Remove 2010 Remove Manufacturing Remove Privacy Remove Security
article thumbnail

FTC Investigating Privacy Risks to Data Stored on Digital Copiers

Hunton Privacy

Federal Trade Commission Chairman Jon Leibowitz recently sent a letter to Congressman Edward Markey, Co-Chairman of the bipartisan Congressional Privacy Caucus, announcing that the FTC will address the privacy risks associated with the use of digital copiers.

Privacy 40
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

But another part involves fears about national security. There is definitely a national security risk in buying computer infrastructure from a country you don't trust. China dominates the subway car manufacturing industry because of its low pricesĀ­ -- the same reason it dominates the 5G hardware industry. Our enemies do it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Even so, the car manufacturers carved out large groups of codes. Since then, car manufacturers have improved on this. Welcome to The Hacker Mind, an original podcast from for all secure. Herfurt: My name is Martin Herfurt and I'm a security researcher. It wasn't very robust. It was a mere 40 bit key length.

article thumbnail

Addition to Washington Breach Law Imposes Retailer Liability in Payment Card Breaches

Hunton Privacy

Under a Washington law effective July 1, 2010, certain entities involved in payment card transactions may be liable to financial institutions for costs associated with reissuing payment cards after security breaches. 1149 applies to three types of entities: businesses , processors and vendors.

Retail 40
article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Take a manufacturing firm operating on a just in time philosophy. Download Now 2010 IT Skills & Salary Report Global Knowledge Are you wondering how your salary compares to your colleagues? There are three Cs.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Both during this week and over previous years, there's been various headlines calling the security posture of Aadhaar into question and the Indian government has been vehemently refuting any suggestion that the system isn't top notch. Security /= George blocking — Vatsalya Goel (@vatsalyagoel) January 9, 2018.

Security 111
article thumbnail

California Passes First Of Its Kind IoT Cybersecurity Law

Privacy and Cybersecurity Law

Below is a summary of California’s new law and some takeaways for IoT device manufacturers as they move toward January 1, 2020 compliance. Core Security Obligation. The new law addresses the security obligations of “manufacturers” of connected devices. Code Ā§ 1798.91.05(c)) ” (Civ. . ” (Civ.

IoT 45