Coronavirus: Italy approves use of drones to monitor social distancing

Coronavirus: Italy approves use of drones to monitor social distancing

The Italian Civil Aviation Authority (ENAC) confirmed their approval on Monday, after receiving requests for additional support from "many local police units".The authorisation for the use of drones will last until 3 April, when the travel restrictions in Italy will theoretically be lifted.

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

The research was conducted by Palo Alto Networks , a cybersecurity firm, it revealed that 83% devices ran on outdated services that can’t even be updated even when it contains several loopholes that hackers can easily bypass and exploit.

ACLU Sues to End ICE’s Rigged Algorithm for Detaining Immigrants

ACLU Sues to End ICE’s Rigged Algorithm for Detaining Immigrants

The risk assessment algorithm is supposed to provide a recommendation to ICE officers who are then meant to make the final decision, but the agency’s New York Field Office diverged from the algorithm’s ruling less than 1 percent of the time since 2017.

Why does privacy matter when you have nothing to hide? Mappd

Why does privacy matter when you have nothing to hide? Mappd

Using tools like mappd shows organisations that people do care and want to regain a level of control.With the number of data breaches and hacks happening on a daily basis, it’s never been more important to protect yourself digitally and begin to take privacy into your own hands.

Coronavirus Phishing Attacks Aim to Spread Malware Infection

Coronavirus Phishing Attacks Aim to Spread Malware Infection

“The sole intention of these threat actors is to play on the public’s genuine fear to increase the likelihood of users clicking on an attachment or link delivered in a malicious communication, to cause infection, or for monetary gain.

Welfare surveillance system violates human rights, Dutch court rules

Welfare surveillance system violates human rights, Dutch court rules

In the UK, where the government is accelerating the development of robots in the benefits system, the chairman of the House of Commons work and pensions select committee, Stephen Timms, said: “This ruling by the Dutch courts demonstrates that parliaments ought to look very closely at the ways in which governments use technology in the social security system, to protect the rights of their citizens.”.

Mashio.NET - Matthew Walther

Mashio.NET - Matthew Walther

Providers like Google, Apple, Amazon, and Microsoft can, and have, cut people off from the data and services that they rely on to run their lives, businesses, and communities.

Porn site exposes credit cards, passports and more in major data leak

Porn site exposes credit cards, passports and more in major data leak

According to research conducted by VPNMentor, an adult affiliate website supporting more than 66 million registered members, appears to have left a database containing 20GB of visible data unsecured.This incident goes to underscore both the severity of data breaches and the risks of visiting adult websites.

NIST Releases Version 1.0 of Privacy Framework

NIST Releases Version 1.0 of Privacy Framework

“The strong support the Privacy Framework’s development has already received demonstrates the critical need for tools to help organizations build products and services providing real value, while protecting people’s privacy.”.

Facebook: Star Wars' Mark Hamill deletes account over political ads

Facebook: Star Wars' Mark Hamill deletes account over political ads

Image copyright Getty Images Image caption Facebook chief Mark Zuckerberg has said people should be allowed to form their own judgements about what politicians say in ads By contrast, Twitter opted to ban all political adverts from its platform in October.

What if everyone just said 'Nah' to tracking?

What if everyone just said 'Nah' to tracking?

Of this, it's reported that nine were requests for advertising, while more than ninety tried to send data off to "analytics" sites.Late last year, the New York Times ran its own analytics - on a leak of mobile location data - de-anonymising it, then identifying government officials.

Lifelabs Data Breach, the Largest Ever in Canada, May Cost the Company Over $1 Billion in Class-Action Lawsuit

Lifelabs Data Breach, the Largest Ever in Canada, May Cost the Company Over $1 Billion in Class-Action Lawsuit

An October hack of medical testing company LifeLabs exposed the sensitive personal information of an estimated 15 million Canadians.The LifeLabs data breach included lab test results and national health card numbers along with personally identifiable information including names, dates of birth, home addresses and email addresses.

Why an internet that never forgets is especially bad for young people

Why an internet that never forgets is especially bad for young people

The second potential danger is more troubling: in a world where the past haunts the present, young people may calcify their identities, perspectives, and political positions at an increasingly young age.

Pentagon warns US military not to use home DNA testing kits

Pentagon warns US military not to use home DNA testing kits

The Pentagon is advising members of the US military not to use DNA testing kits, warning that the popular genetic identification kits could pose a security risk.But a department of defence memo, obtained by Yahoo News, warned that the kits could put members of the military at risk.

We need to act fast to protect the open internet in India.

We need to act fast to protect the open internet in India.

