Showing only posts tagged Data protection. Show all posts.

Twitter admits to ‘security incident’ involving Circles tweets

Source

Feature allows users to set a list of friends and post tweets that only they are supposed to be able to read A privacy breach at Twitter published tweets that were never supposed to be seen by anyone but the poster’s closest friends to the site at large …

Delivering on the AWS Digital Sovereignty Pledge: Control without compromise

Source

At AWS, earning and maintaining customer trust is the foundation of our business. We understand that protecting customer data is key to achieving this. We also know that trust must continue to be earned through transparency and assurances. In November 2022, we announced the new AWS Digital Sovereignty Pledge …

A sneak peek at the data protection sessions for re:Inforce 2023

Source

A full conference pass is $1,099. Register today with the code secure150off to receive a limited time $150 discount, while supplies last. AWS re:Inforce is fast approaching, and this post can help you plan your agenda. AWS re:Inforce is a security learning conference where you can …

AWS Security Profile – Cryptography Edition: Panos Kampanakis, Principal Security Engineer

Source

In the AWS Security Profile — Cryptography Edition series, we interview Amazon Web Services (AWS) thought leaders who help keep our customers safe and secure. This interview features Panos Kampanakis, Principal Security Engineer, AWS Cryptography. Panos shares thoughts on data protection, cloud security, post-quantum cryptography, and more. What do you …

New Global AWS Data Processing Addendum

Source

Navigating data protection laws around the world is no simple task. Today, I’m pleased to announce that AWS is expanding the scope of the AWS Data Processing Addendum (Global AWS DPA) so that it applies globally whenever customers use AWS services to process personal data, regardless of which …

AI can fool voice recognition used to verify identity by Centrelink and Australian tax office

Source

Exclusive: Voiceprint program used by millions of Australians to access data held by government agencies shown to have a serious security flaw Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast A voice identification system …

Establishing a data perimeter on AWS: Allow only trusted resources from my organization

Source

Companies that store and process data on Amazon Web Services (AWS) want to prevent transfers of that data to or from locations outside of their company’s control. This is to support security strategies, such as data loss prevention, or to comply with the terms and conditions set forth …

Rishi Sunak faces calls to ban TikTok use by government officials

Source

PM under pressure to follow EU and US in taking step over fears Chinese-owned app poses cybersecurity risk Rishi Sunak has been urged to ban government officials from using TikTok in line with moves by the EU and US, amid growing cybersecurity fears over China. Officials in Europe and …

Australia to consider European-style right to be forgotten privacy laws

Source

Attorney general promises ‘whole range’ of modernisations of the Privacy Act to follow new customer data protection laws Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast The right to be forgotten and a right …

Three key security themes from AWS re:Invent 2022

Source

AWS re:Invent returned to Las Vegas, Nevada, November 28 to December 2, 2022. After a virtual event in 2020 and a hybrid 2021 edition, spirits were high as over 51,000 in-person attendees returned to network and learn about the latest AWS innovations. Now in its 11th year …

How to secure your SaaS tenant data in DynamoDB with ABAC and client-side encryption

Source

If you’re a SaaS vendor, you may need to store and process personal and sensitive data for large numbers of customers across different geographies. When processing sensitive data at scale, you have an increased responsibility to secure this data end-to-end. Client-side encryption of data, such as your customers …

I am a Medibank customer. Am I affected by the cyber-attack? What can I do to protect myself?

Source

Experts suggest using multifactor authentication and telling your bank to put extra security checks in place Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast Millions of Medibank’s current and former customers have had …

AWS Digital Sovereignty Pledge: Control without compromise

Source

French | German | Italian | Japanese | Korean We’ve always believed that for the cloud to realize its full potential it would be essential that customers have control over their data. Giving customers this sovereignty has been a priority for AWS since the very beginning when we were the only major …

Establishing a data perimeter on AWS: Allow only trusted identities to access company data

Source

As described in an earlier blog post, Establishing a data perimeter on AWS, Amazon Web Services (AWS) offers a set of capabilities you can use to implement a data perimeter to help prevent unintended access. One type of unintended access that companies want to prevent is access to corporate …

Facebook sued for collecting personal data to target adverts

Source

In high court case that could set precedent for millions, Tanya O’Carroll alleges owner Meta is breaking UK data laws A human rights campaigner is suing Facebook’s owner in the high court, claiming the company is disregarding her right to object against the collection of her personal …

I am a Medibank customer. Am I affected by the cyber-attack? What can I do to protect myself?

Source

Experts suggest using multifactor authentication and telling your bank to put extra security checks in place Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast Millions of Medibank’s current and former customers have had …

The Conviction of Uber’s Chief Security Officer

Source

I have been meaning to write about Joe Sullivan, Uber’s former Chief Security Officer. He was convicted of crimes related to covering up a cyberattack against Uber. It’s a complicated case, and I’m not convinced that he deserved a guilty ruling or that it’s a …

Can a new form of cryptography solve the internet’s privacy problem?

Source

Techniques which allow the sharing of data whilst keeping it secure may revolutionise fields from healthcare to law enforcement Rachel is a student at a US university who was sexually assaulted on campus. She decided against reporting it ( fewer than 10% of survivors do). What she did, however, was …

I am a Medibank customer. Am I affected by the cyber-attack? What can I do to protect myself?

Source

Experts suggest using multifactor authentication and telling your bank to put extra security checks in place Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast Millions of Medibank’s current and former customers have had …

Outsourcer Interserve fined £4.4m for failing to stop cyber-attack

Source

Watchdog says phishing email enabled hackers to steal personal information of 113,000 employees Britain’s data watchdog has fined the construction group Interserve £4.4m after a cyber-attack that enabled hackers to steal the personal and financial information of up to 113,000 employees. The attack occurred when …

Attorney general says FBI is working on Optus data breach – video

Source

Attorney general Mark Dreyfus says the FBI is working with local authorities to investigate the Optus data breach. 'The government, as well as the Australian federal police and other government agencies, are working closely together on the Optus data breach,' he said. 'The Australian federal police is taking this …

Leaking Passwords through the Spellchecker

Source

Sometimes browser spellcheckers leak passwords : When using major web browsers like Chrome and Edge, your form data is transmitted to Google and Microsoft, respectively, should enhanced spellcheck features be enabled. Depending on the website you visit, the form data may itself include PII­—including but not limited to Social …

AWS launches AWS Wickr ATAK Plugin

Source

AWS is excited to announce the launch of the AWS Wickr ATAK Plugin, which makes it easier for ATAK users to maintain secure communications. The Android Team Awareness Kit (ATAK)—also known as Android Tactical Assault Kit for military use—is a smartphone geospatial infrastructure and situational awareness application …

Fears for patient data after ransomware attack on NHS software supplier

Source

Attack being investigated for potential data theft as experts warn criminals could use stolen details as leverage A ransomware attack on an NHS software supplier last week is being investigated for potential theft of patient data, as experts warned that criminals could use personal information as leverage in negotiations …

Hacker claims to have obtained data on 1 billion Chinese citizens

Source

Personal information allegedly taken from Shanghai police database would be one of biggest data breaches in history A hacker has claimed to have stolen the personal information of 1 billion Chinese citizens from a Shanghai police database, in what would amount to one of the biggest data breaches in …

« newer articles | page 2 | older articles »