The Majority of Scooters in LA Are Going To Share Your Location With the City

Los Angeles is pumping the brakes on scooter companies that won’t tell it what part of the city you’re wheeling around. From a report: Last September, the Los Angeles Department of Transportation said it would require all scooter companies to provide real-time location data on the vehicles to help with city planning purposes. The data is collected by GPS on the scooters. The requirement raised privacy concerns because sensitive data would be handled by the city government. The government partners with data aggregators, like Remix, to analyze that information. Privacy advocacy groups, including the Electronic Frontier Foundation and the Center for Technology and Democracy, have publicly spoken out about these data requests.

It still isn’t clear how long LADOT retains the location data, and there aren’t public details on what aggregators can do with that information. What is clear: Companies that don’t share the data won’t be allowed to put as many scooters on the streets as those that do. Companies that declined to provide the data were given a 30-day provisional permit to operate in LA, which were handed out last week, while those that agreed to hand over anonymized location data received permits for a full year.

5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line

How you respond to a data breach matters.

In today’s world, most companies have documented policies and technologies that can help prepare them for grappling with a cyber intruder, but in many cases those tactics are insufficient — focusing more on answering questions about the incident itself and less about an integrated response that protects reputation, the business and, most importantly, clients.

OSSEC Conference 2019 Wrap-Up

I’m in Washington, waiting for my flight back to Belgium. I just attended the 2019 edition of the OSSEC Conference, well more precisely, close to Washington in Herndon, VA. This was my first one and I’ve been honoured to be invited to speak at the event. OSSEC is a very nice project that I’m using for a long time. I also contributed to it and I’m giving training on this topic. The conference was already organized for a few years and attracted more people every year. They doubled the number of attendees for the 2019 edition.

Two new Fin7 malware samples discovered.

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

Are hackers gonna hack anymore? Not if we keep reusing passwords

Enterprises have a password problem, and it’s one that is making the work of hackers a lot easier. From credential stuffing to brute force and password spraying attacks, modern hackers don’t have to do much hacking in order to compromise internal corporate networks. Instead, they log in using weak, stolen, or otherwise compromised credentials.

First WOPR Summit Finds the Winning Move

At the climax of 1983’s “WarGames”, the War Operation Plan Response (WOPR) computer famously opines “The only winning move is not to play” when presented with a barrage of no-win scenarios depicting global thermonuclear war. While the stakes aren’t quite as high when it comes to putting on a brand new hacker convention, there’s certainly enough pitfalls that most of us would take WOPR’s advice and never even try. But for those who attended the inaugural WOPR Summit in Atlantic City, it was clear that not only did the team behind it have the tenacity to play the game, but that they managed to prove their supercomputer namesake wrong.

What to Do When the Botnet Comes Knocking

“It was a cold and windy night, but the breeze of ill omen blowing across the ‘net was colder. The regular trickle of login attempts suddenly became a torrent of IP addresses, all trying to break into the back-end of the Joomla site I host. I poured another cup of joe, it was gonna be a long night.”

A cybersecurity strategy to thwart advanced attackers

Today, many Chief Information Security Officers and cybersecurity practitioners are looking for an effective cybersecurity strategy that will help them achieve measurably better security for their organizations. AWS has released two new whitepapers to help customers plan and implement a strategy that has helped many organizations protect, detect, and respond to modern-day attacks.