It’s not just the breach, it’s the speed of the breach response…
Browsing CategoryGDPR
S3 Ep 23.5: An interview with cybersecurity expert John Noble CBE
Special episode – listen now!
TikTok’s handling of child privacy gets another watchdog’s attention
Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones. This post appeared first on Naked Security Blog…
Should governments track your location to fight COVID-19?
Google Maps data could help governments track patients that a newly-diagnosed COVID-19 sufferer has been in contact with. This post appeared first on Naked Security Blog by Sophos Author: Danny…
Cookie-nabbing app could have served users side helping of XSS
A popular GDPR compliance WordPress plugin vendor has patched a flaw that rendered both site visitors and admins vulnerable to XSS attacks. This post appeared first on Naked Security Blog…
UN hacked via unpatched SharePoint server
UN staffers: the “entire domain” was probably compromised by an attacker who was lurking on the UN’s networks. This post appeared first on Naked Security Blog by Sophos Author: Danny…
NIST’s new privacy rules – what you need to know
How do you ensure you’re compliant with privacy regulations? NIST has released a Privacy Framework to help you get your house in order. This post appeared first on Naked Security…
Apps are sharing more of your data with ad industry than you may think
Apps like Grindr, Tinder and Happn are (over-)sharing data about sexuality, religion, and location with a shadowy network of data brokers. And it’s not just dating apps that are doing…
Microsoft may still be violating privacy rules, says Dutch regulator
EU data watchdogs are yet again sniffing at Windows 10. This post appeared first on Naked Security Blog by Sophos Author: Lisa Vaas
Facebook got humans to listen in on some Messenger voice chats
Facebook says it’s paused the practice of collecting voice clips and sending them to employees to transcribe and analyze. This post appeared first on Naked Security Blog by Sophos Author:…