Remove 2010 Remove Analysis Remove Data Remove Government Remove Security
article thumbnail

Malaysia introduces watershed amendments to Personal Data Protection Act 2010

Data Protection Report

On 16 July 2024, the Malaysian Dewan Rakyat (House of Representatives of the Malaysian Parliament) passed the Personal Data Protection (Amendment) Bill 2024 (the PDP Bill ). Direct obligations for data processors : Data processors will be directly subject to obligations under the Malaysian PDPA, in particular security obligations.

article thumbnail

How China Uses Stolen US Personnel Data

Schneier on Security

Interesting analysis of China’s efforts to identify US spies: By about 2010, two former CIA officials recalled, the Chinese security services had instituted a sophisticated travel intelligence program, developing databases that tracked flights and passenger lists for espionage purposes. intelligence agencies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Blockchain Tracing: The U.S. Government’s Newest Tool to Combat Foreign Crime

Data Matters

2010) (citation omitted). Blockchain analysis will be the prosecutor’s tool of choice in cyber investigations. And, as Sidley wrote last September , blockchain analysis is the law enforcement tool that will unleash cyber sanctions. Government’s Newest Tool to Combat Foreign Crime appeared first on Data Matters Privacy Blog.

article thumbnail

Law enforcement and Microsoft join forces to dismantle botnet using LED Light Control Console

Security Affairs

Cybercriminals have abused LED light control console to launch malicious attacks, Microsoft’s security experts warn. Upon refining the analysis, experts discovered that one particular IP was associated with dozens of malicious activities such as malware and ransomware distribution, phishing and DDoS attacks. Pierluigi Paganini.

IoT 77
article thumbnail

Former NSA TAO hacker sentenced to 66 months in prison over Kaspersky Leak

Security Affairs

Former NSA TAO hacker was sentenced to 66 months in prison because he leaked top-secret online documents related to the US government ban on Kaspersky. The tools were detected by the Kaspersky Lab software installed on the NSA hacker’s personal computer and were sent back to Kaspersky’s server for further analysis. Equestre.*”.

Archiving 100
article thumbnail

The Cathay Pacific Breach: Is Data Protection and Cyber Security Law in Hong Kong About to Receive an Upgrade?

HL Chronicle of Data Protection

On 6 June, 2019, the Privacy Commissioner for Personal Data (the “ PCPD “) issued an enforcement notice against Cathay Pacific Airways (and its affiliate Hong Kong Dragon Airlines) (together, “ Cathay Pacific “) in respect of a data breach concerning unauthorized access to the personal data of some 9.4

article thumbnail

Chinese LuckyMouse APT has been using a digitally signed network filtering driver in recent attacks

Security Affairs

Security experts observed the LuckyMouse APT group using a digitally signed 32- and 64-bit network filtering driver NDISProxy in recent attacks. The APT group has been active since at least 2010, the crew targeted U.S. The hackers attempted to inject malicious JavaScript code into the government websites connected to the data center.