A vulnerability in crypto bridge Nomad caused during maintenance has resulted in the theft of $190 million worth of cryptocurrencies. Coindesk will let you know. Nomad is a protocol that allows users to exchange tokens between different blockchains. When a user wants to transfer cryptocurrency from one blockchain to another, the bridge puts it in […]
A stolen password gave criminals access to 140,000 payment terminals used worldwide to process credit card payments. The payment terminals are from the company Wiseasy and are used by restaurants, hotels, shops and schools, especially in Asia. Through the Wisecloud cloud service, customers’ devices can be managed, configured and updated remotely by Wiseasy. The passwords […]
European privacy regulators are very concerned about plans by the European Commission to oblige chat services and other tech companies to scan all messages and other content from users for child abuse and speak of a serious risk to the fundamental rights of 450 million Europeans. The proposal imposes obligations on providers, hosting services, communication […]
A firehose of sensitive data from your vehicle is flowing to a group of companies you’ve probably never heard of. The Markup identified 37 companies that are part of the connected vehicle data industry. These companies seek to monetize vehicle data in an environment with few regulations governing its sale or use.
Research drives for a driver assistance system to avoid traffic accidents are expensive for Volkswagen will cost 1.1 million Euros because the group and a service provider used in the VW test vehicle did not take data protection very seriously and used surveillance cameras without the necessary identification.
Sixty percent of breaches have resulted in companies recouping the cost of fines, clean-up, and technological improvements by increasing prices, essentially making consumers pay for breaches and companies’ lack of preparedness, according to the “Cost of Data Breach Report 2022”.
Hackers are constantly monitoring software vendor bulletin boards for new vulnerability announcements they can leverage for initial access to a corporate network or to perform remote code execution. So how do you manage your vulnerabilities on a periodic basis?
Telecom provider T-Mobile has reached a settlement in the United States with the victims of a major data breach that occurred last year in which the personal data of 79 million current and former American customers was stolen. This included names, dates of birth, social security number and driver’s license information, as well as telephone […]
Amazon plans to buy the primary care organization One Medical in a nearly $4 billion deal, adding to the growing list of the tech giant’s acquisitions. Amazon expands its reach in the health care industry. Wholefoods $13 Billion and the online pharmacy company PillPack for $753 million in 2018. What could be achieved through integration […]
The use of the metaverse can be very intrusive as the set of data processed in this environment increases exponentially. Any virtual environment is by design fully data-enabled and allows for a broader spectrum of information related to human activities to be processed. In particular, it may involve new categories of data with greater granularity and precision. For […]