fbpx

Free tools and resources for Data Protection Officers!

Tag Archives for " security "

Cyber attack eases, hacking group threatens to sell code

Shadow Brokers, the group that has taken credit for that leak, threatened on Tuesday to release more recent code to enable hackers to break into the world’s most widely used computers, software and phones.

Source: Cyber attack eases, hacking group threatens to sell code | Reuters

5 things we learned from WanaCryptor, the biggest ransomware attack in internet history

On Friday, some hospitals in the United Kingdom were struck with a peculiar attack: computers taken over, data inside encrypted and held ransom, all for the measly payment of just $300. The attack spread rapidly, hitting 150 countries and shutting down everything from telecoms in Spain to the Interior Ministry in Russia. And then, through a stroke of luck, the WanaCryptor attack was stalled in its tracks, a killswitch discovered by happenstance just in time for the weekend. What, exactly are we to make of the largest ransomware attack in history?

Source: 5 things we learned from WanaCryptor, the biggest ransomware attack in internet history | Popular Science

Consumers Less Confident About Healthcare, Data Privacy, and Car Safety, New Survey Finds

Consumer Reports’ second Consumer Voices Survey finds consumers’ confidence on healthcare, data privacy, and car safety has fallen since January when the new Administration took office.

Source: Consumers Less Confident About Healthcare, Data Privacy, and Car Safety, New Survey Finds – Consumer Reports

Minority Report Becomes Reality? 

Remember the movie “Minority report” where future police could spot a crime before it even happens? It may soon become a reality. A Russian company NTechLab claims they have created emotion reading technology that can identify people in a crowd and tell if they are angry, stressed or nervous. Such tool can then be used by police to pre-emptively identify and stop criminals and potential terrorists.

Source: Emotion reading technology claims to spot criminals before they act 

Google’s NightWatch Team Stands Between Users and Dark Places of the Internet

The NightWatch team at Google is unique not just at the internet giant, but for Silicon Valley overall, where an emphasis on being quick to market and capturing audience attention often comes at the expense of creating a product that takes into account the diverse range of people using it. Made up of engineers, lawyers, activists, and others who take a special interest in advocating for communities that might otherwise be overlooked, the NightWatch team doesn’t look like the average group of people you’d find on a tech campus.

Source: You’ve Never Heard Of This Team At Google — But They’re Thinking About You

On Balancing Insider-Threat Protection and Employee Privacy

Insider attacks is serious threat to business. They are hard to detect and stop with traditional preventative controls. Cloud computing and BYOD makes it even harder. However, practices engaged in by business to secure their data and prevent data breaches may come in conflict with employees right to privacy.

Source: On Balancing Insider-Threat Protection and Employee Privacy

Exclusive: John McAfee Reveals World’s ‘Most Hack-Proof’ Smartphone

 

Cybersecurity pioneer and creator of famous antivirus program, John McAfee, has revealed plans to produce John McAfee Privacy Phone – the “world’s first truly private smartphone.” He claims it will be the most hack-proof smartphone ever manufactured.

Source: Exclusive: John McAfee Reveals World’s ‘Most Hack-Proof’ Smartphone

German DPA Publishes English Translation of Standard Data Protection Model

On April 13, 2017, the North Rhine-Westphalia State Commissioner for Data Protection and Freedom of Information published an English translation of the draft Standard Data Protection Model (“SDM”). The SDM was adopted in November 2016 at the Conference of the Federal and State Data Protection Commissioners.

Source: German DPA Publishes English Translation of Standard Data Protection Model : : Privacy & Information Security Law Blog

1 20 21 22
>