Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
WiIl Millennials Be The Death Of Data Security?
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 4   >   >>
ChrisRouland
ChrisRouland,
User Rank: Strategist
1/28/2015 | 2:50:59 PM
Re: Ok Millennials, defend yourselves!
Marilyn - great post.  I think what most people don't seem to understand if that if an App is free, YOU are the product.  Would you pay $0.99/mo for a version of Waze that gave you privacy?
Kelly22
Kelly22,
User Rank: Author
1/28/2015 | 1:29:33 PM
Re: Ok Millennials, defend yourselves!
I would also be interested in learning the results of that poll. I think because most younger millennials grew up in an age of widespread information sharing, many don't think twice about giving personal data to apps and services online. To most, it's just a means of getting the next cool, convenient app. I'm a millennial and while I don't use Waze, I know plenty of people who do. Chances are, there are more than one who didn't read the privacy policy.

That said, I also know millennials who do take the time to protect their online identities, but many times, those are people who have been affected by hacks in the past.
ODA155
ODA155,
User Rank: Ninja
1/28/2015 | 11:40:12 AM
Re: Ok Millennials, defend yourselves!
@ Kelly Jackson Higgins... only when the corporations that are collecting and who are responsible for this data are actually held accountable.
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
1/28/2015 | 11:35:58 AM
Re: Ok Millennials, defend yourselves!
I keep asking the question about the ultimate financial impact of all of this: It can't be a sustainable model for the economy. Eventually all of this replacing credit cards & debit cards, covering ID theft losses, and recovering from data breach losses has to come home to roost. That's the big question.
Whoopty
Whoopty,
User Rank: Ninja
1/28/2015 | 11:33:01 AM
Big age range
People need to remember that these 'generational' identities are very broad. I'm technically a millenial and yet can remember firmly what it was like to be online pre-'95. Myself and my contemporaries have a very different view on personal data than millenials that were born just a few years later. 

There's something about people who were given access to social networks at a young age that I think makes them more data promiscuous.

Either that or I'm just a grump who wants his privacy and personal space. 
ODA155
ODA155,
User Rank: Ninja
1/28/2015 | 11:31:33 AM
Re: Ok Millennials, defend yourselves!
@ Kelly Jackson Higgins, the points you make are dead on. The problem is, as technology (whatever the technology is) advances the trend or mantra is "lets make this easier, more efficient", well easy and efficient seems to always trump security and as someone else pointed out that has been passed down from one generation to the next. But, something else has been passed down, education and history, and I have to believe that these Millenials may very well be "smarter" in terms of education and documented history than any generation before them... I just hope they're smart enough to recognize the path we're on and make some adjustments... I think they are, but it's going to take some really hard lessons and hurting along the way.

@ DR T... as for you and WAZE... I'm glad that you love it, you said "...bought by Google, they saw how much engagement this app could create...." , Google only obtained WAZE because they saw how many more people they could add to their DB's, that's business.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
1/28/2015 | 11:13:25 AM
Re: At least they'll have someone to blame
 they will also expect less discussion around security and privacy, those are boring subjects. :--))

@DrT -- If your comment presumes that Millennials will expect less discussion around security and privacy because the problems will be solved, more power to them! (But I doubt it)
Dr.T
Dr.T,
User Rank: Ninja
1/28/2015 | 11:05:48 AM
Re: Ok Millennials, defend yourselves!
I love Waze, I would give anything to e babel to use it :-)-). Waze was a successful startup and was bought by Google, they saw how much engagement this app could create. 
Dr.T
Dr.T,
User Rank: Ninja
1/28/2015 | 10:55:17 AM
Re: Ok Millennials, defend yourselves!
I agree completely. There is no real consequences when an attack happens other than we talk about it and speculate around that. Both attackers and person who does not remove vulnerability should be held responsible. 
Dr.T
Dr.T,
User Rank: Ninja
1/28/2015 | 10:51:49 AM
Re: At least they'll have someone to blame
Good point. We know we are not blaming ourselves today but complaining bout it all the times. The same will happen for millennials, they will also expect less discussion around security and privacy, those are boring subjects. :--))
<<   <   Page 3 / 4   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the &acirc;&euro;&tilde;pec_coupon[code]&acirc;&euro;&trade; parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&amp;date_from=2023-02-17&amp;date_to=2023-03-17 of the component Report Handler. The manipula...