article thumbnail

Telstra warns public trust will crumble unless access to data is limited

The Guardian Data Protection

Telco says diverse agencies accessing data through legal loophole need to follow the same process as law enforcement bodies Telstra has warned that public trust in the security of their data will be eroded if government agencies continue to be allowed access to it without appropriate authorisation.

Access 45
article thumbnail

Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo

Krebs on Security

In March 2020, KrebsOnSecurity alerted Swedish security giant Gunnebo Group that hackers had broken into its network and sold the access to a criminal group which specializes in deploying ransomware. Five months later, Gunnebo disclosed it had suffered a cyber attack targeting its IT systems that forced the shutdown of internal servers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

It is not known how long the database was publicly available, nor whether anyone else accessed it. Welfare Benefits Plan Source 1 ; source 2 New Healthcare USA Yes 13,079 Insurance ACE/Humana Inc. Fowler sent a responsible disclosure notice when he discovered the database and it was secured the following day.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. In November 2023, Northwell Health – the largest health system in New York – confirmed that it was affected by the incident.

article thumbnail

Innovative Solutions to Real Business Problems with Big Data from Space

CGI

Copernicus is Europe’s most ambitious EO programme and provides full free and open access to data for the development of applications in a wide variety of domains. Agriculture: Submissions to support national scale crop monitoring, early yield prediction, or regulatory compliance checking. Wed, 06/27/2018 - 10:00.

article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

The use of IoT technologies holds enormous potential in practically every segment of human enterprise – government, banking and finance, healthcare, retail, agriculture, and ecommerce to name a few. Enterprises deploy PKIs to manage the identities of individuals and devices, and to control access to network resources.

IoT 72
article thumbnail

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

IT Governance

TB exfiltrated Comcast Cable Communications, LLC (Xfinity) Source 1 ; source 2 (New) Telecoms USA Yes 35,879,455 Tecnoquadri Srl Source (New) Manufacturing Italy Yes 33,000,000 Asia Insurance Co.