article thumbnail

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

“The vulnerabilities to hacker attacks found in government- issued ID cards supplied by the Franco-Dutch company marked an embarrassing setback for Estonia, which has billed itself as the world’s most digitalised “e-government”.” ” reported the Reuters. At the time, Estonia had issued 1.3 “continues the Reuters.

article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Programs like iDefense Labs Vulnerability Contributor Program (VCP) (launched in 2002) and TippingPoint’s Zero Day Initiative (2005) were accused -at the time- of incentivizing the work of criminals and bad actors. . In recent years, even “old economy” industrial and manufacturing firms like Ford, GM and John Deere got into the act.

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Biden administration issues Executive Order and takes action to enhance maritime cybersecurity

Data Protection Report

Alongside the Executive Order, the Biden administration announced a plan to invest in the domestic manufacturing of port cranes to reduce reliance on foreign-built infrastructure potentially used by nation-state and financially motivated attackers to disrupt U.S. organizations.

article thumbnail

UK Government Announces Implementation of EU Cookies Law

Hunton Privacy

As we previously reported , the UK government had reassured businesses that it would carry out the implementation in a manner that would minimize the impact on businesses and consumers. Under the revised ePrivacy Directive 2002/58/EC, websites that use cookies to track their users will be required to obtain explicit consent from users.

article thumbnail

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

A number of computer manufacturers and cloud service providers have deployed sandboxes for regular use by clients. Sandboxing can detect the newest and most critical threats, foster collaboration, minimize risks, and facilitate IT governance. Also Read: How VMI Can Improve Cloud Security. Why sandboxing? Malware Analysis. Proofpoint.

article thumbnail

Article 29 Working Party and EDPS Release Opinions on the ePrivacy Directive

Hunton Privacy

On July 25, 2016, the Article 29 Working Party (the “Working Party”) and the European Data Protection Supervisor (“EDPS”) released their respective Opinions regarding the review of Directive 2002/58/EC on privacy and electronic communications (the “ePrivacy Directive”).

article thumbnail

Blockchain Part of Sphereon’s Content Services Suite

Info Source

In 2002, we started out building our own solution for document management, workflow, and scanning. This might be a change of address, for example, which is important to the local government and many other institutions as well.”. Ten years later, they were down to 750,000 pages per year.