Remove Communications Remove Exercises Remove Manufacturing Remove Security
article thumbnail

Australian Defense Department will replace surveillance cameras from Chinese firms Hikvision and Dahua

Security Affairs

An internal audit of surveillance equipment in Australian government and agency offices revealed the presence of more than 900 built systems manufactured by Chinese companies Hikvision and Dahua. The presence of cameras poses an unacceptable risk to national security. Federal Communications Commission (FCC).

article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

The latest evolution of digital technologies, such as robotics, Internet of Things, Artificial Intelligence, high-performance computers and powerful communication networks leads self-driving cars out of an imaginary world and into our daily lives. While these technologies are progressing rapidly, the EU intends to ensure common rules.

Privacy 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

The news is curious and it probably has little real if not the fact that Vladimir Putin is not a super cyber security expert, although he knows its importance very well. Nowadays it is a suicide to use a computer running Windows XP because the OS doesn’t receive security updates and it is quite easy to find working exploits online.

article thumbnail

The Results Are in: Modest Changes to CCPA Await the Governor’s Signature

HL Chronicle of Data Protection

If a consumer does not have an account, the CCPA prohibits a business from requiring that consumer to create an account as a condition of exercising their rights. It excepts from the CCPA certain types of owner and vehicle information shared by a vehicle dealer and the manufacturer for vehicle repairs associated with warranties or recalls.

Sales 40
article thumbnail

Time and tide waits for no man – IoT in Insurance

CGI

Context aware - as above, but the context could be whether a building is secure and being occupied. Behavioural based health and wellness - For life insurance, the level of exercise completed could influence the premiums offered. Manage lower risks through pricing premiums based upon real time data. Increase customer engagement.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? Welcome to the hacker by original podcast from for all secure, it's about challenging our expectations about the people who hack for a living.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? Welcome to the hacker by original podcast from for all secure, it's about challenging our expectations about the people who hack for a living.

IoT 52