article thumbnail

Data Protection: Where’s the Brexit Privacy Dividend?

Data Protector

One of the Government's core objectives throughout the Brexit negotiations has been to respect data protection rights, slash Brussels' red tape and allow the United Kingdom to be a competitive safe haven for businesses all over the world. No longer might UK privacy pros feel obliged to wait for the publication of weirdly worded EDPB opinions.

Privacy 156
article thumbnail

Security Affairs newsletter Round 210 – News of the week

Security Affairs

Romanian duo convicted of fraud Scheme infecting 400,000 computers. Locked Shields 2019 – Chapeau, France wins Cyber Defence Exercise. RCE flaw in Electronic Arts Origin client exposes gamers to hack. Hacker broke into super secure French Governments Messaging App Tchap hours after release. Code execution – Evernote.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is data loss and how does it work?

IT Governance

Reminding employees to exercise caution and to back up information wherever possible will mitigate this risk. Unlike desktop computers, laptops don’t have extra covers to protect them from water damage, which increases your risk of electronic components short circuiting. Computer viruses.

IT 98
article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

The Shamoon “wiper” virus , for instance, devastated Saudi oil company Aramaco, destroying the hard drives of more than 30,000 Aramaco computers and forcing a weeklong shutdown of the company’s internal network. A few months later the UAE stood up its National Electronic Security Authority (NESA) which proceeded to do much the same thing.

article thumbnail

Saudi Arabia’s New Data Protection Law – What you need to know

DLA Piper Privacy Matters

This include that data controllers must not use personal means of communications, including postal and electronic addresses, of the data subject in order to sent promotional or awareness materials without first obtaining the consent of the data subject, and providing the data subject with a mechanism to opt out.

article thumbnail

What Counts as “Good Faith Security Research?”

Krebs on Security

Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. In a statemen t about the changes, Deputy Attorney General Lisa O.

Security 237
article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard. What do you like to do outside of work?

MDM 49