As a leader in our democracy, you have a responsibility to allow for public review and inform all stakeholders of the outcome before enacting laws that could fundamentally change the rules that govern the internet in India.

47 attorneys general are investigating Facebook for antitrust violations

47 attorneys general are investigating Facebook for antitrust violations

"After continued bipartisan conversations with attorneys general from around the country, today I am announcing that we have vastly expanded the list of states, districts, and territories investigating Facebook for potential antitrust violations," James said in a statement.

Leak of the Personal Information of 20 Million in Ecuador Data Breach Leads to Fast-Tracking of an Improved Data Privacy Law

Leak of the Personal Information of 20 Million in Ecuador Data Breach Leads to Fast-Tracking of an Improved Data Privacy Law

The Ecuador data breach of early September saw a small and relatively newly-formed company gain access to a shocking amount of personal data at the national level, and then leave it exposed in an unsecured database connected to the internet.

North Carolina County Loses $1.7 Million to BEC Scam

North Carolina County Loses $1.7 Million to BEC Scam

The scammers impersonated a building contractor that was constructing a new high school in the County and succeeded in redirecting a $2.5 million payment to their account.Advanced email security solutions such as SpamTitan can identify and block these BEC threats.

Facebook Warns Apple iOS 13 And Android 10 Users About Real-Time Location Tracking

Facebook Warns Apple iOS 13 And Android 10 Users About Real-Time Location Tracking

And so the new OS releases from Google and Apple include settings that let users “control when you share your device’s precise location with apps like Facebook,” Paul McDonald, Facebook’s platforms location engineering director explained.

Google Play App With 100 Million Downloads Was A Trojan

Google Play App With 100 Million Downloads Was A Trojan

Researchers from Kaspersky Lab on Tuesday revealed how CamScanner, a Google Play app that was downloaded for 100 million times, executed secret payloads on users.The Trojan dropper made its way to users’ devices through a CamScanner update that added an advertising library.

A Third of Known Computer Security Flaws Have No Solution

A Third of Known Computer Security Flaws Have No Solution

In the first half of 2019, analysts at computer security firm Risk Based Security (RBS) enumerated a total of 11,092 flaws in computer systems (known as vulnerabilities) that could be exploited by a hacker to take unauthorized actions in another person’s or organization’s system.

First half 2019 sees 4,000 data breaches exposing 4B records

First half 2019 sees 4,000 data breaches exposing 4B records

The 2019 MidYear QuickView Data Breach Report by Risk Based Security found that there were 3,816 data breaches during the first six months of the year, up 54 percent, resulting in 4.1 billion records being compromised, up 52 percent.

Hackers have worked out how to exploit security flaws in hook-up apps

Hackers have worked out how to exploit security flaws in hook-up apps

Security experts have issued a warning after three gay hookup apps - including Grindr - and a threesome app were found to expose users' exact locations, just by knowing the publicly available username.

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google's own security research team.Android is a thriving open-source community, which is great for innovation but not so great when threat actors seize the opportunity to hide malware in basic software loads that come on boxed devices.

'Five Eyes' security alliance calls for access to encrypted material

'Five Eyes' security alliance calls for access to encrypted material

“The Five Eyes are united that tech firms should not develop their systems and services, including end-to-end encryption, in ways that empower criminals or put vulnerable people at risk,” said British Home Secretary Priti Patel.

Social Media

Social Media

Instead of an employee threaten the integrity of your group’s online security, it is in your best interests to implement an Internet filtering solution from TitanHQ.

ANYONE can be re-identified from ‘anonymous data’, researchers claim & let you TEST it

ANYONE can be re-identified from ‘anonymous data’, researchers claim & let you TEST it

Online services that claim to anonymize users’ personal data aren’t as secure as we think, according to researchers who found over 99 percent of people can be identified from a handful of supposedly anonymous data points.

It's not that hard to unmask real people in anonymous data, researchers warn

It's not that hard to unmask real people in anonymous data, researchers warn

The Computational Privacy Group at Imperial College London has also created a tool to check how likely you'd be correctly re-identified in anonymous data sets.

US attorney general William Barr says Americans should accept security risks of encryption backdoors

US attorney general William Barr says Americans should accept security risks of encryption backdoors

U.S. attorney general William Barr has said consumers should accept the risks that encryption backdoors pose to their personal cybersecurity to ensure law enforcement can access encrypted communications.

Studies prove once again that users are the weakest link in the security chain

Studies prove once again that users are the weakest link in the security chain

Organizations need to make sure users understand the importance of protecting sensitive data and safeguarding company assets, and that they’re aware of how their actions impact the overall security for the whole organization.