article thumbnail

Acer Philippines disclosed a data breach after a third-party vendor hack

Security Affairs

is a Taiwanese multinational company that produces computer hardware and electronics, Acer is investigating the security breach with the help of cybersecurity experts and notified the National Privacy Commission (NPC) and the Cybercrime Investigation and Coordinating Center (CICC) in the Philippines.

article thumbnail

Data Protection: Where’s the Brexit Privacy Dividend?

Data Protector

No longer might UK privacy pros feel obliged to wait for the publication of weirdly worded EDPB opinions. Enormous amounts of money have been spent in a belated acknowledgement of, in many cases, decades of under investment on privacy issues. The GDPR has had a profound impact on many organisations. Was such a fine really appropriate?

Privacy 156
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft sued North Korea-linked Thallium group

Security Affairs

Microsoft sued a North Korea-linked cyber espionage group tracked as Thallium for hacking into its customers’ accounts and networks via spear-phishing attacks. The Thallium APT group aimed at stealing sensitive accounts from Microsoft accounts. 27 in the U.S. District Court for the Eastern District of Virginia.

article thumbnail

Security Affairs newsletter Round 463 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

France Travail data breach impacted 43 Million people Scranton School District in Pennsylvania suffered a ransomware attack Lazarus APT group returned to Tornado Cash to launder stolen funds Moldovan citizen sentenced in connection with the E-Root cybercrime marketplace case UK Defence Secretary jet hit by an electronic warfare attack in Poland Cisco (..)

article thumbnail

Could a Mobile App Help Contain COVID-19? Balancing Privacy Rights & Public Interest

AIIM

In one such approach, a multidisciplinary group of computer scientists, mathematicians, and epidemiologists at the Big Data Institute at Oxford University have developed a mathematical model instantiated in a mobile application that traces contact. National Electronic Health Records Database. Privacy and Data Governance.

Privacy 81
article thumbnail

Social engineering, deception becomes increasingly sophisticated

Security Affairs

This is done through deep learning methodologies such as the Generative Adversarial Network (GAN) i.e., a group of neural network models for machine learning, deputed to teach computers how to process information by emulating the human brain.

article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

Related: Leveraging PKI to advance electronic signatures. It used to be that trusting the connection between a workstation and a mainframe computer was the main concern. Modern digital systems simply could not exist without trusted operations, processes and connections.