Remove 09
Remove 2017 Remove Computer and Electronics Remove Document Remove Examples Remove Government
article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

At a first sight, the office document had an encrypted content available on OleObj.1 In another way, if the victim opens the document and he/she is not aware of “secret key” how can he/she get infected? In that case, Microsoft programmers used a special and static key to decrypt the “Read Only” documents.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. For example, in John B.

Privacy 97