Remove Computer and Electronics Remove Groups Remove Information Security Remove Privacy
article thumbnail

Acer Philippines disclosed a data breach after a third-party vendor hack

Security Affairs

In our commitment to full transparency, we wish to inform you of a recent security incident involving a third-party vendor managing employee attendance data. ph1ns told Bleeping Computer that Acer was hacked, but threat actors did not deploy any ransomware.

article thumbnail

Data Protection: Where’s the Brexit Privacy Dividend?

Data Protector

No longer might UK privacy pros feel obliged to wait for the publication of weirdly worded EDPB opinions. Enormous amounts of money have been spent in a belated acknowledgement of, in many cases, decades of under investment on privacy issues. The GDPR has had a profound impact on many organisations. Was such a fine really appropriate?

Privacy 156
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft sued North Korea-linked Thallium group

Security Affairs

Microsoft sued a North Korea-linked cyber espionage group tracked as Thallium for hacking into its customers’ accounts and networks via spear-phishing attacks. The Thallium APT group aimed at stealing sensitive accounts from Microsoft accounts. 27 in the U.S. District Court for the Eastern District of Virginia.

article thumbnail

Security Affairs newsletter Round 463 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

France Travail data breach impacted 43 Million people Scranton School District in Pennsylvania suffered a ransomware attack Lazarus APT group returned to Tornado Cash to launder stolen funds Moldovan citizen sentenced in connection with the E-Root cybercrime marketplace case UK Defence Secretary jet hit by an electronic warfare attack in Poland Cisco (..)

article thumbnail

Social engineering, deception becomes increasingly sophisticated

Security Affairs

This is done through deep learning methodologies such as the Generative Adversarial Network (GAN) i.e., a group of neural network models for machine learning, deputed to teach computers how to process information by emulating the human brain.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. It made sense.

article thumbnail

The Hacker Mind Podcast: Hacking Charity

ForAllSecure

It is also known as the unlikely epicenter of a small but growing group of hackers. Such as the Electronic Frontier Foundation or EFF. They’re a great resource for privacy information--and they have a browser add on called Badger that keeps your information from advertisers and others.