Remove 2013 Remove Examples Remove Exercises Remove Retail
article thumbnail

Selling and utilising personal data in an insolvency situation

Data Protection Report

Many businesses are suffering serious financial difficulties as a result of COVID-19, particularly those in the retail, hospitality and tourism sectors. For example, in February of this year, the FCA and ICO issued a joint statement warning regulated firms and insolvency practitioners of their responsibilities when dealing with personal data.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. There's a smart IoT enabled toothbrush for example, I mean, a toothbrush is a stick with bristles. Vamosi: The book Practical IoT Hacking is full of useful examples. At the same time.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. There's a smart IoT enabled toothbrush for example, I mean, a toothbrush is a stick with bristles. Vamosi: The book Practical IoT Hacking is full of useful examples. At the same time.

IoT 52
article thumbnail

Council of the European Union Releases Draft Compromise Text on the Proposed EU Data Protection Regulation

Hunton Privacy

On May 31, 2013, the Council of the European Union’s Justice and Home Affairs released a draft compromise text in response to the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”). Currently, the Presidency is held by Ireland, with Lithuania taking over on July 1 for the second half of 2013.