Here's What It's Like to Accidentally Expose the Data of 230M People

Here's What It's Like to Accidentally Expose the Data of 230M People

"As you can imagine," Hardigree says, "I went into panic mode." The day before that scrum, WIRED had revealed that Exactis exposed a database of 340 million records on the open internet, as first spotted by an independent security researcher named Vinny Troia.

Internal Docs Show How ICE Gets Surveillance Help From Local Cops

Internal Docs Show How ICE Gets Surveillance Help From Local Cops

The internal documents show that through its Vigilant Solutions contract, which began in 2018 and runs to September 2020, ICE has access not only to five billion records gathered by private businesses, but also to 1.5 billion data points contributed by over 80 local law enforcement agencies from more than a dozen states.

Security News This Week: The US Tracked Journalists Reporting on the Migrant Caravan

Security News This Week: The US Tracked Journalists Reporting on the Migrant Caravan

After the Migrant Caravan, the US Gov Tracked Journalists and Activists According to documents obtained by the local NBC 7 news station in San Diego, the US government has reportedly created a secret database to track journalists, activists, and at least one lawyer.

An Email Marketing Company Left 809 Million Records Exposed Online

An Email Marketing Company Left 809 Million Records Exposed Online

"This is just another case where someone has my data, and hundreds of millions of other people’s data, and I’ve absolutely no idea how they got it." Security Researcher Troy Hunt In the exposed database, the researchers also found some of what appear to be Verifications.io’s own internal tools like test email accounts, hundreds of SMTP (email sending) servers, the text of emails, anti-spam evasion infrastructure, keywords to avoid, and IP addresses to blacklist.

An Email Marketing Company Left 809 Million Records Exposed Online

An Email Marketing Company Left 809 Million Records Exposed Online

Last week, security researchers Bob Diachenko and Vinny Troia discovered an unprotected, publicly accessible MongoDB database containing 150 gigabytes-worth of detailed, plaintext marketing data—including 763 million unique email addresses. The database, owned by the "email validation" firm Verifications.io, was taken offline the same day Diachenko reported it to the company.

The Piracy Wars Are Over. Let's Talk about Data Incumbency

The Piracy Wars Are Over. Let's Talk about Data Incumbency

The EU copyright proposals reflect the view that the main problem for artists is still Internet “piracy” in different forms, such as the notional “ value gap ” between what the recording industry gets paid for licensed music by YouTube and other platforms, and what it thinks it should get paid.

No, Data Is Not the New Oil

No, Data Is Not the New Oil

Newly installed California governor Gavin Newsom recently proposed an ambitious “data dividend” plan , whereby companies like Facebook or Google would pay their users a fraction of the revenue derived from the users’ data.

Inside the Alexa-Friendly World of Wikidata

Inside the Alexa-Friendly World of Wikidata

The connections forged between nuggets of knowledge in Wikidata allow computers to answer complex questions in fractions of a second, without having to trawl through multiple web pages or databases.

Should Big Tech Own Our Personal Data?

Should Big Tech Own Our Personal Data?

Now, internet-based companies like Google and Facebook have added an entirely new wrinkle to this business model: instead of charging for their products, they give them away in exchange for vacuuming up our personal data and monetizing it in various ways.

A Google Chrome Extension Will Save You From Unsafe Passwords

A Google Chrome Extension Will Save You From Unsafe Passwords

A Google Chrome Extension Will Save You From Unsafe Passwords Casey Chin Data breaches that compromise people's usernames and passwords have become so common, and used in crime for so long, that millions of stolen credential pairs have actually become practically worthless to criminals, circulating online for free.

How Tim Cook’s Data Broker Registry Might Actually Work

How Tim Cook’s Data Broker Registry Might Actually Work

But it has to cover the tech giants and brick and mortar stores, too." Even some data brokers have come around to the idea of a federal privacy law, as long as it levels the playing field for all industries in all states.

A Worldwide Hacking Spree Uses DNS Trickery to Nab Data

A Worldwide Hacking Spree Uses DNS Trickery to Nab Data

Using a classic tactic to undermine data security as it moves across the web, hackers have grabbed sensitive data like login credentials and business details from telecoms, internet service providers, government organizations, and other institutions in the Middle East, North Africa, Europe, and North America.

The WIRED Guide to Data Breaches

The WIRED Guide to Data Breaches

The site the company set up for victims was itself vulnerable to attack, and it asked for the last six digits of people's Social Security numbers to check if their data had been impacted by the breach.

How Google Keeps Its Power-Hungry Operations Carbon Neutral

How Google Keeps Its Power-Hungry Operations Carbon Neutral

Google achieves this three ways, according to its most recent Environmental Report: by reducing its demand, by buying renewables to offset its use of non-renewable energy, and with other offsets, like capturing methane gas from animal waste.Data centers are a large source of emissions, and emissions from Google’s data centers and internet infrastructure are estimated to account for 40 percent of the internet’s carbon footprint.

Handwritten files provide sediment treasure chest

Handwritten files provide sediment treasure chest

Dr Bostock first started work on the database 10 years ago when she was looking for information for a project that required her to look up archived paper files dating back to the 1970s and then digitise them.

Introducing the online guide to the World Development Indicators: A new way to discover data on development

Introducing the online guide to the World Development Indicators: A new way to discover data on development

The goal is to provide a useful, easily accessible guide to the database and make it easy for users to discover what type of indicators are available, how they’re collected, and how they can be visualized to analyze development trends.

How Our Biological Clock Could Dictate Medical Treatments

How Our Biological Clock Could Dictate Medical Treatments

(The gold-standard test, the dim light melatonin onset assay, or DLMO for short, involves closely monitoring a patient's melatonin levels by sitting them in a dimly lit room and collecting their spit or blood every 30 minutes for a day or more.) And second, it's not always easy or practical to tell which therapies would benefit most from optimally timed administration.This week, researchers announced advances that confront both those issues: A simple blood test that researchers say could help infer a person's circadian rhythm, and a database of clock genes that encode targets for thousands of existing drugs.

How can Bangladesh increase its resilience to disasters through data sharing?

How can Bangladesh increase its resilience to disasters through data sharing?

By using the GeoDASH platform - a geospatial data sharing platform - the Directorate of Primary Education of Bangladesh has assessed 35,000 schools with respect to the type of infrastructure, water and sanitation facilities, access to roads, and overall capacity during natural disasters.