Remove tag health-data
article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

This is a little project I started whilst killing time in a hotel room in late 2013 after thinking "I wonder if people actually know where their data has been exposed?" And this is precisely why I'm writing this piece - to talk about how I'm assisting the UK and Australian governments with access to data about their own domains.

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

perform risk assessments for data stored or transmitted within its information systems, particularly the First American main document repository, known as FAST, and EaglePro applications, which transmitted and stored NPI as discussed below (23 NYCRR ยง 500.02). e) and 500.01(g), g), respectively.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February โ€“ 3 March 2024

IT Governance

At the end of each month, these incidents โ€“ and any others that we find โ€“ will be used to inform our monthly analysis of data breaches and cyber attacks. Data breached: 183,754,481 records. EasyPark data breach: 21.1 million data records belonging to EasyPark have been listed for sale on a hacking forum.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

The FTC claims that spy phones secretly harvested and shared data on people's physical movements phone news online activities through a hidden hack. What role does technology play in facilitating intimate partner abuse? What role might the security industry have in identifying or even stopping it? It's natural. So I hope you'll stick around.