article thumbnail

STEPS FORWARD: Regulators are on the move to set much needed IoT security rules of the road

The Last Watchdog

Related: The need for supply chain security This is to be expected. We went over how governments around the world are stepping up their efforts to impose IoT security legislation and regulations designed to keep users safe. What we can ask them to do is to look for these security labels coming soon to IoT products.

IoT 220
article thumbnail

My TED Talks

Schneier on Security

TEDxPSU 2010: “ Reconceptualizing Security ” TEDxCambridge 2013: “ The Battle for Power on the Internet ” TEDMed 2016: “ Who Controls Your Medical Data ?” I have spoken at several TED conferences over the years. ” I’m putting this here because I want all three links in one place.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Party Like a Russian, Carder’s Edition

Krebs on Security

The name of this particular card shop won’t be mentioned here, and its various domain names featured in the video have been pixelated so as not to further promote the online store in question. WARNING: Some viewers may find this video disturbing. He now works as a private cybersecurity consultant).

article thumbnail

FBI Arrests Alleged Owner of Deer.io, a Top Broker of Stolen Accounts

Krebs on Security

FBI officials last week arrested a Russian computer security researcher on suspicion of operating deer.io , a vast marketplace for buying and selling stolen account credentials for thousands of popular online services and stores. Social Security Numbers, dates of birth, and victim addresses,” the indictment states.

Sales 298
article thumbnail

EDPB Adopts Guidelines on Data Processing Through Video Devices

Hunton Privacy

The European Data Protection Board (the “EDPB”) recently adopted its Guidelines 3/2019 on processing of personal data through video devices (the “Guidelines”). Although the Guidelines provide examples of data processing for video surveillance, these examples are not exhaustive.

GDPR 57
article thumbnail

Zoom Settles with FTC Over Deceptive Security Claims

Hunton Privacy

On November 9, 2020, the Federal Trade Commission announced it had entered into an consent agreement (the “Proposed Settlement”) with Zoom Video Communications, Inc. reviewing software updates for security flaws and ensuring that updates will not hamper third-party security features.

article thumbnail

A Deep Dive Into the Residential Proxy Service ‘911’

Krebs on Security

The 911 user interface, as it existed when the service first launched in 2016. net available at the Wayback Machine shows that in 2016 this domain was used for the “ ExE Bucks ” affiliate program, a pay-per-install business which catered to people already running large collections of hacked computers or compromised websites. .