Cybersecurity

Cybersecurity Data Privacy

Get the latest headlines about data protection, including data privacy laws & more. These issues are symptoms of a profound shift in the world of data privacy & security that have major implications for organizations. With the rise of big data & machine learning, privacy & security are now converging.

Top news of the week: 22.10.2022.

#BeCyberAware
#dailydarkweb
#infosec
#report
#cybersecurity

@BrianHonan shared
On Oct 17, 2022
RT @gcluley: Fine for Shein! Fashion site hit with $1.9 million bill after lying about data breach https://t.co/10SxErkxzt
Open
@OrinKerr shared
On Oct 19, 2022
The frustrating part of these sorts of stories is that we only get snippets from FOIA requests, typically from the surveillance tool company's sales pitch to the govt that their tool is super-powerful. The big Q is, pitch aside, is it really? https://t.co/p1PhybYx6Y
Open
What is Fog Reveal? A legal scholar explains the app some police forces are using to track people without a warrant

What is Fog Reveal? A legal scholar explains the app some police forces are using to track people without a warrant

Some US law enforcement agencies are using a commercial app that tracks people all day long via their phones – without a court order or oversight.

@zcobb shared
On Oct 21, 2022
A good read to share with “average users” during cybersecurity awareness month, and beyond. #BeCyberAware https://t.co/ypbNucWlaF
Open
These cybersecurity tips from a former hacker can make you 98% less vulnerable: ‘You’re raising the bar’

These cybersecurity tips from a former hacker can make you 98% less vulnerable: ‘You’re raising the bar’

Kevin Mitnick is a former hacker, turned prominent cybersecurity consultant. He offers tips for evading hackers, starting with managing your passwords.

@thegrugq shared
On Oct 20, 2022
RT @slashid_dev: We published an overview of the cryptographic primitives and the architecture of our Data Vault module. https://t.co/MXySj6kNpk
Open
App-layer cryptographic primitives for secure storage of user data

App-layer cryptographic primitives for secure storage of user data

In this blogpost we explore the cryptographic primitives and design decisions we made building our Data Vault module. Our service is a globally replicated, field-level encrypted, data store ...

@thegrugq shared
On Oct 17, 2022
RT @mrkoot: Scanning phones to detect child abuse evidence is harmful, 'magical' thinking (Oct 13) https://t.co/CiWSqNWVBi Direct link to @rossjanderson's paper "Chat Control or Child Protection?" (.pdf, 19 pages, Oct 11): https://t.co/3SZf8oe2Ol a response to the Levy-Robinson paper
Open
Chat Control or Child Protection

Chat Control or Child Protection

8 For a survey of UK datasets, see Kairika Karsna and Liz Kelly, “The scale and nature of child sexual abuse: review of evidence”, csacentre.org.uk, 2021; they note ‘no estimate …

@Infosec_Tourist shared
On Oct 16, 2022
RT @DailyDarkWeb: Cyber Security: A Year in Review - by @Nasdaq "Over the last year, cybersecurity has become an even more crucial part of everyday life and a top priority for businesses and governments around the world" https://t.co/hpOaYNUiCi #dailydarkweb #cybersecurity #infosec #report https://t.co/HuIZVXYHDT
Open
Nasdaq_CyberUpdates_Review_092022

Nasdaq_CyberUpdates_Review_092022

For example, 27 government entities in Costa Rica were under attack in April-May 2022, and some of the worst affected included the Ministry of Finance and its two portals, the …