Remove Consumer Protection Remove CSO Remove Passwords
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

For example: passwords being typed or posted, specific motions or commands used to activate control systems to open or unlock doors, etc.”. At the very least, there should have been some form of multi-factor authentication or password vault to protect the [server] account. Look at the Mac operating system.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Cyber threats often exploit human errors, whether through phishing attacks, weak passwords, or lapses in protocol. States like New Jersey, Tennessee, and Minnesota are developing comprehensive data privacy laws that emphasise data transparency, risk assessments, and consumer protection.