Remove 11
Remove 2013 Remove Analysis Remove Data Remove Government Remove Security
article thumbnail

The Week in Cyber Security and Data Privacy: 16–22 October 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks City of Philadelphia discloses data breach after five months Date of breach: 24 May 2023 ( notice issued 20 October 2023).

article thumbnail

Former NSA TAO hacker sentenced to 66 months in prison over Kaspersky Leak

Security Affairs

Former NSA TAO hacker was sentenced to 66 months in prison because he leaked top-secret online documents related to the US government ban on Kaspersky. The tools were detected by the Kaspersky Lab software installed on the NSA hacker’s personal computer and were sent back to Kaspersky’s server for further analysis. Equestre.*”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security pros than the threat of ransomware. Attackers will inform the victim that their data is encrypted. Raising awareness about ransomware is a baseline security measure. How ransomware works. Screenshot example. Staff Awareness.

article thumbnail

Supreme Court Finds Lack of Standing to Challenge Foreign Intelligence Surveillance Act

Hunton Privacy

On February 26, 2013, the United States Supreme Court decided in Clapper v. The FISA was enacted in 1978 to authorize and regulate certain government electronic surveillance of communications for foreign intelligence purposes. Following the attacks on 9/11, President George W. Amnesty International that U.S.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. Data is not just a resource for better marketing, better service and delivery. Data is used to build products themselves. It has become a cliché that data is the new oil.

GDPR 120
article thumbnail

The Burden of Privacy In Discovery

Data Matters

Most of that focus has centered on data collection, storage, sharing, and, in particular, third-party transactions in which customer information is harnessed for advertising purposes. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts?

Privacy 97
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Security enthusiast and Linux evangelist Binni Shah consistently offers valuable tutorials, guides, and insights for the cybersecurity community. Binni Shah | @binitamshah.