article thumbnail

Secure Together: video conferencing, credential stuffing and eye strain

IT Governance

Maybe you feel less guilty about having a mid-morning video chat with a colleague in lieu of your normal coffee break. The video conferencing platform Zoom has been heavily criticised in recent weeks , amid a series of allegations related to its inadequate cyber security and privacy measures. Cyber attacks. Phishing scams.

Security 117
article thumbnail

EDPB Adopts Guidelines on Data Processing Through Video Devices

Hunton Privacy

The European Data Protection Board (the “EDPB”) recently adopted its Guidelines 3/2019 on processing of personal data through video devices (the “Guidelines”). Although the Guidelines provide examples of data processing for video surveillance, these examples are not exhaustive.

GDPR 57
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From iPhone to NT AUTHORITYSYSTEM – exploit ‘Printconfig’ dll with a real-world example

Security Affairs

From iPhone to NT AUTHORITYSYSTEM – As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example. Here you can watch a video of the POC. But what does Apple’s iPhone have to do with it?? Well, keep on reading… ( sorry no ). Boundary conditions. Pierluigi Paganini.

article thumbnail

Dangerous permissions detected in top Android health apps

Security Affairs

Malicious apps with such permissions could spy on users, capture sensitive information, or record audio and video without consent. When an app requests this permission and the user consents, it gains the ability to take photos and record videos using the device’s camera hardware.

Privacy 106
article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

Next, consider watching my Practical Malware Analysis Essentials talk, which will offer practical tips for analyzing Windows malware in your lab: In addition to watching this video, consider reviewing the corresponding slides. Be sure to exercise caution when experimenting with real-world malware like this.).

Metadata 145
article thumbnail

CNIL’s New Guidelines on HR Processing

HL Chronicle of Data Protection

For example, for recruitment purposes, pre-contractual measures or legitimate interests are acceptable legal bases for the CNIL. The CNIL also provides for the first time some detailed examples of retention periods based on the French Labour Code, Social Security Code, and Commercial Code.

article thumbnail

Knowledge Sharing: 5 Strategies to Share Knowledge In the Workplace

AIIM

This can comprise increased interactions, team-building exercises, quizzes, and collaborations. Lead by Example. You must lead by example and show that it's equally important for everyone to do it. It's essential to create an environment that promotes knowledge sharing, so it becomes second nature for the team.