In today’s digital era, data has become a valuable currency, akin to Gold. From shopping platforms like Flipkart to healthcare providers and advertisers, data powers personalization through targeted ads and tailored insurance plans. However, this comes with its own set of challenges.
While technological advancements offer countless benefits, they also raise concerns about data security. Hackers and malicious actors often exploit vulnerabilities to steal private information. Security breaches can expose sensitive data, affecting millions of individuals worldwide.
Sometimes, these breaches result from lapses by companies entrusted with the public’s data and trust, turning ordinary reliance into significant risks.
A recent report by German news outlet Der Spiegel revealed troubling findings about a Volkswagen (VW) subsidiary. According to the report, private data related to VW’s electric vehicles (EVs) under the Audi, Seat, Skoda, and VW brands was inadequately protected, making it easier for potential hackers to access sensitive information.
Approximately 800,000 vehicle owners’ personal data — including names, email addresses, and other critical credentials — was exposed due to these lapses.
CARIAD, a subsidiary of Volkswagen Group responsible for software development, manages the compromised data. Described as the “software powerhouse of Volkswagen Group” on its official website, CARIAD focuses on creating seamless digital experiences and advancing automated driving functions to enhance mobility safety, sustainability, and comfort.
CARIAD develops apps, including the Volkswagen app, enabling EV owners to interact with their vehicles remotely. These apps offer features like preheating or cooling the car, checking battery levels, and locking or unlocking the vehicle. However, these conveniences also became vulnerabilities.
In the summer of 2024, an anonymous whistleblower alerted the Chaos Computer Club (CCC), a white-hat hacker group, about the exposed data. The breach, accessible via free software, posed a significant risk.
The CCC’s investigation revealed that the breach stemmed from a misconfigured Amazon cloud storage system. Gigabytes of sensitive data, including personal information and GPS coordinates, were publicly accessible. This data also included details like the EVs’ charge levels and whether specific vehicles were active, allowing malicious actors to profile owners for potential targeting.
Following the discovery, the CCC informed German authorities and provided VW Group and CARIAD with a 30-day window to address the vulnerabilities before disclosing their findings publicly.
This incident underscores the importance of robust data security in a world increasingly reliant on technology. While companies strive to create innovative solutions, ensuring user privacy and safety must remain a top priority. The Volkswagen breach serves as a stark reminder that with great technology comes an equally great responsibility to protect the public’s trust and data.
The digital advertising world is changing rapidly due to privacy concerns and regulatory needs, and the shift is affecting how advertisers target customers. Starting in 2025, Google to stop using third-party cookies in the world’s most popular browser, Chrome. The cookies are data files that track our internet activities in our browsers. The cookie collects information sold to advertisers, who use this for targeted advertising based on user data.
“Cookies are files created by websites you visit. By saving information about your visit, they make your online experience easier. For example, sites can keep you signed in, remember your site preferences, and give you locally relevant content,” says Google.
In 2019 and 2020, Firefox and Safari took a step back from third-party cookies. Following their footsteps, Google’s Chrome allows users to opt out of the settings. As the cookies have information that can identify a user, the EU’s and UK’s General Data Protection Regulation (GDPR) asks a user for prior consent via spamming pop-ups.
Once the spine of targeted digital advertising, the future of third-party cookies doesn’t look bright. However, not everything is sunshine and rainbows.
While giants like Amazon, Google, and Facebook are burning bridges by blocking third-party cookies to address privacy concerns, they can still collect first-party data about a user from their websites, and the data will be sold to advertisers if a user permits, however in a less intrusive form. The harvested data won’t be of much use to the advertisers, but the annoying pop-ups being in existence may irritate the users.
One way consumers and companies can benefit is by adapting the advertising industry to be more efficient. Instead of using targeted advertising, companies can directly engage with customers visiting websites.
Advances in AI and machine learning can also help. Instead of invasive ads that keep following you on the internet, the user will be getting information and features personally. Companies can predict user needs, and via techniques like automated delivery and pre-emptive stocking, give better results. A new advertising landscape is on its way.
Ransomware attacks are becoming increasingly sophisticated and widespread, posing significant risks to organizations worldwide. A recent report by Object First highlights critical vulnerabilities in current backup practices and underscores the urgency of adopting modern solutions to safeguard essential data.
