A ransomware gang has leaked internal Tata Technologies data, a month after the company confirmed a ransomware attack. © 2024 TechCrunch. All rights reserved. For personal use only. ...
Read Full Article »Articles Tagged: data protection
Showing 10 of 22 articles tagged with "data protection"
Hacked health firm HCRG demanded journalist ‘take down’ data breach reporting, citing UK court order
DataBreaches.net declined to comply, citing a lack of jurisdiction. © 2024 TechCrunch. All rights reserved. For personal use only. ...
Read Full Article »Apple appeals UK’s secret demand for backdoor access to encrypted user data
Apple appeal to Investigatory Powers Tribunal may be the first case of its type. ...
Read Full Article »Rubrik rotates authentication keys after log server breach
Discussion Points
- This content provides valuable insights about AI.
- The information provides valuable insights for those interested in AI.
- Understanding AI requires attention to the details presented in this content.
Summary
Of Breach at Rubrik The recent breach of a server hosting log files at Rubrik has raised serious concerns about the company's data security. This incident may have exposed sensitive information, including potentially leaked authentication keys.As a result, the company has taken swift action to mitigate any potential damage.
Rotating compromised authentication keys is an essential step in minimizing the risk of unauthorized access to sensitive systems.r The breach highlights the importance of robust cybersecurity measures in protecting against such incidents. It also underscores the need for companies to be transparent about any security-related issues that may affect their services.In response to this incident, Rubrik has likely taken extensive steps to ensure the integrity of its systems and protect customer data.
While the full extent of the breach remains unknown, it is essential for customers to remain vigilant and monitor their accounts closely.
Rubrik disclosed last month that one of its servers hosting log files was breached, causing the company to rotate potentially leaked authentication keys. [...]...
Read Full Article »UK watchdog probes TikTok and Reddit over child privacy concerns
Discussion Points
- This content provides valuable insights about AI.
- The information provides valuable insights for those interested in AI.
- Understanding AI requires attention to the details presented in this content.
Summary
The UK's privacy watchdog has launched an investigation into three popular social media platforms: TikTok, Reddit, and Imgur. The main concern is the processing of children's data, which raises serious questions about online safety for minors.
This move highlights the need foobust regulations to protect young users from potential harm. Regulatory bodies worldwide are stepping up efforts to curb data breaches and ensure responsible handling of user information.
Social media companies must be held accountable for their actions, and this includes taking measures to safeguard children's data. The consequences of neglecting these responsibilities can be severe and long-lasting.
The international community must work together to establish a unified framework for data protection, addressing discrepancies in laws across countries. This cooperation is crucial in preventing the exploitation of vulnerable users and promoting online safety for all ages.
On Monday, the United Kingdom's privacy watchdog announced that it is investigating TikTok, Reddit, and Imgur because of privacy concerns about how they are processing children's data. [...]...
Read Full Article »Google’s Gemini now lets you ask questions using videos and what’s on your screen
Discussion Points
- r.
- The information provides valuable insights for those interested in AI.
- Understanding AI requires attention to the details presented in this content.
Summary
Google has announced a significant update to its AI assistant, Gemini, at the Mobile World Congress 2025 in Barcelona. The new "Screenshare" feature allows users to share their phone's screen with Gemini in real-time, using video content on the display.This development raises concerns about user privacy and security.
By sharing sensitive information or personal data on their screen, users may be exposing themselves to potential risks. However, it's also possible that this feature could provide new avenues for accessible and intuitive interactions with AI assistants.The "Screenshare" feature has the potential to revolutionize how we engage with digital interfaces.
As the tech giant continues to push the boundaries of what's possible with AI, it will be essential to consider both the benefits and drawbacks of such innovative features.
Google is adding new features to its AI assistant, Gemini, that let users ask it questions using video and content on the screen in real time. At the Mobile World Congress (MWC) 2025 in Barcelona, the...
