Remove 12
Remove 2011 Remove Examples Remove Exercises Remove Security
article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

identifiers such as a real name, alias, postal address, unique personal identifier, online identifier, internet protocol address, email address, account name, Social Security number, driver’s license number or passport number. A consumer may request this information twice in a 12-month period. biometric information. geolocation data.

GDPR 79
article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

identifiers such as a real name, alias, postal address, unique personal identifier, online identifier, internet protocol address, email address, account name, Social Security number, driver’s license number or passport number. A consumer may request this information twice in a 12-month period. biometric information. geolocation data.

GDPR 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. In 2011, there a was user in a chat room by the name of altoid, like the mint. Anyone talking about it in 2011 most likely had inside information.

Privacy 52
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Where the Information Commissioner gives notices to data controllers, she can now secure compliance, with the power to issue substantial administrative penalties of up to 4% of global turnover. How then will we secure adequacy without adhering to the charter? Where she finds criminality, she can prosecute.

GDPR 120
article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

The crash is of course deterministic and it would be possible to code the exploit to cater for arbitrary glibc binaries; this is left as an exercise for the reader. Would you believe that Ubuntu 12 and 14 ship not one but two different code bases for playing NSF files? distribution. uses gstreamer-0.10 for all its audio handling needs.

article thumbnail

A Flurry of Recent Cybersecurity Activity from the Trump Administration

Data Matters

For example, in 2013, the Federal Bureau of Investigation (FBI) partnered with Microsoft to disrupt more than 1,400 Citadel botnets. Products should be secured during all stages of the lifecycle ,” as it is too easy to assemble botnets when devices lack the ability for effective patching or “remain in service after vendor support ends.”.