article thumbnail

Lazarus APT continues to target cryptocurrency businesses with Mac malware

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. “They have developed custom PowerShell scripts that communicate with malicious C2 servers and execute commands from the operator.

article thumbnail

European Member States and ENISA Issue SOPs to Manage Multinational Cyber Crises

Hunton Privacy

In 2009, the European Commission’s Communication on Critical Information Infrastructure Protection invited EU Member States to develop national contingency plans and organize regular exercises to enhance a closer pan-European Network and Information Security (“NIS”) cooperation plan. Background.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission Outlines Strategy for Revision of the Data Protection Directive

Hunton Privacy

On November 4, 2010, the European Commission (the “Commission”) released a draft version of its Communication proposing “a comprehensive approach on personal data protection in the European Union” (the “Communication”) with a view to modernizing the EU legal system for the protection of personal data.

article thumbnail

A Close Up Look at the Consumer Data Broker Radaris

Krebs on Security

Formed in 2009, Radaris is a vast people-search network for finding data on individuals, properties, phone numbers, businesses and addresses. Federal Communications Commission , which said Unipoint never applied for a license to provide international telecommunications services. government. — was fined $179,000 by the U.S.

Privacy 255
article thumbnail

The Burden of Privacy In Discovery

Data Matters

Protection of personal privacy has, consequently, become an important goal both in technological development — e.g., the increasing prevalence of “privacy by design” in communications programs such as “ephemeral” messaging systems — and in governmental regulation. 72 Indeed, Comment 2.b Preservation.

Privacy 97
article thumbnail

#ModernDataMasters: Blake Morgan, Customer Experience Futurist and Author

Reltio

I started with my own podcast in 2009 called Customer Creation with Blake Landau my maiden name. Groups and departments should be working together to accomplish goals instead of fighting against each other without communicating. I exercise 5 days a week and every day I meditate and walk my dogs.

article thumbnail

#ModernDataMasters: Blake Morgan, Customer Experience Futurist and Author

Reltio

I started with my own podcast in 2009 called Customer Creation with Blake Landau my maiden name. Groups and departments should be working together to accomplish goals instead of fighting against each other without communicating. I exercise 5 days a week and every day I meditate and walk my dogs.