Remove category
Remove Data collection Remove Government Remove Groups Remove Information Security
article thumbnail

CHINA: Clarifications of data classification and grading requirements

DLA Piper Privacy Matters

Under the Data Security Law, organisations are required to classify the data they process according to their level of significance. Data classification. When classifying data, organisations should consider (i) the industry that their data belongs to, and (ii) the business attributes of the data (i.e.

article thumbnail

Threat Report Portugal: Q2 2020

Security Affairs

The Threat Report Portugal: Q2 2020 compiles data collected on the malicious campaigns that occurred from April to Jun, Q2, of 2020. The Portuguese Abuse Open Feed 0xSI_f33d is an open sharing database with the ability to collect indicators from multiple sources, developed and maintained by Segurança-Informática.

Phishing 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Avast details Worok espionage group’s compromise chain

Security Affairs

Cyber espionage group Worok abuses Dropbox API to exfiltrate data via using a backdoor hidden in apparently innocuous image files. Researchers from cybersecurity firm Avast observed the recently discovered espionage group Worok abusing Dropbox API to exfiltrate data via using a backdoor hidden in apparently innocuous image files.

article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

The details of any organization’s plan to become fully GDPR compliant will vary based on the data the organization collects and what it does with that data. The GDPR applies to any organization that processes the personal data of European residents, regardless of where that organization is based.

GDPR 76
article thumbnail

Threat Report Portugal Q1 2020

Security Affairs

The Threat Report Portugal: Q1 2020 compiles data collected on the malicious campaigns that occurred from January to March, Q1, of 2020. Observing the threats by category, it is possible to verify that there was a decrease in the number of malware incidents in contrast to an increase in the cases of phishing over Q1 2020.

article thumbnail

Threat Report Portugal: Q4 2020

Security Affairs

The Threat Report Portugal: Q4 2020 compiles data collected on the malicious campaigns that occurred from October to December, Q4, of 2020. Criminals are also using smishing to enlarge the scope and to impact a large group of victims. The submissions were classified as either phishing or malware. Threats by Sector.

Phishing 105
article thumbnail

U.S. Commerce Department Proposes Expansion of Information and Communications Technology and Services Review Process

Data Matters

2 Specifically, the interim final rule would be amended to include transactions that involve “software, software program[s], or a group of software programs, that [are] designed to be used on an end-point computing device and include[] as an integral functionality, the ability to collect, process, or transmit data via the internet.”