This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The post EDRi PrivacyCamp22 – Panel: ‘Surveillance Tech As Misclassification 2.0 ’ appeared first on Security Boulevard. Sincere thanks to EDRi (European Digital Rights) for publishing their phenomenal videos from the EDRi PrivacyCamp22 Conference on the organization’s YouTube channel. For The Gig Economy?’
The post EDRi PrivacyCamp22 – Panel: ‘Regulating Surveillance Ads Across The Atlantic’ appeared first on Security Boulevard. Sincere thanks to EDRi (European Digital Rights) for publishing their phenomenal videos from the EDRi PrivacyCamp22 Conference on the organization’s YouTube channel.
We investigate the consequences of referencing non-existent legal cases, the lawyer’s claim of […] The post Netflix Cracks Down on Password Sharing, AI Legal Research Gone Wrong, Fake Identities and Surveillance Firms appeared first on Shared Security Podcast.
The post CPDP 2021 – Moderator: Eleni Kosta ‘The Use Of Ai In State Surveillance: Challenges For Privacy’ appeared first on Security Boulevard. Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel.
The EARN IT Act is back for a second time which would pave the way for a new massive government surveillance system in the US, romance scams are on the rise so don’t fall for love in all the wrong places, and details about a new ransomware attack that wants you to like and subscribe, […].
The post CPDP 2021 – Moderator: Rosamunde Van Brakel ‘Involving Data Subjects In Democratic Oversight Of Police-Use Of Surveillance Technologies’ appeared first on Security Boulevard.
The post CPDP 2021 – Moderator: John Davisson ‘Student Privacy At Risk Under Covid-19: Online Test Proctoring Brings AI And Surveillance Into Students’ Homes’ appeared first on Security Boulevard.
In this week’s episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the informationsecurity field. Read the whole entry. »
In this week’s episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the informationsecurity field. Read the whole entry. »
The post CPDP 2021 – Moderator: Chloé Berthélémy ‘New Police Surveillance Technologies: Combatting The Science Fiction Collectively – A Civil Society Perspective’ appeared first on Security Boulevard.
The post CPDP 2021 – Moderator: Alexander Fanta ‘Smile For The Camera, You Are Being Watched’, Workplace Surveillance: Enforcing Worker’s Rights’ appeared first on Security Boulevard.
Moss also said that all hacking is not infosec and that all infosec is not hacking. Where with infosec the goal is to produce income. ” This set up a basic dichotomy throughout his talk in that hacking doesn’t require professionalism just curiosity and Infosec does require professionalism but not always curiosity.
Two Foundational Frameworks: ISO 27001 and HIPAA With the growing number of risks in the informationsecurity space, a standardized approach is crucial to protecting an organization’s operations. Two foundational frameworks for data protection and security are HIPAA and ISO 27001.
The conversation shifts to social media platforms Twitter, Blue […] The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast. In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts.
Professional services are information-centric: information is the work product , the purpose, the key deliverable. Through assignments, jobs, projects or tasks, professional services clients and providers exchange, generate and utilize information. Guess whose interests they are most likely to protect!
Also, I'd like to see, somewhere in the ISO27k series , clearer advice on how to tackle the trade-off between control and utility: information that is too tightly secured loses its value, just as it does if inadequately secured. Do you agree? Comment below or email me!
ISO/IEC 27003 offers a page of 'guidance on formulating an informationsecurity risk treatment plan (6.1.3 27003 even indicates/suggests a tabular format and content of the RTP : The word 'plan' in RTP clearly implies an intention to treat identified and evaluated information [security] risks at some future point.
Canada’s federal government admitted to surveilling its population’s movements during the COVID-19 lock-down by tracking 33 million phones, the FBI warned that a hacker group has been sending malware-laden USB sticks to companies, and details on a new law in the United States which will install kill switches in new cars. ** Links mentioned on […].
With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In a moment you hear from someone who’s been publishing high quality infosec content on YouTube for the last six years and now has over half a million subscribers. Vamosi: There’s a need for more Infosec content.
With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In a moment you hear from someone who’s been publishing high quality infosec content on YouTube for the last six years and now has over half a million subscribers. Vamosi: There’s a need for more Infosec content.
The post TikTok Denies Data Breach, Los Angeles School District Ransomware Attack, Fingerprint Scanners in School Bathrooms appeared first on The Shared Security Show.
The host also explores how [] The post Understanding Privacy Changes: eBays AI Policy and The Future of Data Privacy appeared first on Shared Security Podcast. In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data.
What is Apple Mail Privacy Protection and how does it hide your IP address, so senders can’t link it to your online activity or determine your location, government authorities such as the FBI and NSA have released a list of top attack vectors used to gain initial access by attackers, and how more companies are […].
The episode also covers a significant update […] The post The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update appeared first on Shared Security Podcast. In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers.
Janet Jackson’s “Rhythm Nation” has been recognized as an exploit for a vulnerability after Microsoft reported it can crash the hard drives of certain old laptop computers, phishing attacks that compromise credentials using brand impersonation are on the rise, and details about a new privacy focused phone carrier that doesn’t track your location or (..)
The post Elon Musk Buys Twitter, Forgotten BIOS Updates, T-Shirt Outwits Facial Recognition appeared first on The Shared Security Show. Elon Musk buys Twitter for $44 billion so what does this mean for the privacy and cybersecurity of the platform? Plus, details about researchers who have created a t-shirt that […].
Particularly when we're talking about public figures in positions of influence, we need to see leadership around infosec, not acknowledgement that elected representatives are consciously exercising poor password hygiene. Traceability back to individual users == surveillance, authoritarian IMHO.
How TikTok can circumvent privacy protections and performs device tracking that gives TikTok full access to user data, the US government warns about ransomware attacks after Biden’s new sanctions against Russia, and details about the latest beta for iOS 15.4
I’m Robert Vamosi and in this episode I’m talking about online criminal investigations conducted by someone who is inside the infosec community, and how your social media posts -- no matter how good you think you are about hiding -- can reveal a lot about your true identity. Daniel, he keeps a low profile. CLEMENS: I do.
Period tracker apps are causing privacy concerns because they could potentially be used against women in states that ban abortion, new research shows that vendors are being impersonated more than employees in Business Email Compromise (BEC) attacks, and details on the first ever bug bounty program from the creators of the LockBit ransomware operation. (..)
We explore these technological advancements alongside other unusual tech innovations, touching upon security […] The post Internet Archive Hacked, Introducing The AI Toilet Camera appeared first on Shared Security Podcast. In this episode, we discuss the significant data breach at the Internet Archive, affecting 33 million users.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content