This study by Vivek Nair, Dwan Song (both of UC Berkeley) and Gonzalo Munilla Garrido (Technical University of Munich) sheds a light on the unprecedented privacy risks of the metaverse by showing how VR can be turned against its users and provides the first holistic framework for understanding intrusive data harvesting attacks in these emerging […]
A vulnerability in crypto bridge Nomad caused during maintenance has resulted in the theft of $190 million worth of cryptocurrencies. Coindesk will let you know. Nomad is a protocol that allows users to exchange tokens between different blockchains. When a user wants to transfer cryptocurrency from one blockchain to another, the bridge puts it in […]
A stolen password gave criminals access to 140,000 payment terminals used worldwide to process credit card payments. The payment terminals are from the company Wiseasy and are used by restaurants, hotels, shops and schools, especially in Asia. Through the Wisecloud cloud service, customers’ devices can be managed, configured and updated remotely by Wiseasy. The passwords […]
European privacy regulators are very concerned about plans by the European Commission to oblige chat services and other tech companies to scan all messages and other content from users for child abuse and speak of a serious risk to the fundamental rights of 450 million Europeans. The proposal imposes obligations on providers, hosting services, communication […]
A firehose of sensitive data from your vehicle is flowing to a group of companies you’ve probably never heard of. The Markup identified 37 companies that are part of the connected vehicle data industry. These companies seek to monetize vehicle data in an environment with few regulations governing its sale or use.
Research drives for a driver assistance system to avoid traffic accidents are expensive for Volkswagen will cost 1.1 million Euros because the group and a service provider used in the VW test vehicle did not take data protection very seriously and used surveillance cameras without the necessary identification.
Sixty percent of breaches have resulted in companies recouping the cost of fines, clean-up, and technological improvements by increasing prices, essentially making consumers pay for breaches and companies’ lack of preparedness, according to the “Cost of Data Breach Report 2022”.
Hackers are constantly monitoring software vendor bulletin boards for new vulnerability announcements they can leverage for initial access to a corporate network or to perform remote code execution. So how do you manage your vulnerabilities on a periodic basis?
Telecom provider T-Mobile has reached a settlement in the United States with the victims of a major data breach that occurred last year in which the personal data of 79 million current and former American customers was stolen. This included names, dates of birth, social security number and driver’s license information, as well as telephone […]
Amazon plans to buy the primary care organization One Medical in a nearly $4 billion deal, adding to the growing list of the tech giant’s acquisitions. Amazon expands its reach in the health care industry. Wholefoods $13 Billion and the online pharmacy company PillPack for $753 million in 2018. What could be achieved through integration […]