article thumbnail

FTC Release Staff Recap of Informational Injury Workshop

HL Chronicle of Data Protection

The Federal Trade Commission (FTC) recently published a paper recapping its December 2017 Informational Injury Workshop. The paper noted that several important points emerged from the workshop: Informational Injuries: Examples and Harms. Should the Definition of Injury Include Risk of Injury? How will the information be used?

Privacy 40
article thumbnail

TsuNAME flaw exposes DNS servers to DDoS attacks

Security Affairs

NS records define authoritative servers used to resolve a domain, but when a cyclic dependency occurs, the two authoritative servers cannot definitively resolve the domain. The post TsuNAME flaw exposes DNS servers to DDoS attacks appeared first on Security Affairs. queries/s).” queries/s).” Pierluigi Paganini.

Paper 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Releases Staff Perspective on Informational Injuries

Hunton Privacy

In light of these risks, the workshop participants agreed on three factors that governments should consider in determining whether and when to intervene and address these injuries: the sensitivity of the data at issue; how the data at issue will be used; and. whether the data at issue is anonymized or identifiable.

Paper 59
article thumbnail

Data Enrichment, People Data Labs and Another 622M Email Addresses

Troy Hunt

i speak at conferences around the world and run workshops on how to build more secure software within organisations. i'm a pluralsight author, microsoft regional director and most valued professional (mvp) specialising in online security and cloud development.

article thumbnail

Remotely hack a Mercedes-Benz E-Class is possible, experts demonstrated

Security Affairs

In December 2019, the carmaker announced a partnership with the 360 Group to strengthen car IT security for the industry. We analyze the security of Mercedes-Benz cars. The experts initially collected relevant information from the target devices, such as network topology, pin definitions, chip model, and enable signals in the car.

Paper 145
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Now for the big challenge - security. The "s" in IoT is for Security Ok, so the joke is a stupid oldie, but a hard truth lies within it: there have been some shocking instances of security lapses in IoT devices. But there are also some quick wins, especially in the realm of "using your common sense". Let's dive into it.

IoT 143
article thumbnail

FTC Seeks Comment on COPPA Rule

Hunton Privacy

The Commission seeks specific feedback on the Rule’s definitions, privacy policy requirements, methods of seeking verifiable parental consent, security requirements, parental rights and safe harbor provisions. The FTC will hold a public workshop to review the COPPA Rule on October 7, 2019.