Nearly every organization still relies on outdated backup technologies, leaving them exposed to cyberattacks. According to the survey, 34% of respondents identified outdated backup systems as a severe vulnerability, emphasizing their inability to combat modern ransomware tactics devised by malicious actors.
Another alarming gap is the lack of encryption in backup processes, noted by 31% of IT professionals. Encryption is essential for the secure storage and transfer of sensitive data. Without it, backup files are vulnerable to breaches. Additionally, 28% of respondents reported experiencing backup system failures, which can significantly impede recovery efforts and prolong downtime following an attack.
Backup data, once considered the last line of defense against ransomware, has become a primary target for attackers. Cybercriminals now focus on corrupting or deleting backup files, rendering traditional approaches ineffective. This underscores the necessity of adopting advanced solutions capable of withstanding such tampering.
Immutable storage has emerged as a powerful defense against ransomware. This technology ensures that once data is stored, it cannot be altered or deleted. The report revealed that 93% of IT professionals consider immutable storage critical for ransomware protection. Furthermore, 97% of organizations are planning to incorporate immutable storage into their cybersecurity strategies.
Immutable systems align with the Zero Trust security model, which operates on the principle that no user or system is inherently trustworthy. This approach minimizes the risk of unauthorized access or data manipulation by continuously validating access requests and limiting permissions.
Despite their effectiveness, implementing advanced backup systems is not without challenges. Approximately 41% of IT professionals acknowledged a lack of the necessary skills to manage complex backup technologies. Budget constraints also pose a significant hurdle, with 69% of respondents admitting they cannot afford to hire additional security experts.
The growing threat of ransomware demands immediate action. Businesses must prioritize upgrading their backup systems and investing in immutable storage solutions. At the same time, addressing skill shortages and overcoming financial barriers are crucial to ensuring robust, comprehensive protection against future attacks.
The US Federal Trade Commission (FTC) has filed actions against two US-based data brokers for allegedly engaging in illegal tracking of users' location data. The data was reportedly used to trace individuals in sensitive locations such as hospitals, churches, military bases, and other protected areas. It was then sold for purposes including advertising, political campaigns, immigration enforcement, and government use.
The Georgia-based data broker, Mobilewalla, has been accused of tracking residents of domestic abuse shelters and protestors during the George Floyd demonstrations in 2020. According to the FTC, Mobilewalla allegedly attempted to identify protestors’ racial identities by tracing their smartphones. The company’s actions raise serious privacy and ethical concerns.
The FTC also suspects Gravy Analytics and its subsidiary Venntel of misusing customer location data without consent. Reports indicate they used this data to “unfairly infer health decisions and religious beliefs,” as highlighted by TechCrunch. These actions have drawn criticism for their potential to exploit sensitive personal information.
The FTC revealed that Gravy Analytics collected over 17 billion location signals from more than 1 billion smartphones daily. The data was allegedly sold to federal law enforcement agencies such as the Drug Enforcement Agency (DEA), the Department of Homeland Security (DHS), and the Federal Bureau of Investigation (FBI).
Samuel Levine, Director of the FTC’s Bureau of Consumer Protection, stated, “Surreptitious surveillance by data brokers undermines our civil liberties and puts servicemembers, union workers, religious minorities, and others at risk. This is the FTC’s fourth action this year challenging the sale of sensitive location data, and it’s past time for the industry to get serious about protecting Americans’ privacy.”
As part of two settlements announced by the FTC, Mobilewalla and Gravy Analytics will cease collecting sensitive location data from customers. They are also required to delete the historical data they have amassed about millions of Americans over time.
The settlements mandate that the companies establish a sensitive location data program to identify and restrict tracking and disclosing customer information from specific locations. These protected areas include religious organizations, medical facilities, schools, and other sensitive sites.
Additionally, the FTC’s order requires the companies to maintain a supplier assessment program to ensure consumers have provided consent for the collection and use of data that reveals their precise location or mobile device information.
American Water Works, the country's largest provider of water services to 14 states, recently reported that it was cyber attacked on its information technology system. The current report has indicated that operational technology systems that control delivery of water within the company are not affected. As reported by Bloomberg, the company disclosed to shareholders in a filing with the U.S. Securities and Exchange Commission which forced the company to temporarily suspend billing and limit customer support.
