article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. This was before David Miranda, Greenwald’s partner, was detained at Heathrow airport by the UK authorities; but even without that, I knew there was a risk. Very probably. Definitely.

article thumbnail

Information risk and security for professional services

Notice Bored

When you acquire or provide professional services, how do you address the associated information risks? In theory, clients and providers should proactively identify, evaluate and address information risks relating to or arising from professional services in order to avoid, reduce or limit the damage arising from such incidents.

Risk 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ring curtails law enforcement’s access to footage

Malwarebytes

US law enforcement will no longer be able to request footage through the Neighbors app produced by Ring video doorbells and surveillance cameras. The Electronic Frontier Foundation (EFF) considers this a victory in a long fight. Privacy risks should never spread beyond a headline. For example.

article thumbnail

Accountant ordered to pay ex-employer after bossware shows "time theft"

Malwarebytes

The case of Karlee Besse, an accountant in British Colombia, was recently dismissed by the Civil Resolution Tribunal (CRT) in Canada, with a judge ordering her to pay back her former employer, Reach CPA, for "engaging in time theft"—a revelation that wouldn't have been possible if not for software Reach installed on her computer.

article thumbnail

150,000 Verkada security cameras hacked—to make a point

Malwarebytes

Hackers were able to gain access to camera feeds from Verkada, a tech company that specializes in video security and physical access control, to demonstrate how prevalent surveillance is, reports say. It is also a metaphor used to illustrate surveillance technology. If you are a Verkada customer, no action is required on your part.

Hacking 87
article thumbnail

Aussie Parliament Just Leveled Up Police Hacking Powers

SecureWorld News

Australian Parliament passed the controversial Surveillance Legislation Amendment Bill 2020, also known as the Identify and Disrupt Bill and to a few the “hacking” bill, on August 25. This includes being able to access computer networks covertly to search for criminal evidence. At the same time the Apple privacy debates are ongoing.

Hacking 86
article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

. “The ferocity of cyber criminals to take advantage of COVID-19 uncertainties by preying on small businesses is disturbing,” said Andrew LaMarca , who leads the global high-risk and fraud team at Dun & Bradstreet. For the past several months, Milwaukee, Wisc. ” RECYCLING VICTIMS. .