fbpx

Free tools and resources for Data Protection Officers!

Category Archives for "Security"

EU pushes to link tracking databases

Lawmakers are set to approve plans for an enormous new database that will collect biometric data on almost all non-EU citizens in Europe’s visa-free Schengen area.

The database — merging previously separate systems tracking migration, travel and crime — will grant officials access to a person’s verified identity with a single fingerprint scan.

Source: EU pushes to link tracking databases – POLITICO

Hackers publish personal data on thousands of US police officers and federal agents

A hacker group has breached several FBI-affiliated websites and uploaded their contents to the web, including dozens of files containing the personal information of thousands of federal agents and law enforcement officers.

The hackers breached three sites associated with the FBI National Academy Association, a coalition of different chapters across the U.S. promoting federal and law enforcement leadership and training located at the FBI training academy in Quantico, VA.

The hackers then put up for download on their own website the data containing about 4,000 unique records, including member names, a mix of personal and government email addresses, job titles, phone numbers and their postal addresses.

Source: Hackers publish personal data on thousands of US police officers and federal agents | TechCrunch

EU Commission Issues Recommendation on Cybersecurity in the Energy Sector

The European Commission has published a Recommendation on cybersecurity in the energy sector.

The Recommendation builds on recent EU legislation in this area, including the NIS Directive and EU Cybersecurity Act (see our posts here and here ). It sets out guidance to achieve a higher level of cybersecurity taking into account specific characteristics of the energy sector, including the use of legacy technology and interdependent systems across borders.

Source: EU Commission Issues Recommendation on Cybersecurity in the Energy Sector

Amazon staff listen to customers’ Alexa recordings

Staff review audio in effort to help AI-powered voice assistant respond to commands.

When Amazon customers speak to Alexa, the company’s AI-powered voice assistant, they may be heard by more people than they expect, according to a report. Amazon employees around the world regularly listen to recordings from the company’s smart speakers as part of the development process for new services.

Source: Amazon staff listen to customers’ Alexa recordings, report says

‘Privacy Is Becoming a Luxury’: What Data Leaks Are Like for the Poor

The last few years have featured some of the largest and most potentially damaging data leaks in history, like the Equifax credit breach. But low-income Americans often find themselves trading personal information for access to benefits ranging from food to housing to childcare.

“For low-income people, the stakes [of a data breach] are higher,” said Michele E. Gilman, director of the Saul Ewing Civil Advocacy Clinic at the University of Baltimore, and a former Department of Justice civil rights attorney. She cited examples of former clients whose utilities were shut off after someone opened a false account in their name and failed to pay, or who were picked up on warrants for crimes committed by someone else under their name. For people without money to quickly reinstate a utility service or hire a criminal attorney, those types of errors—even if eventually rectified—can have long-lasting consequences, including job loss or child protective involvement.

Full article: ‘Privacy Is Becoming a Luxury’: What Data Leaks Are Like for the Poor – VICE

Your Data Might Be Safe in the Cloud But What Happens When It Leaves the Cloud?

Cloud service providers can successfully protect data physically and technologically while it is in the cloud, but that information can be vulnerable to hacking as soon as it leaves the cloud to interact with another system.

To protect your data through every transaction, take the following measures:

  1. Practice internet safety.
  2. Encrypt connected devices.
  3. Use multifactor authentication (MFA).
  4. Protect backups.

Full article: Your Data Might Be Safe in the Cloud But What Happens When It Leaves the Cloud?

GDPR has driven improved cyber resilience

The introduction of the General Data Protection Regulation (GDPR) has made more UK businesses more resilient to cyber risk, the UK government has said in its latest annual cybersecurity breach survey.

Survey was carried out in the final three months of 2018. The government asked 1,566 UK businesses if they had experienced cybersecurity breaches or attacks within the previous 12 months. In response, 32% of businesses said they had, down from the 43% that said they had experienced such incidents in last year’s survey.

Source: GDPR has driven improved cyber resilience, says UK government

HTTPS Isn’t Always as Secure as It Seems

A surprising number of high-traffic sites have TLS vulnerabilities that are subtle enough for the green padlock to still appear.

Transport Layer Security, or TLS, encrypts data between your browser and the web servers it communicates with to protect your travel plans, passwords, and Google searches from prying eyes. But new findings from researchers at Ca’ Foscari University of Venice in Italy and Tu Wien in Austria indicate that a surprising number of encrypted sites still leave these connections exposed.

Source: HTTPS Isn’t Always as Secure as It Seems | WIRED

The Latest Big Data Breach Should Make You Rethink How You Pay For Everything

The restaurant group Earl Enterprises confirmed that over two million credit cards were compromised in a breach affecting diners at Buca di Beppo, Earl of Sandwich, Planet Hollywood, Chicken Guy! and other restaurants between May 2018 and March 2019.

This breach presents a timely opportunity for consumers to reassess their own level of risk. Mobile pay systems – Apple Pay, Google Pay (formerly Android Pay), Samsung Pay and others – are more secure than other payment methods.

Source: The Latest Big Data Breach Should Make You Rethink How You Pay For Everything

1 2 3 93
>