BigData – Key Figures

Back to basics, facts and key figures about the data:
  • Bad data or poor data quality costs US businesses $600 billion annually.
  • 247 billion e-mail messages are sent each day… up to 80% of them are spam.
  • Poor data or “lack of understanding the data” are cited as the #1 reasons for overrunning project costs.
  • 70% of data is created by individuals – but enterprises are responsible for storing and managing 80% of it. (source)
  • We can expect a 40-60 per cent projected annual growth in the volume of data generated, while media intensive sectors, including financial services, will see year on year data growth rates of over 120 per cent.
  • Every hour, enough information is consumed by internet traffic to fill 7 million DVDs.  Side by side, they’d scale Mount Everest 95 times.
  • The volume of data that businesses collect is exploding: in 15 of the US economy’s 17 sectors, for example, companies with upward of 1,000 employees store, on average, more information than the Library of Congress does (source).
  • 48 hours worth of video is posted on YouTube every hour of everyday (source).
  • Every month 30 billion pieces of content are shared on Facebook (source).
  • By 2020 the production of data will be 44 times what we produced in 2009. (source)
  • If an average Fortune 1000 company can increase the usability of its data by just 10%, the company could expect an increase of over 2 billion dollars. (Source: InsightSquared infographic)

Google now offering docs for Takeout

Google, through its Data Liberation Blog, has just announced they now offering the docs for takeout.

So you can now export them along with everything else on the Google Takeout menu.

 

 

 

Choose to download all of the Docs that you own through Takeout in any of the formats mentioned above. We’re making it more convenient for you to retrieve your information however you want — you can even Takeout just your docs if you’d like. Lastly, be sure to click on the new “Configure” menu if you’d like to choose different formats for your documents.

 

 

Toshiba hacked,leaking 7,500 customers personal data

Toshiba Corp. has confirmed that its Toshiba American Information Systems Inc. server has been hacked in a press release.

Server had personal information for about 7,500 customers …681 customers’ email addresses and passwords may have been compromised or leaked during the process.

A Toshiba spokesperson noted that the company has not concluded when the hacking took place – partially why they could not comment on the matter sooner – but the U.S. unit first detected a problem on July 11 and then it was confirmed July 13 that it had, indeed, been hacked.

“On discovering the intrusion TAIS immediately took the server offline and initiated a comprehensive investigation,” said Toshiba in a statement. “Toshiba and its Group companies regard data security as a priority concern and will continue a thorough investigation of the incident. Toshiba will take all necessary precautions to avoid any recurrence of similar incidents and to ensure customer information remain secure.”

The company is still investigating the matter and customers have already been notified about the possibility that their personal data may have been affected, notes Thinq.

According to eSecurity Planet, the hacker, who identifies itself as V0iD, published the account information on two pastebin posts. The hacker claims that the leak contains 11 Toshiba administration officials’ email addresses and passwords using @tacp.com and a “top 3” list of an Air Force (@moody.af.mil), NASA (@nasa.gov) and state government official’s email login.

This is only 10 percent of the list and V0iD has promised more to come.


Sony leaked 12,700 credit card account numbers

Following up on this morning’s news that Sony Online Entertainment servers were offline across the board, SOE announced that it has lost 12,700 customer credit card numbers as the result of the PSN attack, and roughly 24.6 million accounts may have been breached.

SOE has provided the following statement, in which it confirms that its user data was stolen as part of the original intrusion — not a second attack. “While the two systems are distinct and operated separately, given that they are both under the SONY umbrella, there is some degree of architecture that overlaps. The intrusions were similar in nature. This is NOT a second attack; new information has been discovered as part of our ongoing investigation of the external intrusion in April.”

BP reports data leak of 13,000 Gulf victims

BP (the oil giant company) admitted to losing a laptop containing the  private information of approximately 13,000 individuals that had filed claims following the gulf oil spill was reported lost by the company.

Data stored on the lost laptop include the following personnal details:

  • names
  • phone numbers
  • addresses
  • dates of birth
  • social security numbers

for individuals who filed claims related to last year’s disastrous Deepwater Horizon spill. BP has notified the individuals who may be affected and has offered free credit monitoring.

According to a statement from BP spokesman Tom Mueller, “There is no evidence that the laptop or data was targeted or that anyone’s personal data has in fact been compromised or accessed in any way. “We have sent written notice to individuals impacted by this event to inform them about the loss of their personal data and to offer them free credit monitoring services to help protect their personal information,” Mueller added.

A BP spokesperson made the following statement:

BP recently learned that a password-protected laptop computer was lost during business-related travel. This laptop contained personal information such as names, addresses, phone numbers, dates of birth, and Social Security Numbers of approximately 13,000 individuals who filed claims related to the Deepwater Horizon accident. The personal information was in a spreadsheet maintained by BP as part of a tracking process for claims arising from the Deepwater Horizon accident – part of the claims process before the Gulf Coast Claims Facility was established.

The lost laptop was immediately reported to law enforcement authorities and BP security, but has not been located despite a thorough search. There is no evidence that the laptop or data was targeted or that anyone’s personal data has in fact been compromised or accessed in any way. Our Security team continues to monitor the situation very closely and we are still in touch with authorities in an attempt to recover the laptop.

We have sent written notice to individuals impacted by this event to inform them about the loss of their personal data and to offer them free credit monitoring services to help protect their personal information.

BP takes the protection of personal information very seriously and deeply regrets the loss of the laptop.

 

Play.com customers data leaked

Play.com, the biggest e-commerce sites in the UK, announced some of their customers may have had their personal details leaked online by a third party marketing firm.
Now it has emerged that the names and email addresses of a currently unknown number of users were stolen and subsequently used as targets for spam campaigns.
Play.com was apparently only made aware of the leak by the customers themselves, who noticed that they had started getting spam emails sent to accounts which were only linked to their Play.com purchases.
John Perkins, chief executive of Play.com, confirmed the only data to have leaked related to email addresses.
Play.com customers who were affected are advised to change the passwords on their email accounts as a precaution to ensure total safety.

Analytics: IT departments leak most data … usually on a Tuesday

Data leak figures !

According to a survey on insider threats published by security firm Orthus this week, data leak is primarly Internal Data Leak, wich we already knew but more surprisingly, IT staff are the most likely to leak the sensitive data about their own company.

“The insider is most likely to be from the IT or customer services department, uses a mobile PC rather than a desktop computer and more often than not will copy the sensitive data to the local hard drive and walk straight out of the door with it – or webmail a copy to themselves,” wrote the authors.

Orthus based its findings on information extracted from data leakage audits conducted since 2006 on its own customer sites using remote agents: an estimated 500,000 hours of user activity within an unspecified number of mainly UK organisations employing 1,000 or more people.

 

Key results from this survey:

  • Corporate data leakage was most likely to occur through mobile devices with 68% of all events identified linked to mobile rather than fixed desktop systems.
  • Information Technology and Customer Services Departments had the highest incidence of data leakage.
  • Most incidents of data leakage occur during the extended working day (7-7 Monday to Friday).
  • The applications most favoured by users to remove sensitive data were identified as web mail, instant messaging (IM) and social networking web sites
  • The top 4 data leakage vectors were identified as mobile devices, web mail, removable media and corporate email.
  • All data leakage incidents identified could have been prevented. Existing corporate security policies were not implemented,monitored or enforced.

 

Orthushttp://orthusintel.com/

And some more information available here:

http://www.computing.co.uk/ctg/news/2023984/departments-leak-usually-tuesday

 

 

 

Hospital loss 1,500 patients personal details

A data loss has been reported in Huddersfield, after a laptop containing the details of as many as 1,500 patients was stolen from a hospital. Security discussions are ongoing to determine whether or not, data loss incident puts patients at risk.

 

The confidential records were stolen when a computer used in conjunction with a scanning machine was taken from Calderdale Royal Hospital in December.Hundreds of Huddersfield residents would have had their details kept on the laptop.

At a meeting of Calderdale and Huddersfield NHS Foundation Trust’s board of directors last week, Medical Director Yvette Oade said discussions were ongoing with manufacturers as to whether data could be encrypted to prevent information being accessed if such an event occurred again.

She said: “They wanted us to put software on to the computers to create the encryption but the information service was anxious not to disturb the functioning of the equipment.

“The patients were all written to and a number of queries were raised, we responded quickly and they appeared to be reassured.”

The letter received by patients described the computer which formed part of the Electromyography (EMG) machine.

It read : “You had tests on this machine which does contain some personal information, names, dates of birth and addresses.”

One reader who contacted the Examiner said the quick action highlighting the theft and the implications for patients had made a difference.

She said: “I do appreciate being told that it took place and that it hasn’t been covered up, but I’m a bit of a technophobe and I’m not exactly clear on what the loss of this kind of information would mean to me.

“They’ve said there were passwords on the computer so there has been some kind of security on the machine, and they’ve stepped it up in the hospital.

“But it’s not the kind of letter you expect however and I think some people will be quite concerned.”

At the time of the theft police were informed and directors said they had stepped up security.

Read More http://www.examiner.co.uk/news/local-west-yorkshire-news/2011/01/31/calderdale-and-huddersfield-hospitals-investigation-into-laptop-data-loss-continues-86081-28082847/#ixzz1CkUu4PDh

 

28 Millions personal users data leaked from plentyoffish.com

A vulnerability in www.plentyoffish.com exposing users details, including usernames, addresses, phone numbers, real names, email addresses, passwords in plain text, and in most of cases, paypal accounts, of more than 28,000,000 (twenty eight million users) have been actively exploited by hackers.

 

Paypal accounts and passwords in plain text may lead to additional damage or exploitation.

AT&T’s website leak some 100 000 iPad owners data

Two suspects have been charged with federal crimes for allegedly hacking AT&T’s website last year to obtain the personal data of more than 100,000 iPad owners.

Last summer the two allegedly contacted Gawker to report that a hole in AT&T’s website allowed anyone to access data on iPad owners, including government and military officials, corporate CEOs and media executives who purchased iPads.
The personal data included e-mail addresses and ICC-IDs – a unique identifier that’s used to authenticate the SIM card in a customer’s iPad to AT&T’s network.
The leak snagged the details of dozens of elite iPad early adopters such as New York Mayor Michael Bloomberg, anchorwoman Diane Sawyer of ABC News, New York Times CEO Janet Robinson and Col. William Eldredge, commander of the 28th Operations Group at Ellsworth Air Force Base in South Dakota.
Gawker reported at the time that the website vulnerability, which AT&T fixed, was discovered by a group calling itself Goatse Security, which authorities say included Spitler and Auernheimer.
The two allegedly wrote a script to harvest the data from AT&T’s website and apparently shared their script with others before AT&T patched the vulnerability.
AT&T maintained that the two did not contact it about the vulnerability, which legitimate security researchers often do prior to publicly disclosing a vulnerability. Instead, AT&T learned of the problem from a “business customer.”

 

Justice Department complaint reveal some details and can be downloaded here:

http://www.wired.com/images_blogs/threatlevel/2011/01/Spitler-Daniel-et-al.-Complaint.pdf