article thumbnail

Autonomous Vehicles – Canada’s Current Legal Framework: Privacy (Part 4)

Data Protection Report

Across the globe, the race is already underway among vehicle manufacturers to develop fully autonomous vehicles (AVs). AVs currently under development make sense of their surroundings and control vehicle operation through data gathered about the outside world. Additionally, since AVs can collect data from multiple sources (e.g.,

Privacy 85
article thumbnail

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Security Affairs

The experts observed the use of NineRAT at around September 2023 against a European manufacturing entity. Talos believes that NineRAT was built around May 2022, but was first spotted on March 2023 as part of Operation Blacksmith. In March, the threat actors hit a South American agricultural organization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

There are three major threat vectors that harm IoT deployments: Devices are hijacked by malicious software; Data collected and processed in IoT ecosystems is tampered with and impacts the confidentiality, integrity and availability of the information; and, Weak user and device authentication. However, the security mindset is changing.

IoT 96
article thumbnail

Autonomous Vehicles – Canada’s Current Legal Framework: Cybersecurity Considerations (Part 2)

Data Protection Report

AV manufacturers will need to consider these risks and address them early in the design and development process of their products. cellular or Wi-Fi) that collect various types of information. The data collected by an AV may be transmitted to third-party systems for storage or processing (e.g., a cloud service provider).

article thumbnail

Businesses to Assist NHS Test and Trace Efforts

Hunton Privacy

Establishments and companies in the UK will therefore be responsible for the additional collection and potential sharing of customers’ personal data. Any entity engaging in this kind of data collection will need to comply with the requirements of data protection law.

article thumbnail

Australian Defense Department will replace surveillance cameras from Chinese firms Hikvision and Dahua

Security Affairs

An internal audit of surveillance equipment in Australian government and agency offices revealed the presence of more than 900 built systems manufactured by Chinese companies Hikvision and Dahua. The decision of the Australian government is aligned with similar decisions taken by the US and UK governments.

article thumbnail

Smart manufacturing technology is transforming mass production

IBM Big Data Hub

Smart manufacturing (SM)—the use of advanced, highly integrated technologies in manufacturing processes—is revolutionizing how companies operate. Smart manufacturing, as part of the digital transformation of Industry 4.0 , deploys a combination of emerging technologies and diagnostic tools (e.g.,