Remove 2016 Remove Events Remove Privacy Remove Security Remove Video
article thumbnail

Dutch DPA Expands Guidance on Data Breaches

Hunton Privacy

The updates aim to answer questions about data breaches received by the Dutch DPA from organizations since 2016. In particular, the Dutch DPA expanded its Q&As section on the obligation to report data breaches and on how companies must react in the event of a data breach.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Now for the big challenge - security. The "s" in IoT is for Security Ok, so the joke is a stupid oldie, but a hard truth lies within it: there have been some shocking instances of security lapses in IoT devices. But there are also some quick wins, especially in the realm of "using your common sense". Let's dive into it.

IoT 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerability Recap 4/1/24: Cisco, Fortinet & Windows Server Updates

eSecurity Planet

While most issues can be fixed through prompt patching and updating, a few remain unfixed and may require more significant changes to the security stack to block possible attacks. March 22, 2024 Emergency Out-of-Band Windows Server Security Updates Type of vulnerability (or attack): Memory leak. out of 10), and calls it Shadow Ray.

Libraries 109
article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

The FTC’s complaint states: “From 2016 to the present, about 100 million unique devices sent Respondent location data each year.” (Complaint ¶ 5 (emphasis in original)) InMarket would share advertising revenue with developers that incorporated the InMarket SDK into their apps. We have twice covered the consumer class action, here and here.)

article thumbnail

Texas AG Settles Suit with Messaging App Over Children’s Data Practices

Hunton Privacy

On October 3, 2016, the Texas Attorney General announced a $30,000 settlement with mobile app developer Juxta Labs, Inc. Juxta must also develop and maintain an up-to-date and accurate privacy policy that is clear, conspicuous and understandable.

Privacy 45
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

One of those interests that took off was computer security. Some hackers live stream events. But, as amazing as all that sounds, there are tradeoffs -- in privacy, for example. Robert Vamosi: Before there was the internet as we know it today, there were bulletin boards, BBSs. MODEM SOUND]. Massive numbers.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

One of those interests that took off was computer security. Some hackers live stream events. But, as amazing as all that sounds, there are tradeoffs -- in privacy, for example. Robert Vamosi: Before there was the internet as we know it today, there were bulletin boards, BBSs. MODEM SOUND]. Massive numbers.