Remove Subscribe
article thumbnail

DDoS-for-Hire Services operator sentenced to 13 months in prison

Security Affairs

The defendant made hundreds of thousands of dollars by launching millions of DDoS attacks with the platforms he was operating with a co-conspirator from August 2015 to November 2017. The man was sentenced on one count of conspiracy to cause damage to internet-connected computers for launching millions of DDoS attacks. The Chief U.S.

article thumbnail

Belgium Adopts Law Reforming the Belgian Privacy Commission

Hunton Privacy

On January 10, 2018, the Law of 3 December 2017 creating the Data Protection Authority (the “Law”) was published in the Belgian Official Gazette (available in French and Dutch ). The Law was submitted in the Chamber of Representatives on August 23, 2017, and was approved by the Parliament in plenary meeting on November 16, 2017.

Privacy 55
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bridging the Gap between RIM and IT

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Managing electronic records is arguably more difficult than managing paper. Last month, we talked about how to get on the same page as your Legal colleagues.

IT 40
article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Court Rejects Carpenter Argument for Third Party Subpoena of Google Subscriber Info : In U.S. 2017: Part 1 , Part 2 , Part 3 , Part 4. The webcast is CLE accredited in selected states, so come check it out! PROPORTIONALITY vs. RELEVANCY vs. PRIVACY. Hospital Partners, Inc. Ocwen Loan Serv., Ocwen Loan Serv., One more day to go!

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

Fuzzing makes it possible to locate vulnerabilities even in “safe” environments like Erlang, a language designed for high availability and robust services. The flaw was discovered and reported directly to the administrators of Log4j, widely used open source tool, who then patched it. The trouble is, details of this leaked prematurely.