WHY IT MATTERS: Digital Transformation
214.7K views | +2 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Internet', 'Security'. Clear
Scooped by Farid Mheir
Scoop.it!

An Absurdly Basic Bug Let Anyone Grab All of Parler's Data via @WIRED HT @NunoBarbeita @umlaut21

An Absurdly Basic Bug Let Anyone Grab All of Parler's Data via @WIRED HT @NunoBarbeita @umlaut21 | WHY IT MATTERS: Digital Transformation | Scoop.it

Parler lacked the most basic security measures that would have prevented the automated scraping of the site's data. It even ordered its posts by number in the site's URLs, so that anyone could have easily, programmatically downloaded the site's millions of posts. Parler's cardinal security sin is known as an insecure direct object reference,

Farid Mheir's insight:

WHY IT MATTERS: security has become central in our age of digital transformation. Yet, it seems, most people are either unaware of basic security principles, or not willing to invest time or money to do it. And I am not even talking of doing it *well*. Just implementing proper security measure. In this case it affect Parler, which in itself I don't much care about (they deserve it for such a stupid mistake). But their lack of security impacts their users privacy as well. And that includes potentially millions of people (in the photo, 68000 video have been geolocated - too bad for keeping your anonymity ;-)

No comment yet.
Scooped by Farid Mheir
Scoop.it!

If your job is in Marketing, PR, Facilities support, R&D, engineering, Legal or Sales then you are more at risk of cyberattacks - Cybersecurity Threat Report from @Proofpoint

If your job is in Marketing, PR, Facilities support, R&D, engineering, Legal or Sales then you are more at risk of cyberattacks - Cybersecurity Threat Report from @Proofpoint | WHY IT MATTERS: Digital Transformation | Scoop.it

Protecting People cybersecurity threat report explores who’s being targeted, how they’re being attacked, and what you can do about it.

Farid Mheir's insight:

WHY IT MATTERS: this report provides data on cybersecurity attacks and the resources most at risk in organizations.

Matt Hulsey's comment, September 19, 2022 7:10 PM
Surprised to see Facilities so high up the list
Scooped by Farid Mheir
Scoop.it!

Internet Domain fraud report from @Proofpoint provides useful data on the more than 350M top level domain names out there and how they can be used for fraud

Internet Domain fraud report from @Proofpoint provides useful data on the more than 350M top level domain names out there and how they can be used for fraud | WHY IT MATTERS: Digital Transformation | Scoop.it

Every year, millions of fraudulent web domains are registered by threat actors looking to impersonate trusted brands. Using these domains, they launch phishing attacks or other scams.

What are the latest trends around fraudulent domains, and how can you protect your organization?

Download the report now to learn: 

  • How threat actors create fraudulent domains
  • What characterizes fraudulent and legitimate domains
  • Which keywords and top-level domains (TLD) are trending
  • How fraudulent domains use email to launch attacks
Farid Mheir's insight:

WHY IT MATTERS: there are 350 million top level domain names - TLDNs - from google.com to fmcs.digital. This report provides a set of data about TLDNs and how they are used for fraud. A bit geeky but very interesting read.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Web security resources from @mozilla are #mustRead #essentials

Web security resources from @mozilla are #mustRead #essentials | WHY IT MATTERS: Digital Transformation | Scoop.it

Ensuring that your website or open web application is secure is critical. Even simple bugs in your code can result in private information being leaked, and bad people are out there trying to find ways to steal data. The web security oriented articles listed here provide information that may help you secure your site and its code from attacks and data theft.

Farid Mheir's insight:

WHY IT MATTERS: every developer - web or not - should apply those principles. Otherwise how else is the web ever going to be safe?

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc...

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc... | WHY IT MATTERS: Digital Transformation | Scoop.it

Credential abuse and botnets abusing retailer inventories is a rising problem that needs attention. On average, organizations report experiencing 12.7 credential stuffing attempts each month, with each attempt targeting 1,252 accounts. We detected nearly 28 billion credential stuffing attempts between May and December 2018. Within the retail industry, the apparel vertical, experienced 3.7 billion attempts on its own, making it the largest targeted industry during the same timeframe. So why is retail, as well as apparel, such at hot target? Short answer? Money.

