Remove Consumer Protection Remove Internet Remove Passwords Remove Technology
article thumbnail

Advice for manufacturers on the coming PSTI regulation

Pen Test Partners

Security requirements unpacked The regulations lay down explicit security mandates, from unique product passwords to transparent reporting mechanisms for security issues, alongside clear directives on security update commitments. Each product must either have a unique password or allow the user to set a secure password upon initial setup.

article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

You may not have noticed, but there has been a flurry of breakthroughs in biometric technology, led by some leapfrog advances in facial recognition systems over the past couple of years. The ultimate concern with this technology is that we’ll end up in a surveillance society where your I.D. Ubiquitous surveillance. Advanced use cases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.

Mobile 320
article thumbnail

New IoT Security Regulations

Schneier on Security

Due to ever-evolving technological advances, manufacturers are connecting consumer goods­ -- from toys to lightbulbs to major appliances­ -- to the internet at breakneck speeds. This is the Internet of Things, and it's a security nightmare. It falls upon lawmakers to create laws that protect consumers.

IoT 227
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., For example: passwords being typed or posted, specific motions or commands used to activate control systems to open or unlock doors, etc.”. Pictured: a Dome Series security camera from Verkada.

article thumbnail

California Passes First Of Its Kind IoT Cybersecurity Law

Privacy and Cybersecurity Law

California recently became the first state in the union to pass a cybersecurity law addressing “smart” devices and Internet of Things (IoT) technology. The term IoT generally refers to anything connected to the internet, including smart home devices (e.g., Amazon’s Alexa, NEST thermostats, etc.).

IoT 45
article thumbnail

California Passes First Of Its Kind IoT Cybersecurity Law

Privacy and Cybersecurity Law

California recently became the first state in the union to pass a cybersecurity law addressing “smart” devices and Internet of Things (IoT) technology. The term IoT generally refers to anything connected to the internet, including smart home devices (e.g., Amazon’s Alexa, NEST thermostats, etc.).

IoT 45