Auto Added by WPeMatico

Lawsuit Claims Google Collects Minors’ Locations, Browsing History

A new lawsuit alleges that Google’s G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.

By |2020-02-21T16:17:20-05:00February 21st, 2020|chrome sync function, Chromebook, COPPA, FERPA, G Suite, g suite for education, google, google data privacy, google education, Mobile Security, privacy|Comments Off on Lawsuit Claims Google Collects Minors’ Locations, Browsing History

RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes

From data privacy to industrial IoT cybersecurity concerns, Threatpost editors discuss the top stories they expect to see at this year's RSA Conference, which kicks off next week in San Francisco.

By |2020-02-21T12:38:20-05:00February 21st, 2020|ai, Bruce Schneier, Cybersecurity, Industrial IoT, Katie Moussouris, Machine Learning, Patrick Wardle, Podcasts, privacy, RSA, rsa 2020, RSA Conference, RSAC|Comments Off on RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes

Hamas Ensnares Israeli Soldiers with Pretty ‘Ladies’

The third catfish attempt in three years from the Palestinian militant group adds a few technical advances to the mix.

By |2020-02-19T10:52:58-05:00February 19th, 2020|catfish, Facebook, fake chat app, fake profiles, Government, hamas, Israeli Defense Force, israeli soldiers, Malware, military service, mobile malware, Mobile Security, privacy, social media, Spyware, telegram, twitter|Comments Off on Hamas Ensnares Israeli Soldiers with Pretty ‘Ladies’

Sensitive plastic surgery photos exposed online

Other leaked records include videos, facial and body scans, as well as a range of patients' personal data The post Sensitive plastic surgery photos exposed online appeared first on WeLiveSecurity

By |2020-02-18T12:30:27-05:00February 18th, 2020|privacy|Comments Off on Sensitive plastic surgery photos exposed online

Huawei Controversy Highlights 5G Security Implications

Security experts say that 5G supply chain concerns should be taken seriously – whether it’s in the context of Huawei or not.

By |2020-02-14T15:56:42-05:00February 14th, 2020|5G, access, Backdoors, China, Cybersecurity, equipment supplier, espionage, Government, Huawei, lawful intercept, Mobile Security, privacy, security risk, u.s. ban, Vulnerabilities|Comments Off on Huawei Controversy Highlights 5G Security Implications

Privacy Experts Skeptical of Proposed Data Protection Agency

A new Data Protection Agency would overhaul federal regulation efforts around data privacy - but experts are skeptical that the U.S. government can get it right.

By |2020-02-13T11:53:48-05:00February 13th, 2020|data abuse, data misuse, Data Privacy, data privacy regulation, Data Protection Agency, DCC, DOJ, Facebook, FTC, Government, privacy, privacy legislation, tech regulation|Comments Off on Privacy Experts Skeptical of Proposed Data Protection Agency

Wacom Tablet Data Exfiltration Raises Security Concerns

Wacom stated that its data collection is done only in aggregate -- but that doesn't fix the issues, according to security experts.

By |2020-02-07T17:25:47-05:00February 7th, 2020|applications opened, data collection, drawing tablet, drivers, Google Analytics, Hacks, privacy, privacy policy, robert heaton, security concerns, statement, wacom, Web Security|Comments Off on Wacom Tablet Data Exfiltration Raises Security Concerns

HorseDeal Riding on The Curveball!

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could…

By |2020-02-05T01:17:49-05:00February 5th, 2020|Antivirus, Certificate, critical vulnerability, CVE-2020-0601, Cyber safety, Encryption, HorseDeal, Malware, Microsoft Windows, privacy, ransomware, RSA, Security, Spoofing, SSL certificate, tips, vulnerability|Comments Off on HorseDeal Riding on The Curveball!