This is part 3 and the last of this series…I could go on just by following all the links, but believe I have presented the main points and links in the original Vulnerability Alerts article. There are other security issues that I am following (most involve Linux), and new ones coming in almost every day. Here are a few I am following, i.e. OpenSMTPD flaw in Linux email servers, a VPN & Ad Blocker provider selling data on Android and iOS devices, how Office 365 blocked “5 billion”phish email attempts in 2018, etc. That’s 5 billion phishing attacked blocked by Microsoft on Office 365 alone!?! WOW! No wonder Linux Developers are seeking Microsoft’s help. Also, is WordPress selling blogger’s data? I mean, what goes on during that TLS Handshake ‘tHiNgIe’, that stuff, and there’s even some Google stuff happening during attempts to connect to a WordPress blog…that’s something else I want to look into. Like I keep saying – ‘when you plug your computer into an electrical outlet, then you become vulnerable to all sorts of attacks.’ Heck, if you include laptops, tablets, and phones then you could also say that the mere ‘plugging in of a battery as another way of making you vulnerable.‘ It doesn’t matter what OS you’re using, that computer and/or phone is opening you up to all kinds malware & other vulnerabilities. However, I will be keeping the *Linux Security Issues* page going for a long time…heck, people need to know that Linux Distros & advocates have been passing false and/or incorrect Linux information to potential Linux newbies for decades. Anyway, on to the Linux problems of Data Breaches & other Technical type of vulnerabilities over the years…

What is a data breach?

A breach is defined as an event in which an individual’s name and a medical record and/or a financial record or debit card is potentially put at risk — either in electronic or paper format. In our study, we identified three main causes of a data breach: malicious or criminal attack, system glitch, or human error. The costs of data breach vary according to the cause and the safeguards in place at the time of the data breach.

Windows 10’s Windows Security comes with virus & threat protection, with Ransomware protection, account protection (I rarely sign into Microsoft & *NEVER* open an account during installation), firewall & network protection, app & browser control, Device security, device performance & health, and Family options (parental controls) at no extra cost. If an attacker really wants into my computer, I probably can’t stop it, but I have found that Windows Security does as good or better job than any of the paid anti-virus programs I have purchased in the past (mainly Kaspersky).

Businesses (especially large ones) pay a lot of money for security, and attackers are sometimes still able to breach those defenses…we have all read those stories. Data Breaches happen all over the world, all the time. Businesses that moved to using Linux servers, thinking that Linux was secure, are discovering that Linux is actually an easy target for attackers. Microsoft helping Linux to understand the ‘Fileless Attacks on Linux’. Even WordPress has Data Breaches … hereherehere to list a few.

If you’ve already had a Data Breach, then what are the chances of you having another one? That depends on where you live, e.g. Organizations in South Africa, India and Brazil are more likely to have another data breach:

Brazil, South Africa, and France appear to have the highest estimated probabilities of a data breach at 43.0 percent, 40.9 percent, and 35.1 percent, respectively. Germany and Australia have the lowest probability of data breach at 14.3 percent and 17.0 percent, respectively.

In closing … the Top 20 Products With the Most Technical Vulnerabilities Over Time: