Long Article on GM Spying on Its Cars’ Drivers
Schneier on Security
APRIL 26, 2024
Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companies.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Schneier on Security
APRIL 26, 2024
Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companies.
Data Breach Today
JULY 19, 2023
Consider Domains, Features, Ease of Integration, Scalability and Vendor Support API security platforms have become an essential part of any organization's cybersecurity strategy, but with so many options available, it can be difficult to know how to choose the right one.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
JULY 27, 2023
World of Warcraft players wrote about a fictional game element, “Glorbo,” on a subreddit for the game, trying to entice an AI bot to write an article about it. The article was left online for a while but has finally been taken down ( here’s a mirror, it’s hilarious ). It worked : And it…worked.
DLA Piper Privacy Matters
JUNE 10, 2021
However, it shouldn’t be overlooked that another set of standard clauses has been issued by the EU, namely the Article 28 Standard Clauses. These are contained in Article 28 of the GDPR. The EU has published a new set of Article 28 Standard Clauses. What are the key takeaways from these new Article 28 Standard Clauses?
Security Affairs
APRIL 14, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
Troy Hunt
APRIL 6, 2020
I also have an article on [thing] and I think it would be a great addition to your blog. So now when people search for [thing], they'll hopefully end up here rather than on the spammy article thus penalising you for your behaviour. No, no it wouldn't and there are all sorts of reasons why not. Wait - you think It's not spam?
Security Affairs
APRIL 21, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
IG Guru
DECEMBER 13, 2021
Check out the article here. The post Canada Charges Its “Most Prolific Cybercriminal” via Krebs on Security appeared first on IG GURU.
KnowBe4
DECEMBER 26, 2023
The CyberExpress is a VC-backed cyber security news mag that provides the latest news and analysis about the information security industry. In an era marked by relentless technological evolution and the omnipresence of cyber threats, the role of cybersecurity professionals has become increasingly important.
ARMA International
AUGUST 29, 2022
This article is a continuation of the Legacy Disposition White Paper article series. Keep in mind that a disposition program is not “one size fits all,” and the steps below (and really, from this article on) should be approached with that in mind.
Security Affairs
APRIL 7, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
eSecurity Planet
MARCH 18, 2022
Many security professionals think that if they have done the hard work of securing their organization, that should be enough. Even though drafting IT security policies can be a pain, formal policies provide a valuable resource to protect both the IT team and their organization. Written security policies.
Security Affairs
JANUARY 13, 2024
Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
IG Guru
APRIL 6, 2022
Check out the article here. The post IT asset disposal is a security risk CISOs need to take seriously via CSO Online appeared first on IG GURU.
Security Affairs
MARCH 17, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
Security Affairs
JANUARY 11, 2024
Ivanti revealed that two threat actors are exploiting two zero-day vulnerabilities in its Connect Secure (ICS) and Policy Secure. x and Ivanti Policy Secure. x and Ivanti Policy Secure. is a command injection vulnerability in web components of Ivanti Connect Secure (9.x, x) and Ivanti Policy Secure.
Schneier on Security
JANUARY 19, 2023
A group of Swiss researchers have published an impressive security analysis of Threema. We discuss remediations for our attacks and draw three wider lessons for developers of secure protocols. Threema developers advertise it as a more secure alternative to Meta’s WhatsApp messenger.
Hunton Privacy
APRIL 27, 2021
Court of Appeals for the Second Circuit affirmed the dismissal on Article III standing grounds of a data breach class action predicated on an alleged increased risk of identity theft. On those facts, the court found the plaintiffs lacked Article III standing. On those facts, the court found the plaintiffs lacked Article III standing.
Schneier on Security
NOVEMBER 11, 2021
ArsTechnica’s Sean Gallagher has a two – part article on “securing your digital life.” ” It’s pretty good.
Security Affairs
MARCH 24, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Is it a Russia’s weapon?
eSecurity Planet
AUGUST 9, 2022
Regulatory compliance and data privacy issues have long been an IT security nightmare. GDPR (among other legal requirements in the EU and elsewhere) can expose multinational organizations to hefty financial penalties, additional rules for disclosing data breaches, and increased scrutiny of the adequacy of their data security.
IG Guru
FEBRUARY 14, 2022
Check out the article here. The post Getting smart about IT asset disposal and security via Barracuda Blog appeared first on IG GURU.
Security Affairs
MARCH 10, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
IG Guru
SEPTEMBER 9, 2021
Check out the article here. The post Berger Montague partners with Ricoh to increase efficiency and data security, and expedite workflows via Legal IT Professionals appeared first on IG GURU.
Architect Security
JANUARY 8, 2019
Check out my latest article on MEDIUM: Is it even possible to be “completely secure”?
Security Affairs
FEBRUARY 25, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
IT Governance
MARCH 2, 2023
The NCSC (National Cyber Security Centre) has announced a major update to the technical controls of Cyber Essentials. Device unlocking The scheme currently requires organisations to establish certain security controls, such as a limited number of login attempts before a user is locked out of the system.
Security Affairs
AUGUST 7, 2022
Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 377 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived! Pierluigi Paganini. SecurityAffairs – hacking, newsletter).
Security Affairs
DECEMBER 3, 2022
Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 396 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived! Follow me on Twitter: @securityaffairs and Facebook and Mastodon.
CILIP
JANUARY 2, 2024
The first suggestion looked promising – a relevant article, correctly cited with a working Digital Object Identifier (DOI). The first suggestion looked promising – a relevant article, correctly cited with a working Digital Object Identifier (DOI). Can AI read for you & should it? Can Generative AI suggest papers?
Security Affairs
FEBRUARY 18, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
Security Affairs
JANUARY 28, 2024
Every week the best security articles from Security Affairs are free for you in your email box. Korea attempts to use generative AI for hacking attacks: spy agency Cybersecurity Is artificial intelligence the solution to cyber security threats? A new round of the weekly SecurityAffairs newsletter arrived!
Security Affairs
JANUARY 21, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Patch it now!
Schneier on Security
APRIL 18, 2024
The article includes a list of suspicious patterns, and another list of security best practices. Surprising no one, the incident is not unique: The OpenJS Foundation Cross Project Council received a suspicious series of emails with similar messages, bearing different names and overlapping GitHub-associated emails.
ARMA International
SEPTEMBER 13, 2021
In the context of DT, this article defines content as information or data that has context and is consumable by humans and automated systems that allow them to make decisions, support operations, take actions, and monetize value by delivering products and services. Part 3 will discuss how to manage the various DT risks.
Security Affairs
DECEMBER 11, 2022
Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 397 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived! Follow me on Twitter: @securityaffairs and Facebook and Mastodon.
Security Affairs
NOVEMBER 27, 2022
Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 395 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived! Data from 5.4M Data from 5.4M Data from 5.4M Data from 5.4M
Security Affairs
APRIL 16, 2023
Every week the best security articles from Security Affairs are free for you in your email box. Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived!
IT Governance
JUNE 21, 2018
What does Article 30 require? Article 30 of the EU General Data Protection Regulation (GDPR) sets out what exactly organisations need to document in order to comply with the Regulation. What do you need to do to comply with Article 30? But data flow maps are about more than being organised and efficient. Formats (e.g.
Security Affairs
JANUARY 7, 2024
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
IBM Big Data Hub
FEBRUARY 5, 2024
For federal and state governments and agencies, identity is the crux of a robust security implementation. Numerous individuals disclose confidential, personal data to commercial and public entities daily, necessitating that government institutions uphold stringent security measures to protect their assets.
Security Affairs
DECEMBER 31, 2023
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
Security Affairs
SEPTEMBER 11, 2022
Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 383 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived! Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini.
Schneier on Security
OCTOBER 15, 2021
I’m part of a group of cryptographers that has just published a paper discussing the security risks of such a system. (It’s In our paper, we examine both the efficacy of such a system and its potential security failures, and conclude that it’s a really bad idea. We seem to have to do this every decade or so.)
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content