Remove tag consumer-protection
article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

Simple or reused passwords are still a problem. While the cybersecurity industry has presented options for every netizen, the recommendation to use original and complex passwords continues to be disregarded. Instead, people come up with passwords that are comfortable. IoT devices are exposed to cybersecurity vulnerabilities.

IoT 144
article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

And this is precisely why I'm writing this piece - to talk about how I'm assisting the UK and Australian governments with access to data about their own domains. Amongst those verified domain searches are government departments and they too are enormously varied; local councils, legal and health services, telecoms and infrastructure etc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

Ransomware frequently contains extraction capabilities that can steal critical information like usernames and passwords, so stopping ransomware is serious business. The internet is fraught with peril these days, but nothing strikes more fear into users and IT security pros than the threat of ransomware. Jump to: What is ransomware?

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

The Regulation requires that Covered Entities establish and maintain a cybersecurity program designed to protect the confidentiality, integrity, and availability of its information systems and its customers’ NPI as defined in 23 NYCRR §§ 500.01(e) e) and 500.01(g), g), respectively.

article thumbnail

FTC Releases Report on Facial Recognition Technology

Hunton Privacy

The report focuses on privacy concerns associated with facial recognition technology, which is becoming increasingly ubiquitous across a variety of commercial applications ranging from search engines to video games to password authentication. In the report, the FTC illustrates through case studies how companies may implement these principles.

Privacy 40
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. "Have I been pwned?" " by @troyhunt is now up and running. And now, a 10th birthday blog post about what really sticks out a decade later.

article thumbnail

Top 7 Cloud Storage Security Issues & Risks (+ Mitigations)

eSecurity Planet

Cloud storage security issues refer to the operational and functional challenges that organizations and consumers encounter when storing data in the cloud. Use solutions such as Cloud-Native Application Protection Platforms (CNAPP) to reduce risks and speed up response times in the event of a breach. million records exposed.

Cloud 126