CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
News
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

News

Latest news on data protection, privacy and cybersecurity regulatory developments, data breaches and enforcement actions happening around the world.

Image of bug on a keyboard representing whether the privacy issues and data abuses faced by Facebook can be considered just a bug in the system
Data PrivacyNews

Are Privacy Issues and Data Abuses Really Just a Bug in the Facebook System?

May 14, 2018
In an effort to get out in front of the data privacy scandal threatening to engulf the company, Facebook recently announced a new data abuse bounty program, which promises to pay people who report data abuses. But is this new data abuse bounty program going to result in any real changes to data privacy on Facebook?
Read More
Image of hand removing block from a stack showing the perils of data security breaches as seen from the Cambridge Analytica bankruptcy filing
Data PrivacyNews

Cambridge Analytica Bankruptcy Shows the Perils of Data Security Breaches

May 9, 2018
After nearly two months of non-stop controversy and scandal over its improper use of Facebook data, Cambridge Analytica finally announced that it was ceasing operations, effective immediately. In doing so, Cambridge Analytica has become the new poster child to highlight the perils of data security breaches.
Read More
Image of security pros standing in front of a maze and wondering how clueless governments can handle social media regulation
Data PrivacyNews

Security Pros Believe Governments Are Clueless but Should Impose Social Media Regulation

May 2, 2018
Seventy percent of security pros want governments to impose social media regulation for the collection of personal data by social media companies. Yet, expectations are hazy and 72% also indicated that they have little to no faith that government officials have an understanding of the threats to digital privacy.
Read More
Image of gloved hand holding mobile phone showing login screen signifying Fakebank Android malware and the threat of vishing attacks
Cyber SecurityNews

Fakebank Android Malware Evolves into Vishing Attack

March 23, 2018
Latest variant of Fakebank Android malware adds even more functional threats to banking clients – in the form of ‘vishing’ (voice phishing). It can now intercept outgoing and incoming calls which is then redirected to scammers which allows them to pose as legitimate employees of the bank.
Read More
Image of magnifying glass on laptop screen with Gmail window signifying legal attack on Gmail privacy practices
Data PrivacyNews

Google’s Gmail Privacy Practices Now Under Legal Attack

March 21, 2018
Google has tried to clean up its Gmail privacy practices, saying that it will no longer use or scan Gmail content for any advertising purposes. Now, Gallo is representing consumers who never signed up for a Google account or Gmail account, but who still had their email messages read. This could be a real game-changer.
Read More
Image of group of people at negotiation and shaking hands to agree on trade deals and signifying the need for EU data protection
Data ProtectionNews

EU Wants Data Protection to Go Hand in Hand with Trade Deals

March 12, 2018
Personal data protection is a fundamental EU right and is not negotiable in trade deals, The European Commission has provided four conditions for international data flows to comply with the GDPR. Yet, there is a “get out of jail free card,” allowing restrictions to be reviewed and accorded "sympathetic" consideration.
Read More
Image of smart city with overlay of network connections signifying IoT network and how the new NIST report will address security and privacy
Cyber SecurityNews

What You Need To Know About the New NIST Report on IoT

February 26, 2018
For years, IoT developers have focused too much on availability, and not enough on privacy and confidentiality. This mindset appears to be shifting and the NIST report is proof of a growing recognition that there needs to be universal standards in place to improve the privacy and security of any IoT system.
Read More
Image of country flags of European Union signifying countries getting prepared for GDPR
Data ProtectionNews

GDPR Amber Alert: Only Two Countries Fully Prepared

February 21, 2018
Less than 100 days to go, and so far only two European countries have adapted their laws to be ready for GDPR. While the GDPR aims to harmonize rules across the European Union and to benefit companies to deal with just one law, many member states are eyeing possible exemptions as they change their national laws.
Read More
Image of man holding mobile phone with social fitness apps and looking at fitness wearable device and consideration for user privacy
Data PrivacyNews

Social Fitness Apps May Be More Harmful to User Privacy Than You Think

February 12, 2018
Social fitness apps such as Strava need to be doing more to enhance user privacy and safety. The recent snafu involving the disclosure of U.S. military personnel location data has increased awareness of the perils created by tracking apps. Learn more about how these apps are collecting data, and how they are using it.
Read More
Image of a lock on computer chip signifying the use of microSD-sized computers to secure microfinance in developing countries
Cyber SecurityNews

Securing Microfinance in Developing Countries with microSD-Sized Computers

February 9, 2018
There's a need to secure offline, rather than online, microfinancing solutions. The future rests in the power of embeddable microchips and the power of process isolation by inserting a Linux-powered computer into the architecture of an non-secure IoT device to create a hardware Root of Trust.
Read More
1 … 158 159 160 161 162 … 166

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results