Alibaba Facial Recognition Tech Picks Out Uyghur Minorities

Alibaba Facial Recognition Tech Picks Out Uyghur Minorities

Chinese multinational technology company Alibaba Group Holding Ltd is offering Uyghur/ethnic minority recognition as a cloud service, according to a new report by surveillance industry researcher IPVM and The New York Times. Users simply send photographs of people taken on their phones or pulled from surveillance videos to Alibaba’s facial recognition service, then receive an alert if the subject is identified as a minority Uyghur from the western province of Xinjiang. The Cloud Shield system offered by Alibaba Cloud “detects and recognizes text, pictures, videos, and…

Read More

5G standalone networks may have more vulnerabilities than you think

5G standalone networks may have more vulnerabilities than you think

Security research firm examines configuration of core components to spot weaknesses in PFCP and HTTP/2 protocols. Global cybersecurity company Positive Technologies identified several potential vulnerabilities in 5G standalone networks that could result in denial of service for customers and trouble for network operators.   In the new report, “5G Standalone core security research,” researchers analyzed the security of the network architecture, interaction of network elements, and subscriber authentication and registration procedures. The report considered these…

Read More

A remote holiday season: Top tips to boost security as cyber hygiene diminishes

A remote holiday season: Top tips to boost security as cyber hygiene diminishes

A remote holiday season: Top tips to boost security as cyber hygiene diminishes | 2020-12-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Key questions to ask to effectively recover from a cyberattack

Key questions to ask to effectively recover from a cyberattack

Cyberattack recovery frameworks are a necessary part of cybersecurity. Learn how to develop a recovery plan that meets your company’s needs. Image: iStockphoto/Andriy Onufriyenko The cliche, “It’s not a matter of if, but when” is wearing thin when it comes to cybersecurity; however, no matter how weary the cliche, it can serve as a reminder to prepare for a cyberattack. During an attack, cybercriminals are counting on the fact that no one is thinking clearly,…

Read More

The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year – Cyber Defense Magazine

The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year – Cyber Defense Magazine

By Andy Harcup, VOP, Absolute Software The annual CPS report, analyzed by Griffin Law, a UK litigation practice, revealed that 59 incidents were so severe that they were reported to the Information Commissioner’s Office (ICO) and potentially affected up to 1,346 people. The CPS is hardly the first agency to struggle with device and data security, but the lack of urgency shown by the government over these persistent threats to the UK’s national cyber security is troubling….

Read More

Will the US Move to a Federal Privacy Law in 2021?

Will the US Move to a Federal Privacy Law in 2021?

Data privacy trends in the US in light of this year’s election and other recent events were discussed by a panel during the FTI Consulting webinar The New Privacy Landscape: California’s New Law and Prospects for Federal Action. The significance of the California Privacy Rights Act (CPRA), passed last month to expand the existing California Consumer Privacy Act (CCPA) was firstly highlighted by the panel. Dominique Shelton Leipzig, firmwide co-chair of Perkins Coie’s Ad Tech…

Read More

Cloud exit planning – building a future‐proofed, multi-cloud strategy (part one of two) – VMware Cloud Community

Cloud exit planning – building a future‐proofed, multi-cloud strategy (part one of two) – VMware Cloud Community

Multi-cloud is now clearly emerging as a strategic driver for many organizations as they seek to innovate and build a competitive edge. However, this shift brings with it challenges, many of which I discussed in a prior blog series.  With organizations seeing increased complexity, projects falling short of targets, and growing cloud consumption bills; these challenges, if not addressed, can drive negative impacts that offset the business value gained from leveraging the public cloud. But…

Read More

Decade-Long Data Silo Designed to Address Google-Fitbit Privacy Concerns

Decade-Long Data Silo Designed to Address Google-Fitbit Privacy Concerns

The European Commission finally approved Google’s acquisition of Fitbit yesterday, adding some conditions intended to protect user privacy and competition, although campaigners are disappointed in the decision. The Commission has been mulling the $2.1bn acquisition of the fitness monitoring giant for several months, as distrust over Google’s handling of data and alleged anti-competitive practices is high in the region. In February, the advisory European Data Protection Board raised concerns about the possibility of the tech…

Read More

People’s Energy customers have been contacted following the incident

People’s Energy customers have been contacted following the incident

UK energy supplier People’s Energy has suffered a data breach affecting its entire database, including information on previous customers. Co-founder of the company, Karin Sode, told BBC News that sensitive personal information of its customers, including names, addresses, dates of birth, phone numbers, tariff and energy meter IDs had been stolen by hackers. Following discovery of the breach on Wednesday morning, it has contacted all its 270,000 current customers to inform them of the breach….

Read More
1 2,464 2,465 2,466 2,467 2,468 2,541