Sat.Nov 12, 2016 - Fri.Nov 18, 2016

article thumbnail

Apollo – they can’t still be up to their old tricks?

Data Protector

Two years ago I blogged about an unsettling experience I had with Apollo, a firm that had confused me as to what they were really all about. Since then, I’ve had a number of emails from people who have had similar experiences. Today, I’m reprinting (most of) the most recent one – which comments about an organisation called Apollo-Transitions. Surely, this is not the same company as the Apollo company I had encountered?

IT 120
article thumbnail

HCL transcending US protectionism with clear alignment to client's global digital business needs & goals

Collaboration 2.0

HCL's 'Great Digital Leap Forward' will keep astute client partners ahead of US offshoring BPO political protectionism

93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia Set to Block Access to LinkedIn

Hunton Privacy

This post has been updated. . On November 10, 2016, the Court of Appeal for Moscow’s Taginsky District upheld an August 2016 decision by the district’s lower court that LinkedIn had violated Russian data protection laws. Access to the professional networking site is now set to be blocked across Russia. The court’s decision, which followed a complaint from the Russian data protection regulator, Roskomnadzor, found that LinkedIn violated Russian data protection law on two counts: not storing data

Access 67
article thumbnail

Delta Uses Chip Tags, Tracking App to Tackle Lost Bags

RFID Global Solution, Inc.

Tech | Tech News Nov 14, 2016 – There’s nothing like lost luggage to put a damper on the holiday travel season, but a simple piece of technology being added to some luggage tags could help limit the problem. Just in time for the travel rush, Delta is adding Radio Frequency Identification chips, also known as RFID, to paper baggage tags. For an up-close look, tune in tonight at 6:30 p.m. to NBC Nightly News.

Paper 40
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

[0day] [PoC] Risky design decisions in Google Chrome and Fedora desktop enable drive-by downloads

Scary Beasts Security

Overview A confluence of two risky design choices, combined with various implementation issues, makes drive-by downloads possible with Google Chrome on Fedora. In total, with the risky design choices first, the issues are: Chrome will auto download files to a user’s desktop with no confirmation. Fedora’s “tracker” software will auto crawl downloaded files to index them, including media files.

More Trending

article thumbnail

UK Parliament Approves Investigatory Powers Bill

Hunton Privacy

On November 16, 2016, the UK Investigatory Powers Bill (the “Bill”) was approved by the UK House of Lords. Following ratification of the Bill by Royal Assent, which is expected before the end of 2016, the Bill will officially become law in the UK. The draft of the Bill has sparked controversy, as it will hand significant and wide-ranging powers to state surveillance agencies, and has been strongly criticized by some privacy and human rights advocacy groups. .

Privacy 60
article thumbnail

FINRA Fines Brokerage Firm $650,000 After Cyber Attack

Hunton Privacy

On November 14, 2016, Lincoln Financial Securities Corp. (“LFS”), a subsidiary of Lincoln Financial Group, entered into a settlement (the “Settlement”) with the Financial Industry Regulatory Authority (“FINRA”), requiring LFS to pay a $650,000 fine and implement stronger cybersecurity protocols following a 2012 hack into its cloud-based server. In 2012, hackers with foreign IP addresses accessed LFS’s cloud server and stole confidential records of approximately 5,400 customers.

Cloud 56
article thumbnail

Adobe Settles Multistate Data Breach Enforcement Action

Hunton Privacy

On November 7, 2016, Adobe Systems Inc. (“Adobe”) entered into an assurance of voluntary compliance (“AVC”) with 15 state attorneys general to settle allegations that the company lacked proper measures to protect its systems from a 2013 cyber attack that resulted in the theft of the personal information of millions of customers. Under the terms of the AVC, Adobe must pay $1 million to the attorneys general and implement new data security policies and practices.

article thumbnail

NIST Issues Guidance on Cybersecurity for Internet-Connected Devices

Hunton Privacy

On November 14, 2016, the National Institute of Standards and Technology (“NIST”) published guidance on cybersecurity for internet-connected devices, Systems Security Engineering: Considerations for A Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems (the “Guidance”). Citing “the continuing frequency, intensity, and adverse consequences of cyber-attacks,” the Guidance “addresses the engineering-driven perspective and actions necessary to develop more defensible and sur

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.