article thumbnail

List of data breaches and cyber attacks in February 2020 – 623 million records breached

IT Governance

Ordinance Survey discovers breach of employee data (1,000). South Carolina-based United Health notifies patients of 2019 data breach (36). Ashley Madison data breach victims still being hounded by sextortion scammers (unknown). Massive MGM data breach might be a smokescreen for more insidious attack (10.6

article thumbnail

ITALY: First GDPR fine issued!

DLA Piper Privacy Matters

The first GDPR fine was issued in Italy by the Garante for the lack of implementation of privacy security measures following a data breach on the so-called Rousseau platform operating the websites of the Movimento 5 Stelle party. The fact of the case relating to the Rousseau platform.

GDPR 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is an Insider Threat? Definition, Types, and Examples

IT Governance

According to the 2022 Verizon Data Breach Investigations Report , insider threats account for 18% of all security incident. Meanwhile, a Ponemon Institute report found that data breaches caused by insiders increased by 14% between 2018 and 2022. But who exactly is causing these incidents and why?

article thumbnail

Facebook May Have Gotten Hacked, and Maybe It’s Better We Don’t Know

Adam Levin

Mobile apps send user data to Facebook (even for non-Facebook users): A study by Privacy International showed that several Android apps, including Yelp, Duolingo, Indeed, the King James Bible app, Qibla Connect, and Muslim Pro all transmit users’ personal data back to Facebook. In short, there is no upside.

Privacy 40
article thumbnail

Is the Resurgence of Phishing Attacks A Cause For Concern?

Adapture

The malware can be a system-locking ransomware, a credential-stealing keylogger, a network-crippling worm, or just about any havoc-wreaking miscreant. login credentials, personal data, etc). The website, on the other hand, usually contains additional content and a form urging the victim to submit confidential information (e.g.