Posted May 7, 2015 by Editorial Staff in Technology
 
 

African American Cyber Report


Share this page:
Facebooktwittergoogle_pluspinterestlinkedintumblrmailFacebooktwittergoogle_pluspinterestlinkedintumblrmail

LESS TECH – MORE KNOWLEDGE

Buying a used car is sometimes a necessary but alway stressful task. The number one question every car buyer asks themselves is; Is this a good car? Thats why CarMD is the App of the Week.

You can get a lot of information about a car by using services such as CarFax. It’s good to have that information in hand when looking for your next ride. But sometimes you need more data. Like, what will this car be like a year down the road? That s why CarMD is such a valuable tool.

CarMD is a web based service and app that goes a step further in the investigatory process. CarMD’s Heath Index and History resource looks at a car’s past, present, and get …MORE >>

Microsoft, the world’s largest software maker, is having a bad week. The company’s Outlook email service was hit by a data breach that includes Outlook.com accounts, MSN and Hotmail addresses. The breach was ongoing for months and the hackers used a customer support agent’s credentials to gain access.

Microsoft issued an email confirming hackers may have accessed email addresses, subject lines of emails, folder labels, and the names of other email addresses that the user contacted. However, Microsoft believes the content of emails, including attachments and login passwords were not compromised.

Hackers conducted the attack from January 1st to March 28th. Microsoft quickly identified the credentials used by the hackers and disabled them.

It is not clear how many users are compromised or who the …MORE >>

Netflix announced it is now streaming a new documentary about the Queen Bee herself, Beyonce.

Entitled “Homecoming: A Film By Beyonce,” is an exclusive a look behind the scenes of one of the most timeless performances in music history from her electrifying 2018 performance at Coachella.

The show features appearances by Destiny’s Child, her husband Jay-Z, and Solange. The legendary show is now enjoying a second life as a feature of this years 2019 Coachella Valley Music and Arts Festival.

Most notable about the performance was Beyonce’s tribute to Historically Black Colleges and Universities (HBCU) and their enduring history of creativity.

Viewers of the documentary will get a peek inside the effort that went into creating the show that is probably …MORE >>

Data has become like so much air. It’s everywhere. With that being said we’d like to report that Verifications.IO has dropped another 2 billion on us.

The company is an email verification service used by marketers. Marketers provide Verifications.IO with email addresses to screen and validate before launching an email marketing campaign. Apparently Verifications.io has been collecting public contact information and private financial data for customer profiles. This includes mortgage data and credit score information.

There is no evidence that the records were actually stolen or used by criminals. Instead the records were found sitting in a data base, unsecured, unencrypted, and available to anyone.

Bleeping Computer reported that an unprotected MongoDB database was discovered by security researcher Bob Diachenko. Diachenko determined the …MORE >>

Visit African American Cyber Report
ABOUT AFRICAN AMERICAN CYBER REPORT
headshot-tom huskerson-sq

Tom Huskerson
Publisher, AACR

C

The AACR is the emerging leader providing vital news, information and analysis about the Internet, electronic communications and e-commerce to black people. Our mission is to enhance the level of knowledge and security for black people who access the Internet. It is our goal to alert people of color about the numerous hazards and dangers of the cyber space. This includes viruses and other malware, changes in the law, scams, hoaxes and information thefts of all kinds. We also highlight useful technology and opportunities available via the Internet. We sincerely believe that black people are under served when it comes to information security and we are working to change that equation. Read more>>