Remove Examples Remove Exercises Remove Security Remove Video
article thumbnail

Secure Together: video conferencing, credential stuffing and eye strain

IT Governance

Maybe you feel less guilty about having a mid-morning video chat with a colleague in lieu of your normal coffee break. The video conferencing platform Zoom has been heavily criticised in recent weeks , amid a series of allegations related to its inadequate cyber security and privacy measures. Cyber attacks. Expert advice.

Security 124
article thumbnail

EDPB Adopts Guidelines on Data Processing Through Video Devices

Hunton Privacy

The European Data Protection Board (the “EDPB”) recently adopted its Guidelines 3/2019 on processing of personal data through video devices (the “Guidelines”). Although the Guidelines provide examples of data processing for video surveillance, these examples are not exhaustive.

GDPR 57
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From iPhone to NT AUTHORITYSYSTEM – exploit ‘Printconfig’ dll with a real-world example

Security Affairs

From iPhone to NT AUTHORITYSYSTEM – As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example. Here you can watch a video of the POC. He can define himself “security enthusiast”, interested in all emerging technologies in offensive and defensive security.

article thumbnail

Dangerous permissions detected in top Android health apps

Security Affairs

Behind the sleek interfaces and promising functionalities lurks a hidden concern that has captured the attention of security researchers and users alike – dangerous Android app permissions. Android permissions The Android operating system has a comprehensive permission system designed to protect a user’s privacy and security.

Privacy 110
article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Although there have still been a few surprises, with the death of Queen Elizabeth II and blazing heatwaves across the UK to name but two, it was a familiar year in the cyber security landscape. Google , Clearview AI , and Meta all receives hefty penalties in 2022, demonstrating the continued important of effective information security.

Security 132
article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. As someone who’s helped thousands of security professionals learn how to analyze malware at SANS Institute , I have a few tips for how you can get started.

Metadata 145
article thumbnail

Secure together: protecting your mental health during the COVID-19 pandemic

IT Governance

Fed up of seeing your colleagues’ children during video conferences? That means ensuring that you remain productive and – just as important – safe, both in terms of your organisation’s security posture and your mental wellbeing. How your mental health affects your organisation’s security hygiene. How’s working from home going?