Farid Mheir's insight:

WHY IT MATTERS: I find the number just huge and thus a cause for concern in the design of my systems, strategies and recommendations to my clients. I also include the definition of credential stuffing because 1) I did not know and 2) it shines a light into the power of having a global CDN network to perform those analyses...

2019 report: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/soti-security-media-under-assault-report-2019.pdf

 

Credential abuse attempts were identified as unsuccessful login attempts for accounts using an email address as a username. In order to identify abuse attempts, as opposed to real users who can’t type, two different algorithms are used. The first is a simple volumetric rule that counts the number of login errors to a specific address. This differs from what a single organization might be able to detect because Akamai is correlating data across hundreds of organizations.
The second algorithm uses data from our bot detection services to identify credential abuse from known botnets and tools. A well-configured botnet can avoid volumetric detection by spreading its traffic amongst many targets, by using a large number of systems in its scan, or spreading the traffic out over time, just to mention a few countermeasures.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Kleiner Perkins’ Mary Meeker Internet Trends at Code 2018 #mustRead #weekendRead #video #AI #eCommerce

Kleiner Perkins’ Mary Meeker Internet Trends at Code 2018 #mustRead #weekendRead #video #AI #eCommerce | WHY IT MATTERS: Digital Transformation | Scoop.it

"When you have rising monetization, rising growth and rising data collection, it drives a lot of regulatory scrutiny whether it’s related to data privacy, competition or safety in content."

Farid Mheir's insight:

WHY IT MATTERS: this is the annual presentation to level-set everyone on the Internet, mobile, ecommerce, cybersecurity, epayment, personalization, etc. She covers everything and shows that digital transformation is in full swing. Just WOW. Again.

Martin (Marty) Smith's curator insight, December 19, 2018 8:15 AM

Meeker is as close to Nostradamus as we are likely to get. 

Scooped by Farid Mheir
Scoop.it!

Cyber-Risk & Resilience 2017 details large-scale #cyberattacks & #online threats to #businesses are rising exponentially #tech #digital #data #business #hack #blockchain via @Raconteur @kuriharan

Cyber-Risk & Resilience 2017 details large-scale #cyberattacks & #online threats to #businesses are rising exponentially #tech #digital #data #business #hack #blockchain via @Raconteur @kuriharan | WHY IT MATTERS: Digital Transformation | Scoop.it

In an evermore connected world, large-scale cyberattacks and online threats to businesses are rising exponentially. The Cyber-Risk & Resilience special report, published in The Sunday Times, features insights into the impact cybercriminals can inflict on organisations and individuals. From chatbots spreading fake news, risks concerning personal data, biometrics and fraud, as well as tackling phishing emails, the potential dangers are unprecedented. Also included is an infographic on why hackers hack and an article on the top five ways quantum computing will change cybersecurity for good.

Farid Mheir's insight:

WHY IT MATTERS: the more we digitize our businesses and our lives the more we are exposed to hacking. The explosion of cryptocurrencies hacking and recent months appears to be a strong trend. A great series of articles on the subject is presented here.

Кирилл Беличенко's curator insight, November 30, 2022 6:42 AM

ZagroĹĽenia internetowe i statystyki hakerskie

Scooped by Farid Mheir
Scoop.it!

How I Hacked 40 Websites in 7 minutes

How I Hacked 40 Websites in 7 minutes | WHY IT MATTERS: Digital Transformation | Scoop.it

A narrative about a recent assessment I did to a peer’s website which ended up in a potentially very impactful situation.

Farid Mheir's insight:

WHY IT MATTERS: explains in relatively simple terms how hackers work and get access to computers and websites. Good to know.

GigWriting.com's curator insight, November 25, 2017 8:10 AM

Article to be referred by every web-designers and website owners. Thanks - Gigwriting.com

Scooped by Farid Mheir
Scoop.it!

