Remove 2012 Remove Information Security Remove Surveillance Remove Technology
article thumbnail

US pharmacy Rite Aid banned from operating facial recognition systems

Malwarebytes

The regulator found so many flaws in the retailer’s surveillance program that it concluded Rite Aid had failed to implement reasonable procedures and prevent harm to consumers in its use of facial recognition technology in hundreds of stores. It failed to monitor or test the accuracy of the technology after deployment.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Those of us in the information security community had long assumed that the NSA was doing things like this. Many have written about how being under constant surveillance changes a person.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT32 state hackers target human rights defenders with spyware

Security Affairs

. “Amnesty Tech’s Security Lab found technical evidence in phishing emails sent to two prominent Vietnamese human rights defenders, one of whom lives in Germany, and a Vietnamese NGO based in the Philippines, showing that Ocean Lotus is responsible for the attacks between 2018 and November 2020.”

Spyware 92
article thumbnail

CISSPs from Around the Globe: An Interview with James Wright

CyberSecurity Insiders

The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. Those doors lead to many different types of positions and opportunities, thus making the information security community dynamic and multifaceted.

article thumbnail

Law enforcement agencies can extract data from thousands of cars’ infotainment systems

Security Affairs

Modern vehicles come with sophisticated infotainment systems that are connected online and that could represent an entry point for attackers, as demonstrated by many security experts over the years. Law enforcement and intelligence worldwide are buying technologies that exploit weaknesses in vehicle systems. ” Forbes reports.