Entry #3

09/14/2024

How might researchers use this information to study breaches?


Researchers may use this information to study different types of breaches, how they happened, what were the vulnerabilities, and study/analyze the strategies of the groups behind the breaches. This can also help researchers study which type of data is more vulnerable or that hackers may target more often. These articles or information can also help track down and shut down certain groups or businesses (like data brokers) who are often behind many breaches. In one of the articles, it explains how some health and fitness apps may have some security risks and how the policies don’t describe those risks, therefore this  helps researches in figuring out which apps don’t describe certain risks in their policies, and which apps may be doing it on purpose to steal information from their users. Along with policies on other apps, not exactly just health apps, that share information without asking for permission of the user or letting them know.