Increasingly, the virtual world of the Internet is converging with the physical world through the Internet of Things. As more physical devices connect to the Internet, hackers' reach and breadth expands exponentially. Today, Internet-enabled devices include TVs, home security systems, kitchen appliances, thermostats, and more.
Criminal cyber attacks on health care information repositories have increased 125 percent since 2010. With the announcement of the Excellus breach last week, the total number of big-headline medical information compromises reported in 2015 had crossed the mind-blowing demarcation line of 100 million files.
A blockchain is public ledger of transactions that is distributed among all participants in a market or system. Each transaction that happens within a market or system must be verified by a strong majority of participants. It's very difficult to falsify transactions in a blockchain because each transaction generates a strong cryptographic signature.
The OPM hack put them even further ahead by identifying 21 million American adults that have applied to work for the Federal government. No doubt espionage for China will remain the primary use for this data, but just as we update our view of identity in the 21st century so too might the PRC update its plans the use of such data.
Data breaches have become the third certainty in life, right behind death and taxes. Up to now, the kind of information most often exposed in a breach was of concern because it could be used to harm our financial lives and even our well being (like medical identity theft). What differentiates the ALM hack is that it has moral ramifications.