4% to 10% of #web #encrypted #https traffic is intercepted

4% to 10% of #web #encrypted #https traffic is intercepted | WHY IT MATTERS: Digital Transformation | Scoop.it
Overall we found out that HTTPS interceptions are more prevalent than expected (4% - 10%) and pose serious security risks as they downgrade the encryption used to secure web communications. Furthermore, the HTTPS implementations used for interception do not have the same automatic update mechanisms that browsers do, making fixes less likely to be rolled out. Intercepting middleboxes have also contributed to the delayed release of TLS 1.3 in browsers. It is our hope that raising awareness around this issue will help software vendors that rely on interception to realize the risks of this practice.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

This is a technical article that sheds light onto a potential security risk that all digital professionals should be aware of as we generally assume that SSL and HTTPS will keep our conversations secure over the Internet.

Кирилл Беличенко's curator insight, November 30, 2022 6:44 AM

Statystyki włamań do stron internetowych i kradzieży danych

Scooped by Farid Mheir
Scoop.it!

The Internet Health Report: @mozilla 

The Internet Health Report: @mozilla  | WHY IT MATTERS: Digital Transformation | Scoop.it

Mozilla’s new open source initiative to document and explain what’s happening to the health of the Internet. Combining research from multiple sources, we collect data on five key topics and offer a brief overview of each.

Farid Mheir's insight:

Mozilla has always been promoting Internet security and privacy and this new report paves the way for a very interesting ongoing look at key elements of the public Internet.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Your #browser has a 'fingerprint' & online #trackers use it to follow your online activity #PrivacyAware 

Your #browser has a 'fingerprint' & online #trackers use it to follow your online activity #PrivacyAware  | WHY IT MATTERS: Digital Transformation | Scoop.it
Online tracking is no longer about "cookies." New technology helps trackers link online breadcrumbs — including across devices — through browser settings, battery levels and other details.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

We are being tracked everywhere as I reported in a previous article about behavioral tracking: http://fmcs.digital/blog/behavioral-tracking-explained-in-9min-video-by-gary_kovacs-via-ted-mustsee-privacyaware-dataprivacyday/ 

This new tracking method is very clever as it uses your browser configuration settings to derive an almost unique fingerprint to track you everywhere, even in the absence of cookies or ad beacons on a web page. On this Data Privacy day 2017, be aware, and be careful.

Scooped by Farid Mheir
Scoop.it!

Today is Data Privacy Day: what will you do to protect yourself better? #PrivacyAware @DataPrivacyDay 

Today is Data Privacy Day: what will you do to protect yourself better? #PrivacyAware @DataPrivacyDay  | WHY IT MATTERS: Digital Transformation | Scoop.it

Data Privacy Day Reminds Organizations That Protecting Customers’ Privacy is Critical to Their Business

Farid Mheir's insight:

If you only do one thing here is what you should be doing: 

http://fmcs.digital/blog/digital-moi-introduction/ 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Why #AdBlockers May be as Bad as the #Ads they are blocking: they need to make $$ using ads+tracking

Why #AdBlockers May be as Bad as the #Ads they are blocking: they need to make $$ using ads+tracking | WHY IT MATTERS: Digital Transformation | Scoop.it
For publishers and advertisers, Internet ad blockers are a scourge. But the blockers also have to pay the bills.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Surveillance is part of the web browsing experience mostly due to ads and social beacons. Trying to block them off not only degrades the user experience but may not provide the expected benefits as it may provide a different type of surveillance. Ad blocking does not appear to be the solution after all. So what can provide more privacy when surfing the web? The question remains open.

Jean-Marie Grange's comment, December 20, 2016 1:12 PM
Maybe one solution would be for content publishers to offer the choice of paying a fair amount for ad-free content... http://sco.lt/7CrAVl
Scooped by Farid Mheir
Scoop.it!

Edward Snowden: The Untold Story via @WIRED #mustread

Edward Snowden: The Untold Story via @WIRED #mustread | WHY IT MATTERS: Digital Transformation | Scoop.it
The message arrives on my “clean machine,” a MacBook Air loaded only with a sophisticated encryption package. “Change in plans,” my contact says. “Be in the lobby of the Hotel ______ by 1 pm. Bring a book and wait for ES to find you.”
Farid Mheir's insight:

A very good story that reveals some new information about what Snowden knows and has done. Very informative and well written.

No comment yet.
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/