Remove tag service-provider
article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

The threat actor, KryptonZambie, has provided a sample of 100,000 records. Affected information includes users’ names, email addresses, IP addresses and encrypted passwords. We also found 7 organisations providing a significant update on a previously disclosed incident. The claim is yet to be verified. EasyPark data breach: 21.1

article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

While this means more convenience and improved services, it also creates more opportunities for cybercriminals. One of the examples relates to the default settings users get when starting to use a new service. As an example, we could use communications between systems that are not properly encrypted. Improper encryption.

IoT 129
article thumbnail

Facebook Wants You to Send Them Your Naked Pictures to Prevent Revenge Porn. I’m Not Kidding: Data Privacy Trends

eDiscovery Daily

A hash of your most intimate picture is no more revealing than this example provided in the article: 48008908c31b9c8f8ba6bf2a4a283f29c15309b1. Facebook says that it won’t be storing nude pictures but will use photo-matching technology to tag the images after they’re sent via its encrypted Messenger service.