Remove sponsor
article thumbnail

Apple Battling with the Government Again Over Breaking iPhone Encryption of Mass Shooters: Data Privacy Trends

eDiscovery Daily

Remember back in 2016 when Apple with in a court battle with the Department of Justice over giving investigators access to encrypted data on the iPhone used by one of the San Bernardino shooters? Now, Apple is in a new dispute with the government again over the same issue. Or are there bigger privacy concerns at play here?

article thumbnail

SmugX: Chinese APT uses HTML smuggling to target European Ministries and embassies

Security Affairs

” The campaign targeted government entities in Europe, with a focus on foreign and domestic policy entities. The analysis of the documents employed in the campaign that were uploaded to VirusTotal reveals that they the Chinese APT group attempted to target diplomats and government entities in Czechia, Hungary, Slovakia, the U.K.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: Public Sector levels up to tackle Cyber Threats

The Security Ledger

In this Spotlight edition of the podcast, sponsored* by RSA Security, we go deep on public sector cyber risk with two interviews from the most recent RSA Conference: Kelvin Coleman, the Executive Director of the National Cyber Security Alliance (NCSA) and Sean McHenry, the CISO of the Utah State Board of Education.

article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

DOJ officials said the four men were responsible for carrying out the largest theft of sensitive personal information by state-sponsored hackers ever recorded. commercial and government interests. dubbed the “China Initiative Conference.” “It is with the Chinese government and the Chinese Communist Party. .”

Military 250
article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

When I spoke at the University of Florida E-Discovery Conference last month, there was a question from the live stream audience about a lawyer’s duty to disclose a data breach within his or her law firm. Janik’s article covers stopping the breach, restoring systems and determination what happened and the cause.

article thumbnail

Scrutinizing the draft Investigatory Powers Bill

Data Protector

Following the failure of previous attempts to introduce data legislation, the Government has made efforts to consult and engage with communications service providers likely to be most affected by the draft Bill. The Investigatory Powers Bill is the first major piece of legislation governing the Agencies’ powers in over 15 years.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

The government will usually get its ESI by consent or warrant. Typically, when the federal government seeks data in criminal cases (and most states have a similar procedure), it requests a search and seizure warrant by filing an application or affidavit sworn before a judge. Issues Managing ESI Data in Criminal Cases. Additionally, F.