Tag Archive for: Stepping

Data Privacy Day: Security threats expand, are tech giants stepping up to help?


We say it every year to mark the annual Data Privacy Day on January 28, and 2023 is no different. The potential of threat to your online data being accessed without your consent is more than it was last year. Smartphone and PCs, all apps you use, web browser, smart wearables, and even smart homes are accessing a user’s existing data and generating new data. A lot of it may be personal. Basically, nothing you’d want in the hand of a cybercriminal with nefarious intent.

There is no doubt we live in a hyper-connected world. That makes a strong online privacy layer crucial. Apps need to be able to keep your data secure while giving you as many options as possible to control what information other users can see about you. Secondly, devices that you access apps and the web need to have strong data privacy measures in place to complete the sequence.

“With cyber threats becoming increasingly sophisticated, businesses, people and communities at large are highly exposed to malicious attacks. Ransomware and data theft have been a persistent issue through the years globally as well as in India,” says Ripu Bajwa, director and general manager, data protection solutions, Dell Technologies India.

The latest numbers from the Norton Consumer Cyber Safety Pulse Report, which collects threat data from the LifeLock security software suite, give us a fair idea of the threat landscape.

The numbers indicate that between July and September last year, more than 769 million online threats were blocked on computing and mobile devices. These included more than 100 million file-based malware, 100 million fingerprinting attempts to track users and more than 330,000 mobile malware attacks.

Smartphones dial up privacy

The question needs to be asked, what are the tech giants doing to improve privacy measures on the software and apps they make, and the phones as well as computing devices they sell?

For Apple, efforts that started with App Tracking Transparency in iOS 14 a couple of years ago have steadily evolved into a much bigger toolkit for iPhone, iPad, and Mac users. Stopping websites from tracking you, blocking a gamut of trackers in emails, hiding your real email ID by generating temporary ones for…

Source…

Microsoft: Russia Stepping Up Hacking, Cyber Penetration Efforts on 42 Ukraine Allies


Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a
user – asks your browser to store on your device in order to remember information about you, such as your
language preference or login information. Those cookies are set by us and called first-party cookies. We also
use third-party cookies – which are cookies from a domain different than the domain of the website you are
visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking
technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to
ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy
choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of
your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts
of the site will not work as intended if you do so. You can usually find these settings in the Options or
Preferences menu of your browser. Visit www.allaboutcookies.org
to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to
ensure the proper functioning of our
website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site
performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You
can set your browser to block or alert you about these cookies, but some parts of the site will not work as
intended if you do so. You can usually find these settings in the Options or Preferences menu of your
browser. Visit www.allaboutcookies.org
to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to
ensure the proper functioning of our

Source…

Ken Bennett stepping down as audit liaison after Cyber Ninjas ban


The recount’s lead contractor banned Bennett from the building after Bennett shared data with outside critics of the audit.

ARIZONA, USA — Editor’s note: The above video aired during a previous broadcast.

The man selected as the liaison between Arizona Senate Republicans and the lead contractor of the Senate’s partisan recount of the 2020 election is stepping down from the position after the lead contractor banned him from entering the recount building.

Former Arizona Secretary of State and candidate for state governor Ken Bennett made the announcement on Wednesday that he will be resigning from the position during an interview with James Harris on KFYI.

The announcement comes just a few days after the recount’s lead contractor, Flordia-based internet security company Cyber Ninjas, banned Bennett from the building where the recount is taking place.

“Being locked out makes it impossible for me to be a true liaison,” Bennett said on KFYI.

Bennett also told Harris that he still supports the audit and the new subpoenas issued by the Arizona Senate GOP. He said his main issue is with Cyber Ninjas’ lack of transparency.

Source…

Personal data, fodder for cyberwarfare? New models for stepping up cybersecurity


Cybersecurity
Credit: CC0 Public Domain

In today’s increasingly digital world, cybersecurity is paramount. The upsurge in cyberattacks has far-reaching effects, from jeopardizing users’ private data to sparking all out cyberwar, not to mention threatening private businesses’ intellectual property. In such volatile times, the only approach is to adopt new models and applications that can address these problems efficiently.

More awake to this issue than most, Regner Sabillon, a doctoral student at the Universitat Oberta de Catalunya (UOC), dissects these models in his thesis, Digital Forensics Assessment, Cyberlaw Review and Cybercrime Analysis to Enforce Cybersecurity. The Importance of Cybersecurity Audits, Assurance, Awareness and Training, which benefited from co-supervision by professors and researchers Jordi Serra from the Faculty of Computer Science, Multimedia and Telecommunications and Víctor Cavaller from the Faculty of Information and Communication Sciences. The research breaks down multiple case studies and highlights the importance of taking appropriate measures to shield data against cyberattacks. Sabillon’s academic undertaking has now been reworked into a book titled Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM, which has been named the best new cybersecurity book to read in 2021 by United States website BookAuthority.

The book underscores the need to upgrade security models to ward off the increasingly sophisticated cyberattacks waged against anyone from top-tier institutions to ordinary citizens, with businesses and government agencies also caught in the crossfire. Cavaller explained that the research involved an “extensive review of cybersecurity systems that are being implemented worldwide in different organizations” and that the book “proposes Audit and Awareness Training models that are extremely useful and that have been successfully applied in several institutions with results that have radically improved the capacity of computer protection.” “This research…

Source…