article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

Main takeaways from the EDBP guidelines are: Connected vehicles raise various privacy and data protection concerns, such as the lack of control and information asymmetry, the risk of excessive data collection; the risk of unlawful further processing of personal data; Most data associated with connected vehicles are considered as personal data (e.g.

Privacy 69
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

If the vendor doesn’t have a demo of IoT security, ask them for a product walkthrough and some case studies that show how successful the product’s been over time. Additionally, some vendors offer cybersecurity for operational technology, which includes industrial and manufacturing systems.

IoT 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy Implications of Tracking Wireless Access Points

Schneier on Security

Brian Krebs reports on research into geolocating routers: Apple and the satellite-based broadband service Starlink each recently took steps to address new research into the potential security and privacy implications of how their services geolocate devices.

Access 102
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

The Russia Ukraine scenario, although let's not downplay the lies, that it's affecting the strife, it's causing economic damage and everything else but it is, amazingly enough, staying in this one little localized area, and everyone almost has the ability to treat this like it's a case study. VAMOSI: So staying with privacy.

article thumbnail

Security Affairs newsletter Round 461 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Airport Breach UAC-0149: Targeted selective attacks against the Defense Forces of Ukraine using COOKBOX (CERT-UA#9204) Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day 0-Click Account Takeover on Facebook CISA and Partners Release Advisory on Threat Actors Exploiting Ivanti Connect Secure and Policy Secure Gateways Vulnerabilities (..)

Security 104