Adsense HTML

Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Sharing User IDs

Can you give your User ID to someone else to use your account?  And what if that someone then uses your account for a purpose not allowed by the user agreement?  Are you responsible?  This is the subject of a possible lawsuit against CoreLogic in Australia.

See BCI Media Group Pty Ltd v Corelogic Australia Pty Ltd [2020] FCA 1556 https://www.judgments.fedcourt.gov.au/judgments/Judgments/fca/single/2020/2020fca1556


Is your mobile safe from the police?

How Police Can Crack Locked Phones—and Extract Information

A report finds 50,000 cases where law enforcement agencies turned to outside firms to bypass the encryption on a mobile device.

Read in WIRED: https://apple.news/Av8HKmpc-SIyx8vccKTIF2w

UK Financial Regulator Publishes Insights from the Cyber Coordination Groups

A UK financial regulator has published a report regarding cybersecurity risks.

"CCG members also noted the development of cloud security as an emerging risk area, and that data held in cloud environments should be encrypted and protected by appropriate intrusion detection/prevention controls. In some cases, it may be advisable to include “kill switch” technology, which allows for immediate disconnection to manage the risk of a cyber attack having a more widespread impact."

See
https://www.ropesgray.com/en/newsroom/alerts/2020/03/UK-Financial-Conduct-Authority-Publishes-Insights-from-the-Cyber-Coordination-Groups

Digital Watermarks on Printed Documents

"The question is how the government identified her so quickly, and the answer may be that she was inadvertently outed by the Intercept itself. That’s because the website posted an image of the leaked document containing an almost-invisible code applied by the printer that produced the document sent to the Intercept. The digital watermark identified the printer model and serial number, along with the time and date then document was printed out."

See LA Times

Apple v The Government

If you are following the Apple v US Government legal process over the FBI request to brute force break of the passcode on Syed Farook’s work phone, the link below has a good summary and also a link to the 65 page motion.

Privacy

The Australian Privacy Commissioner has released a revised guide to "reasonable steps" to protect personal information.

Comments due 27 August.

"Effective ICT security requires protecting both computer hardware (the physical devices that make up a computer system) as well as the data (including personal information) that the computer hardware holds from misuse, interference, loss, unauthorised access, modification and disclosure. However, ICT security measures should also ensure that the hardware and the information stored on it remain accessible and useful to legitimate users."


However, absolute security is not only impossible but undesirable.  See for example, here and here

Hacktivist raided

Swiss Hacktivist was raided at the request of U.S. authorities for data theft and then publishing what was hacked. https://amp.9news.com.au/...