Read Full Article »Mozilla is already trying to backtrack on Firefox's controversial data privacy update, but it might be too little, too late
Discussion Points
- This content provides valuable insights about AI.
- The information provides valuable insights for those interested in AI.
- Understanding AI requires attention to the details presented in this content.
Summary
Mozilla's potential sale of user data has caused widespread concern among internet users. This raises questions about the company's commitment to online security and privacy.
The implications of such an action are severe, putting users' identities and activities at risk.The situation highlights the need for clear transparency and accountability from companies handling user data. Mozilla must take immediate action to address these concerns and provide users with reassurance.
Ultimately, this scandal serves as a wake-up call for all parties involved companies, regulators, and users alike. It is essential that we prioritize online security and privacy, ensuring that user trust is not compromised.
Oops, Mozilla might be selling your data after all. ...
Read Full Article »Researchers uncover unknown Android flaws used to hack into a student’s phone
Discussion Points
- Security Concerns: How do previously unknown flaws in Android allow authorities to unlock phones using forensic tools, and what implications does this have for user privacy?r
- Zero-Day Vulnerabilities: What is a zero-day vulnerability, and how did Amnesty International discover the chain of vulnerabilities developed by Cellebrite?r
- Accountability and Regulation: Should tech companies be held accountable for allowing such flaws to exist, and are there any regulatory measures that can be taken to prevent similar incidents in the future?r
Summary
Amnesty International has reported that Google has fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. The organization's researchers discovered a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite after investigating a hack on a student protester's phone in Serbia.
These findings highlight serious security concerns and the need for increased transparency and accountability in the tech industry.
Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report det...
Read Full Article »Qilin ransomware claims attack at Lee Enterprises, leaks stolen data
Discussion Points
- The impact of ransomware attacks on organizations and their employees, highlighting the emotional and financial burden on those affected.r
- The role of international cybersecurity cooperation in combating ransomware gangs and disrupting their operations.r
- The ethical implications of paying ransom to gangs like the Qilin ransomware gang, and potential consequences for individuals and organizations.
Summary
The Qilin ransomware gang has taken responsibility for the recent attack on Lee Enterprises, releasing stolen data samples. This incident underscores the growing threat of ransomware attacks, which can have severe consequences for organizations and their employees.
As cybersecurity threats continue to evolve, international cooperation is crucial in disrupting the operations of gangs like the Qilin ransomware gang. Paying ransom may provide temporary relief but can perpetuate a cycle of vulnerability, highlighting the need for proactive measures to prevent such attacks.
The Qilin ransomware gang has claimed responsibility for the attack at Lee Enterprises that disrupted operations on February 3, leaking samples of data they claim was stolen from the company. [...]...
Read Full Article »US Probes UK's Apple Encryption Demand for Possible Treaty Violation
Discussion Points
- Balancing National Security and Individual Privacy: How do you think the U.S. officials' investigation into the UK's demands for Apple to create a backdoor will impact the broader debate on encryption and data protection?
- The CLOUD Act and Its Implications: What are the key provisions of the CLOUD Act, and how do they relate to the investigation into the UK's alleged violation of the bilateral agreement?
- Encrypted Data and Cybersecurity: Will creating backdoors for authorities compromise the security of users' data, and what are the potential consequences of such a compromise?r
Summary
US officials are investigating whether the UK violated a bilateral agreement by demanding Apple create a "backdoor" to access end-to-end encrypted iCloud data. The investigation follows Apple's withdrawal of its Advanced Data Protection feature from the UK after the British government reportedly issued a secret ordeequiring access to encrypted user data globally.
The CLOUD Act prohibits one country from issuing demands for the other's citizens' data, but the UK may have violated this agreement by demanding backdoor access. Cybersecurity experts agree that any government backdoor would eventually be discovered and exploited by malicious actors.
U.S. officials are looking at whether the United Kingdom violated a bilateral agreement by demanding Apple create a "backdoor" to access end-to-end encrypted iCloud data, according to a letter from Na...
Read Full Article »