On its website, the American Water Works explained its statement in announcing that certain systems were turned off in an attempt to prevent more damages on its customers' information. Its MyWater online service has been temporarily halted, thus stopping billing processes until the systems can be brought back online. The company assured that water quality is not affected and safe for drinking. Whether the customers' information was accessed remains a determination to be made.
Response to the Incident
The company cannot yet fully assess the impact of the incident but confirms that its water and wastewater operations are unaffected. American Water Works first detected unauthorised activity in its networks on October 3. Upon discovery, the company activated its cybersecurity response protocols and sought the assistance of third-party cybersecurity specialists to help contain and investigate the incident. Law enforcement was notified promptly and are actively involved in ongoing inquiries.
The company's IT teams are scrambling to protect data by isolating some systems that might prevent any possible damage. The exact nature of the attack is still unknown, but such cases of ransomware attacks scare cybersecurity experts, who have noted recent instances in which hackers carried out ransomware attacks. The separation of the IT network from the OT networks by the company, a critical step in cybersecurity for critical infrastructures, may have allowed it to contain the spread of the attack that did not penetrate the core operations.
Cyber Threats Against Water Utilities
The incident is part of a worrying trend of cyberattacks on water utilities. Just two weeks back, a Kansas water utility fell under similar attacks, reviving the renewed debate on protection of critical services. According to a report by Cyble, a cybersecurity firm, groups such as Russia-linked People's Cyber Army are increasingly threatening the water sector through cyber attacks. The report has identified significant vulnerabilities and pointed out that many US water utilities are using outdated systems and those lacking in their cybersecurity practices.
Notably, a similar alarm is sounded by the latest GAO report against the Environmental Protection Agency, which presses for better cybersecurity requirements in water utility providers. A review of the water utilities through inspections reported that almost 70% of them don't comply with basic cybersecurity guidelines, which puts it at the risk of a potential disruption in its operations or even contamination. Cyble's research calls out for contemporary security measures such as network segmentation and strengthening of controls over control systems, among others.
Experts recommend network segmentation for water utilities to separate IT from OT systems; also HMIs that can lock down their monitoring systems. As more and more water utilities bring their systems onto the internet, the chance of cyber threats increases continually. Even as American Water Works works through its recent cyber incident, pressure is growing throughout the industry to harden its defences and protect critical infrastructure in a manner that ultimately protects public health.
Recently, the American Water Works was attacked via a cyber attack that portrays a need for stronger cybersecurity practices in the water industry. As attacks increase in terms of frequency and complexity, companies must implement strong security measures to protect the essentials and assure the public regarding the safety of delivering water.
In addition to this, hackers obtained routing numbers, bank names, financial account details, and some biometric data. A total of 123,882 people were affected by the breach, which resulted in the clinic taking its servers offline.
Local reports suggested the incident was a ransomware attack, sparking public frustration as Mālama was forced to close for nearly two weeks. Upon reopening at the end of May, the clinic operated with limited services, and nurses had to rely on paper charts due to system-wide computer outages.
Following the attack, Mālama worked with law enforcement and cybersecurity experts to investigate the breach, with the findings confirmed on August 7.
In a statement on its website, the clinic offered complimentary credit monitoring to those whose Social Security numbers may have been exposed, although a regulatory filing in Maine indicated that identity theft protection services were not provided. The organization has not responded to requests for clarification, and a law firm is reportedly exploring potential lawsuits against Mālama related to the breach.
The ransomware group LockBit, which was taken down by law enforcement earlier this year, claimed responsibility for the attack in June. On Tuesday, Europol and other agencies announced a coordinated effort to target the gang, resulting in four arrests and the seizure of servers critical to LockBit's operations in France, the U.K., and Spain.
In 2024, healthcare providers across the U.S. have been increasingly targeted by cyberattacks, disrupting services and threatening public safety. Notably, McLaren Health Care and Ascension, two major health systems, have faced severe ransomware incidents, and last week, one of the region's only Level 1 trauma centers had to turn away ambulances following a cyberattack.
OpenAI has admitted that developing ChatGPT would not have been feasible without the use of copyrighted content to train its algorithms. It is widely known that artificial intelligence (AI) systems heavily rely on social media content for their development. In fact, AI has become an essential tool for many social media platforms.
On September 1, 2024, Planned Parenthood of Montana announced that it had been targeted by a ransomware attack. The hackers, identified as the RansomHub group, claimed to have stolen approximately 93GB of sensitive data. They are now threatening to release this data unless a ransom is paid by September 11. The stolen data reportedly includes patient records, financial information, and internal communications, making this breach particularly concerning.
