The U.S. Department of Health and Human Services (HHS) Cybersecurity Program Office of Information Security warned healthcare facilities on Thursday about vulnerabilities to insider threats. HHS cited a 2020 study from Ponomon, which found that 61% of data breaches involving an insider are primarily unintentional, caused by negligent insiders. Nearly 14% of breaches, however, are […]
Voice command features on virtual reality (VR) headsets pose vulnerabilities and could lead to major privacy eavesdropping attacks, according to researchers at Rutgers University-New Brunswick. The research shows hackers could use popular AR/VR headsets with built in motion sensors to record subtle, speech-associated facial dynamics to steal sensitive information communicated via voice-command, including credit card […]
Research by ManagedMethods, a Google workspace and Microsoft 365 cybersecurity, student safety, and compliance platform for education, has found gaps in the cyber security strategies of district administrators when protecting their cloud collaboration and storage applications. The report reveals 30% of district administrators with at least a medium level of influence on technology decisions do […]
Microsoft has launched Privacy Management for Microsoft 365, a new tool designed to enable customers to protect their personal data and build a privacy-resilient workplace. In multiple blogs, the company cited the fluidity of hybrid work and the merging of work and personal activities, which is leading to more personal data being generated, creating additional […]
A US District Court Judge rules that a lawsuit involving Google Chrome’s Incognito Mode may proceed. The suit claims that the Chrome feature should stop Google’s web tracking, and that failure to do so violates wiretap laws. More from a recent Ars Technica report: Google attempted to get the lawsuit thrown out on the basis […]
With the myriad of data scandals plaguing our news feeds over the past few years, a tech insider wants to take a stab at privacy legislation.
It seems like every day in the news you read about another data breach. According to a study published by IBM, an organization has a 27% chance of suffering a breach of at least 1,000 records. There have been so many data breaches in the past several years that now it seems commonplace. “According to […]
Any business or infrastructure that needs to operate 24/7 — with no downtime — requires a critical infrastructure. Many think of control rooms and command centers, specifically in areas such as emergency response, banking, transportation, and the like. However, at this point, most every company has some kind of critical infrastructure needs, large or small. If […]
Facial recognition is the hot new development in big tech, but companies are taking privacy shortcuts to get an edge.
Since one DNA testing company recently granted the government access to its users’ DNA data, issues of privacy are coming to the forefront.