With the widespread adoption of the GDPR (General Data Protection Regulation) throughout Europe, international organizations that offer goods and services to, or monitor the behavior of, EU residents must ensure they abide by its privacy and data control requirements. Otherwise, …
The FBI and the Justice Department have announced a multinational operation that has dismantled the infrastructure of the Qakbot botnet and resulted in the seizure of more than $8.6 million in cryptocurrency. Operation ‘Duck Hunt’ took place in the U.S. …
When Russia’s Cl0p gang hacked Progress Software’s MOVEit Transfer app via a zero-day SQL injection vulnerability on May 27, it soon became apparent that the number of organizations and individuals affected would be high. The first known victim was the …
A data breach at Tesla, which affected 75,735 people and saw sensitive company data compromised, was caused by two former employees, the electric car maker said. In a data breach notice filed with Maine’s attorney general, Tesla’s data privacy officer, …
The cybersecurity sector is one of the most attractive job markets worldwide, with professionals earning a sizeable average salary in a range of positions. It also offers plenty of room for growth, while many consider it to be rewarding work …
The FBI is investigating a ransomware attack that shut down emergency rooms and other healthcare facilities across the U.S. Prospect Medical Holdings, which operates healthcare facilities in Texas, Connecticut, Rhode Island, and Pennsylvania, began reporting disruption last week. In Connecticut, …
Cookies have remained a point of controversy for several years, with people questioning whether collecting this data is ethical from a privacy point of view. Multiple regulations have been adopted to limit their use, and some experts believe that cookies …
Many people in the data privacy community will tell you that the GDPR (General Data Protection Regulation) is the gold standard of privacy law and that new U.S. state privacy laws fall short. This prejudice is not entirely correct, but …
The U.S. government has created a new system to help consumers understand the cybersecurity risks associated with smart devices. Countless goods now come with Internet-enabled technology that allows users to customize their experience and enjoy greater functionality. Devices such as …
Cyber criminals linked to the Chinese government have exploited a software flaw to steal emails from several U.S. government employees. The breach stemmed from a vulnerability in Microsoft’s web-based Cloud systems, which the threat actors used to compromise two dozen …