The timing of this attack is especially significant. It comes at a moment when abortion rights advocates in Montana have successfully gathered enough signatures to put the issue on the ballot in November. This has raised suspicions that the attack may have political motivations, aiming to influence public opinion and voter behavior. Regardless of the hackers’ intentions, the breach has created a climate of fear and uncertainty among patients and staff alike.
The immediate impact of the breach is multifaceted. For patients, the exposure of sensitive medical information can lead to severe emotional distress and potential discrimination. For the organization, the financial and reputational damage can be devastating. Planned Parenthood of Montana now faces the daunting task of securing its systems, notifying affected individuals, and potentially paying a hefty ransom to prevent the release of the stolen data.
Healthcare organizations must invest in cutting-edge security technologies such as artificial intelligence (AI) and machine learning (ML) to detect and respond to threats in real-time. These technologies can analyze vast amounts of data to identify unusual patterns and potential security breaches before they cause significant damage.
Multi-factor authentication adds an extra layer of security by requiring users to provide two or more verification factors to gain access to systems and data. This can significantly reduce the risk of unauthorized access, even if login credentials are compromised.
Encrypting sensitive data ensures that even if it is stolen, it cannot be easily read or used by unauthorized individuals. Healthcare organizations should implement encryption protocols for data both at rest and in transit to protect patient information.
Halliburton, one of the world’s largest energy companies, has confirmed that it was the victim of a cyberattack. Hackers infiltrated the company’s systems and stole sensitive information. The attack occurred last week, and Halliburton is still determining the extent of the data that was taken.
In a recent filing with government regulators, Halliburton acknowledged the breach but has yet to disclose the full details of what was stolen. The company is currently investigating the incident and deciding what legal notifications are required. In response to the attack, Halliburton took certain systems offline as a precaution and is working to restore normal operations, especially for its oil and fracking businesses.
When approached for additional comments, company spokesperson Amina Rivera declined to elaborate further, stating that Halliburton would not provide more information beyond what was mentioned in its official filing.
Although Halliburton has not officially confirmed it, there are signs that the cyberattack may have been part of a ransomware campaign. TechCrunch obtained a ransom note related to the incident, which claims that hackers encrypted Halliburton’s files and stole sensitive data. A group known as RansomHub is believed to be behind the attack. This gang is notorious for carrying out similar cyberattacks, using stolen data as leverage to demand ransom payments.
RansomHub typically publishes stolen files on its dark web platform when victims refuse to pay. So far, Halliburton has not been listed as one of RansomHub’s victims, but this could change if negotiations fail. RansomHub has been responsible for over 210 attacks since its rise to prominence earlier this year, and it has targeted other large organisations, including Change Healthcare.
Halliburton, with around 48,000 employees spread across various countries, is a major player in the global energy industry. In the past, the company gained notoriety due to its role in the Deepwater Horizon oil spill disaster in 2010, for which it paid over $1 billion in fines.
The recent cyberattack is expected to have financial repercussions for the company, though the exact costs are yet to be determined. In 2023, Halliburton reported $23 billion in revenue, with CEO Jeff Miller earning $19 million in total compensation. Halliburton has noted that it will continue to bear costs related to the cyberattack as they work on restoring systems and resolving the situation.
As the investigation unfolds, much of Halliburton’s online services remain down, and the company is assessing the full impact of the breach. Halliburton has been tight-lipped about its cybersecurity efforts, declining to provide information on who is currently overseeing their response.
This attack is a reminder of how large corporations remain vulnerable to cyber threats. Halliburton's situation underscores the importance of investing in strong cybersecurity measures to safeguard sensitive data and avoid disruptions in critical operations. The company will likely provide more updates as it works to recover from this breach.
Proton, a company known for its commitment to privacy, has announced a paradigm altering update to its AI-powered email assistant, Proton Scribe. The tool, which helps users draft and proofread emails, is now available in eight additional languages: French, German, Spanish, Italian, Portuguese, Russian, Chinese, and Japanese. This expansion enables users to write emails in languages they may not be proficient in, ensuring that their communications remain accurate and secure. Proton Scribe is particularly designed for those who prioritise privacy, offering a solution that keeps their sensitive information confidential.
