article thumbnail

Explained: Privacy washing

Malwarebytes

A small but telling example was a recent court case where a judge ruled that car manufacturers collecting users’ text messages and call logs did not meet the Washington Privacy Act’s (WPA) standard that a plaintiff must prove that “his or her business, his or her person, or his or her reputation” has been threatened.

article thumbnail

Managing Digital Security as Risk and Complexity Rise

Thales Cloud Protection & Licensing

Since the report was released, “A security breach in India has left a billion people at risk of identity theft,” 2 Under Armour was breached affecting 150 million user accounts, Orbitz discovered a data breach potentially affecting 880,000 customers 3 , and “the U.S. Encryption of data at rest and in motion.

Risk 48
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

granting them access to live and archived video feeds across multiple organizations, including manufacturing facilities, hospitals, schools, police departments and prisons. That type of information can be extremely valuable for things like identity theft.”. Costlow agreed, adding, “Deepfakes are becoming increasingly common.