backdoors In Millions of Smartphones appeared first on WIRED.

Read more

Executive Insights: Achieving Digital Trust in a World of Data

Credit to Author: Drew Del Matto| Date: Fri, 28 Apr 2017 08:26:27 -0700

Cybersecurity is at a critical tipping point.  With massive volumes of data being generated and analyzed across the globe every day from a variety of sources and devices, an entirely new approach to network security is required. From both a business and technology perspective, traditional security paradigms are struggling to be agile and fast enough to move at the speed required in this new world.  The linchpin to success going forward will be a business’ ability to flexibly secure its sensitive data and create digital trust with its customers.

Read more

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 24, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 28 Apr 2017 12:26:11 +0000

There was a time when a person’s motivation to hack something was for financial reasons or for street cred. But now we’re seeing organizations that have other motivations. Pawn Storm is a cyber-espionage organization whose motives include foreign and domestic espionage, and influence on geopolitics. Trend Micro has been following the organization for quite some…

Read more

Ransomware attacks are taking a bigger toll on victims' wallets

Credit to Author: Michael Kan| Date: Thu, 27 Apr 2017 11:26:00 -0700

Hackers spreading ransomware are getting greedier. In 2016, the average ransom demand to free computers hit with the infection rose to $1,077, up from $294 the year before, according to security firm Symantec.

“Attackers clearly think that there’s more to be squeezed from victims,” Symantec said in a Wednesday report

In addition, the security company has been detecting more ransomware infection attempts. In 2016, the figure jumped 36 percent compared with the prior year.  

To read this article in full or to leave a comment, please click here

Read more