What sets Proton Scribe apart from other AI services is its focus on privacy. Unlike many AI tools that process data on external servers, Proton Scribe can operate locally on a user’s device. This means that the data never leaves the user's control, offering an added layer of security. For users who prefer not to run the service locally, Proton provides a no-logs server option, which also ensures that no data is stored or shared. Moreover, users have the flexibility to disable Proton Scribe entirely if they choose. This approach aligns with Proton’s broader mission of enabling productivity without compromising privacy.
The introduction of these new languages follows overwhelming demand from Proton’s user base. Initially launched for business users, Proton Scribe quickly gained traction among consumers seeking a private alternative to conventional AI tools. By integrating Proton Scribe directly into Proton Mail, users can now manage their email communications securely without needing to rely on third-party services. Proton has also expanded access to Scribe, making it available to subscribers of the Proton Family and Proton Duo plans, in addition to Proton Mail Business users who can add it on as a feature.
Proton’s commitment to privacy is further emphasised by its use of zero-access encryption. This technology ensures that Proton itself has no access to the data users input into Proton Scribe. Unlike other AI tools that might be trained using data from user interactions, Proton Scribe operates independently of user data. This means that no information typed into the assistant is retained or shared with third parties, providing users with peace of mind when managing sensitive communications.
Eamonn Maguire, head of machine learning at Proton, underlined the company's dedication to privacy-first solutions, stating that the demand for a secure AI tool was a driving force behind the expansion of Proton Scribe. He emphasised that Proton’s goal is to provide tools that enable users to maintain both productivity and privacy. With the expansion of Proton Scribe’s language capabilities and its availability across more subscription plans, Proton is making it easier for a broader audience to access secure AI tools directly within their inboxes.
Proton continues to set itself apart in the crowded field of AI-driven services by prioritising user privacy at every step. For those interested in learning more about Proton Scribe and its features, Proton has provided additional details in their official blog announcement.
In 2009, an enigmatic figure known as Satoshi Nakamoto introduced Bitcoin to the world. Nakamoto's true identity remains shrouded in mystery, but their creation sparked a revolution. Bitcoin wasn't just a currency; it was a paradigm shift—a departure from centralized financial systems.
At its core, Bitcoin operates on a decentralized ledger called the blockchain. Imagine a vast, incorruptible book where every transaction is recorded. Miners—individuals who dedicate computational power—verify these transactions, ensuring transparency and security. No central authority governs Bitcoin; it thrives on collective trust.
Bitcoin's scarcity—capped at 21 million coins—gives it a unique allure. Investors liken it to digital gold, a store of value immune to inflation. Yet, unlike gold, Bitcoin transactions occur in the digital realm. Users remain pseudonymous, their identities veiled behind cryptographic addresses.
Enter Nostr, a lesser-known but equally significant tech. Nostr's story diverges from Bitcoin's, emphasizing community governance and censorship resistance.
Nostr's strength lies in its community. Decisions—upgrades, proposals, and network changes—are made collectively. No central authority dictates terms; instead, users shape the network's destiny. Transparency prevails, and the community guards against undue influence.
Nostr's architecture is a fortress against censorship. Content creators, developers, and users participate without fear of suppression. In a world where platforms silence dissenting voices, Nostr stands firm—a bastion of free expression.
While Bitcoin relies on proof-of-work (PoW) and proof-of-stake (PoS), Nostr pioneers a different path: Proof of Reputation (PoR). Reputation is earned through contributions, expertise, and positive interactions. It's a nod to meritocracy, where influence aligns with genuine value.
In regions where there is censorship on data, Bitcoin and Nostr offer escape routes. Citizens preserve wealth and communicate freely, shielded from state interference. Nostr's community-driven model ensures that no single entity can silence dissent.
Both projects empower the unbanked. Bitcoin's global accessibility and Nostr's community-driven ethos allow participation in the global economy. No longer bound by traditional banking, individuals find newfound freedom.
As governments print money, inflation erodes fiat currency value. Bitcoin's scarcity and Nostr's stability provide a hedge. They're shields against economic uncertainty.
Bitcoin's Lightning Network accelerates transactions, while Nostr experiments with consensus mechanisms. Both drive technological progress, shaping the future of finance.
Bitcoin and Nostr- although they can be different yet intertwined—remind us that decentralization isn't a mere buzzword. It's a way forward, heading the way toward financial sovereignty and individual empowerment.