article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

However, as the app collects a range of highly sensitive medical information, it is unclear with whom or which organization(s) it shares this information. MY2022 includes features that allow users to report “politically sensitive” content.

article thumbnail

The Greatest Asset Becomes the Biggest Risk

CyberSecurity Insiders

It also empowers business owners to easily see, understand and act on contextual intelligence using scoring frameworks proven to stop insider threats, prevent data loss, maximize software investments and protect the workforce, wherever they may be. Data minimization is a critical prerequisite to privacy. Managing access and perception.

Risk 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Judging Facebook's Privacy Shift

Schneier on Security

And if you read his 3,000-word post carefully, Zuckerberg says nothing about changing Facebook's surveillance capitalism business model. It even collects what it calls " shadow profiles " -- data about you even if you're not a Facebook user. Better use of Facebook data to prevent violence.

article thumbnail

Over 100 flaws in management and access control systems expose buildings to hack

Security Affairs

The extent of the flaw is wide, according to data collected by Krstic during the study, the vulnerabilities could impact up to 10 million people and 30,000 doors at 200 facilities. Krstic presented the findings of his study at SecurityWeek’s ICS Cyber Security Conference held in Singapore.

Hacking 89
article thumbnail

MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

The Last Watchdog

Law enforcement, for instance, drew criticism for using a controversial facial recognition app — Clearview AI — to surveil citizens turning out to protest the George Floyd murder. However, as the data collected by Internet of Things systems gets deeper and richer , the algorithms running AI should get smarter and more accurate.

article thumbnail

Understanding the Different Types of Audit Evidence

Centraleyes

Evidence in auditing transforms the abstract notion of security into a tangible reality that can be confidently presented to the world. Organizations typically present documentation such as risk registers, information security policy documents, access control logs, and incident response plans to provide evidence.

Risk 52
article thumbnail

Privacy predictions 2022

SecureList

Citizens, for their part, are increasingly concerned with surveillance capitalism , a lack of anonymity and dependence on online services. Here, we present some of our ideas about what key forces will shape the privacy landscape in 2022. While we hope 2022 will be the last pandemic year, we do not think the privacy trends will reverse.