#information security

[ follow ]
#information-security

Java proposals would boost resistance to quantum computing attacks

Quantum computing advancements pose a serious threat to current information security, necessitating the urgent shift to quantum-resistant algorithms.

3 Simple Steps to Stop Apps From Collecting Your Data

Companies collect extensive user data, often leading to privacy concerns and exploitation.
Reading privacy policies is crucial, but they are often overly complex for average consumers.

A Hacker's Guide to Password Cracking

Vigilant password management is essential to counteract hacker strategies and strengthen organizational security.

Google CEO says the company should be a 'trusted source' in the election

Google and YouTube are focused on providing reliable information for elections, ensuring secure campaigns, and maintaining trust in their platforms.

Today's reminder of the insider threat: LG Electronics USA

A former Payroll Manager at LG Electronics violated data policies by emailing personal information to themselves, leading to an ongoing investigation and legal actions.

Security leaders discuss the Cisco security incident

Cisco's data breach underlines the critical need for strong API security, even in public-facing environments.

Java proposals would boost resistance to quantum computing attacks

Quantum computing advancements pose a serious threat to current information security, necessitating the urgent shift to quantum-resistant algorithms.

3 Simple Steps to Stop Apps From Collecting Your Data

Companies collect extensive user data, often leading to privacy concerns and exploitation.
Reading privacy policies is crucial, but they are often overly complex for average consumers.

A Hacker's Guide to Password Cracking

Vigilant password management is essential to counteract hacker strategies and strengthen organizational security.

Google CEO says the company should be a 'trusted source' in the election

Google and YouTube are focused on providing reliable information for elections, ensuring secure campaigns, and maintaining trust in their platforms.

Today's reminder of the insider threat: LG Electronics USA

A former Payroll Manager at LG Electronics violated data policies by emailing personal information to themselves, leading to an ongoing investigation and legal actions.

Security leaders discuss the Cisco security incident

Cisco's data breach underlines the critical need for strong API security, even in public-facing environments.
moreinformation-security

Ex-Twitter exec claims X fired him for raising security concerns after Musk-led takeover

Twitter's former global head of information security is accusing the company of wrongly firing him for raising concerns about budget cuts following the Elon Musk-led takeover.
The lawsuit alleges that Musk hired an advisor who cut Twitter's products and services that supported an FTC consent decree, and both Musk and the advisor were dismissive of the decree.

Nevada Dem renews push for data privacy standards

Sen. Catherine Cortez Masto reintroduced three bills aimed at adding oversight and transparency to private sector data collection.
The bills address information security standards, data collection practices, software distribution, and privacy-enhancing technologies.
Cortez Masto emphasizes the need for stronger privacy laws to protect consumers' personal information.

ICO alerted after technical 'issue' exposed college files to student barristers | Computer Weekly

The Inns of Court College of Advocacy (ICCA), a leading college for barristers, experienced a data breach that allowed students to access sensitive files on hundreds of other students.
The breach exposed personal information such as email addresses, phone numbers, exam marks, previous institutions attended, ID photos, and sensitive data like health records, visa status, and parental status.
The college is investigating the breach and has notified the Information Commissioner's Office. They have also sought written undertakings from the students who accessed the files to not share the data further.
[ Load more ]