article thumbnail

Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement

The Security Ledger

Security researcher and IoT hacker Dennis Giese talks about his mission to liberate robot vacuums from the control of their manufacturers, letting owners tinker with their own devices and - importantly - control the data they collect about our most intimate surroundings. Read the whole entry. » Forget the IoT.

IoT 75
article thumbnail

Security Affairs newsletter Round 404 by Pierluigi Paganini

Security Affairs

Copycat Criminals mimicking Lockbit gang in northern Europe Sandworm APT targets Ukraine with new SwiftSlicer wiper ISC fixed high-severity flaws in DNS software suite BIND Patch management is crucial to protect Exchange servers, Microsoft warns Hacker accused of having stolen personal data of all Austrians and more CVE-2023-23560 flaw exposes 100 (..)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in June 2020 ­– 7 billion records breached

IT Governance

Cyber attack on Mid-Michigan College endangers personal data of staff and students (16,000). Data stolen from Silicon Valley consulting firm offered for sale on hacker forum (unknown). Tait Towers Manufacturing discloses security incident affecting employee data (unknown). Data breaches. hack (350,000).

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Connectivity enables powerful, revenue-generating capabilities…from data telemetry and runtime analytics, to effectively predicting and maintenance requirements. There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars.

IoT 77
article thumbnail

China: Navigating China episode 18: Increased scrutiny over connected car and automobile industry data from Chinese regulators, including push towards data localisation

DLA Piper Privacy Matters

The Draft Provisions apply across the industry, not just to vehicle designers and manufacturers, but also parts and software providers, dealers, maintenance and repair agencies, online car hailing organisations and insurance companies. deletion of sensitive personal information within two weeks when requested by the driver, etc.

article thumbnail

Article 29 Working Party Opines on Mobile Apps

Hunton Privacy

On February 27, 2013, the Article 29 Working Party (the “Working Party”) adopted an Opinion (the “Opinion”) addressing personal data protection issues related to the development and use of applications on mobile devices. App developers should create tools that enable users to customize retention periods for their personal data.

article thumbnail

List of Data Breaches and Cyber Attacks in March 2023 – 41.9 Million Records Breached

IT Governance

Regardless of the specific techniques being used, it’s likely that millions of sensitive data records have been compromised – although few victims have listed specific figures. AT&T AT&T has notified approximately 9 million customers that their personal data has been exposed in a data breach.