achan Archive

Did IBM violate BIPA?

In mid-March, NBC reported that IBM collected nearly one million photos from photo hosting site Flickr to use as data sets to help develop facial recognition algorithms. Although IBM claims the data set is designed to help academic researchers make …

Six most common cyber attacks

Cyber crime is at an all-time high, and at the same time as organizations are trying to counter these attacks, criminal hackers are becoming more innovative with the different types of cyber attacks they are choosing to deploy.  What is a cyber attack? Cyber attacks are deliberate and malicious. They are attempts to breach …

Fewer breaches, more stolen data

2018 may have seen fewer breaches than 2017, but more sensitive information was compromised. According to a report by Identity Theft Resource Center and CyberScout, the number of exposed records more than doubled from 2017–2018. Findings The number of breaches …