article thumbnail

Why Your VPN May Not Be As Secure As It Claims

Krebs on Security

But researchers at Leviathan Security say they’ve discovered it’s possible to abuse an obscure feature built into the DHCP protocol so that other users on the local network are forced to connect to a rogue DHCP server. VPNs work by creating a virtual network interface that serves as an encrypted tunnel for communications.

IT 273
article thumbnail

EU Council Presidency Releases Proposed Amendments to Draft ePrivacy Regulation

Hunton Privacy

refraining from sharing metadata or information collected via the use of cookies or similar technologies with third-parties, unless it has been previously anonymized. refraining from sharing metadata or information collected via the use of cookies or similar technologies with third-parties, unless it has been previously anonymized.

Metadata 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU Council Agrees on Proposed ePrivacy Regulation

Data Matters

The ePrivacy Regulation is meant to replace the existing ePrivacy Directive 2002/58 (ePrivacy Directive), which dates to 2002 and was meant to address the requirements of new digital technologies and facilitate the advance of electronic communication services.

GDPR 68
article thumbnail

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

The adoption of emerging technologies like 5G will fuel the proliferation of Internet of Things (IoT) that’s often built with only a few security controls and therefore creating a larger attack surface that enterprises have to deal with., In the rush to beat the competition, security will be an afterthought as opposed to a forethought.

article thumbnail

Judging Facebook's Privacy Shift

Schneier on Security

In security and privacy, the devil is always in the details -- and Zuckerberg's post provides none. Better security for collected user data. Facebook has a large and skilled product security team that says some of the right things. Shutting down a feature based on internal security analysis would be a clear message.

Privacy 90
article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

How will organizations use so-called “vaccine passports” related to employees and customers and how will organizations secure their protected health information (PHI) in response to changing health directives? IA overlaps many areas of design, such as navigation, user experience, user interface, security model, taxonomy, and metadata.

article thumbnail

Article 29 Working Party and EDPS Release Opinions on the ePrivacy Directive

Hunton Privacy

On July 25, 2016, the Article 29 Working Party (the “Working Party”) and the European Data Protection Supervisor (“EDPS”) released their respective Opinions regarding the review of Directive 2002/58/EC on privacy and electronic communications (the “ePrivacy Directive”).