Regularly Updated Global News on Compliance and Privacy
We bring you news, views, and announcements from around the world. This is Globally Syndicated News, as it happens. News on this page changes as organisations whose news feeds and tickers we subscribe to publish their own new items. This is the key page for you to bookmark.
We have several newsfeed pages based around feeds that are aggregates for specific topics:
Global Breaking News, Courtesy of Moreover
Updated every 30 minutes
[CaRP] XML error: Not well-formed (invalid token) at line 1
[CaRP] XML error: Not well-formed (invalid token) at line 1
[CaRP] XML error: Not well-formed (invalid token) at line 1
[CaRP] XML error: Not well-formed (invalid token) at line 1
|
Other News from around the world of Compliance and of Privacy
Fresh News, Additional to Moreover, Updated as it Happens
[CaRP] XML error: XML_ERR_NAME_REQUIRED at line 1
[CaRP] XML error: Reserved XML Name at line 2
- Cyber crime touches new high
The COVID-19 pandemic has caused job losses, deaths, widespread health concerns and gutted businesses, but there’s was also another danger...
- Cybercrime to reach 1% of global GDP in 2020
Global losses from cybercrime are projected to hit $945 billion in 2020, reaching a level equivalent to 1% of the entire world’s GDP. These are...
- Cybercrime police stations to dot Hyderabad
Hyderabad: The Hyderabad City Police will soon have one cybercrime police station each in all the five zones. City Police Commissioner Anjani Kumar...
- What is steganography and how does it differ from cryptography?
Steganography is the study and practice of concealing communication. It plays a different role to cryptography, with its own unique applications and strengths...
- Predictions 2020: Will This Be the Year of Cybercrime-as-a-Service?
Is cybercrime-as-a-service poised to become an actual business trend? Don't be surprised to see it happen in 2020. Security-breach news became so...
- What’s been done to fight cybercrime in East Africa
East Africa attracts millions of tourists every year. Over the past 10 years, its earnings from tourism have doubled. Compared to the rest of Africa,...
- Cybercrime Rises Globally and in Malta: How to Protect Your Business
How to protect your business against hackers As the Internet has become a routine tool for enterprises, which tend to host and exchange valuable data...
- Why businesses dont report cybercrimes to law enforcement
Law enforcement agencies estimate the number of cybercrimes that go unreported by businesses number in the millions. Here why and when you should...
- Cyber-crime thrives on legal inefficiency & business leaders turning a blind eye
‘No one noticed? Good. Sweep it under the carpet.’ This seems to be the preferred method of top UK IT business bosses when it comes to...
- Many are seeing the damage of cybercrime and identity theft firsthand
As massive data breaches continue to make international headlines and the Internet is an integral part of our daily lives, consumers are now grasping...
- Russian Activists Take On The Fight Against An Online Suicide Game
A group of young activists backed by the Kremlin and known for their efforts in cracking down on homosexuality in Russia has taken on a new...
- Awareness creation on Cyber Crime key for digital migration
Dr Herbert Gustav Yankson, Director in charge of Cyber Crime Unit at the Criminal Investigations Department (CID) of the Ghana Police Service has...
- Why Cybercrime Is So Hard to Investigate
Cyber crime is so prevalent that cyber investigations are now handled by nearly every law enforcement agency...
- Digital Forensics with Free Data Recovery Software
Digital forensics (sometimes known as digital forensic science) is a branch of forensic...
- Distance Learning Systems and their information security
The article studies the problems of improving the degree of information security in the distance learning systems (DLS) at the expense of...
- Cybercrime as a threat for critical infrastructure protection
The article discloses the problems of an Internet-crime (cybercrime) prevention that is a purpose of this article. As one of an approach for...
- Dublin's Symantec a key cybercrime fighter
Symantec estimates cybercrime cost consumers about $110bn in 2012...
- Cyber criminals and cyber spies active in Asia
Cyber espionage involves the illicit extraction of information; cyber crime is the illicit extraction of money...
- Activists: New Philippines law gags netizens
The Cybercrime Prevention Act of 2012 came into effect Wednesday despite widespread protests among netizens, journalists and free speech activists...
- Saving Money With SFTP - Wick Hill
Everyone is looking to cut costs in the recession, but there is one solution which many companies don't realise has the potential to save money for minimal investment and minimal disruption, which also can provide fast ROI. A lot of organisations still have legacy systems and are happy to live with...
- UK Information Commissioner targets firm selling vetting data
The Information Commissioner's Office (ICO) has taken stringent enforcement action against a business that it believes has been selling data about construction industry workers to prospective employees. The action against the Consulting Association is further evidence of the proactive enforcement...
- 12 Key Steps to Internet Security - Wick Hill
- Your approach to internet security should begin with a risk assessment. If you don't know what threats are likely to be posed to your IT systems and networks, and their potential effects on your business should they occur, then you are not really in a position to put in place a series of measures to...
- Dechert - Telephone Monitoring: Dos and Don'ts
It is widely (and incorrectly!) believed that it is unlawful in the UK in all circumstances to monitor and record telephone calls without drawing this to the attention of the parties to the call. There are in fact broad exceptions which are relevant to many businesses which do allow such activities ...
- The Dating Group Internet Scam
In August an internet scam hit very close to home when, I was almost conned. It started when I went looking for a job online. There, I came across...
- Firewall or Unified Threat Management System, UTM? Wick Hill
Unified threat management systems (UTMs) have been growing in popularity for the last few years. Traditionally, they have been widely adopted by SMEs, but larger companies and enterprises are now also deploying UTMs, appreciating the benefits they can offer. UTMs are designed to provide a range of...
- Information Commissioner's Office demands encryption of mobile devices - Ever...
emonstrating the increasing appetite of the Information Commissioner's Office (ICO) to take enforcement action, Virgin Media Limited is the latest organisation to be held to account for a breach of the Data Protection Act 1998 (DPA). The breach seems to have occurred earlier this year following the ...
- Data loss - liability, reputation and mitigation of risk - Eversheds e80
With an increasing number of security breaches hitting the headlines, there is, unsurprisingly, a growing awareness amongst regulators and the public alike of data security issues. The risks to businesses of being involved in a data loss incident are high. Criminal sanctions under the Data Protecti...
- What does the British Computer Society think of Phorm?
Phorm, Webwise, OIX and the BCS Security Forum Phorm over function? Perhaps that's the challenge in relation to marketing desires clashing with privacy hopes. But given the starting point of the Phorm furore, in the Spring of 2008, we are now in the Autumn of 2008 and its been nothing but data brea...
- Are you storing customer data properly? The challenges of PCI DSS compliance
Data security breaches are hitting the headlines with alarming frequency. While the most recent breaches have involved the public sector and financial services industries, retailers are not immune from the rise of data losses. Cotton Traders, the UK leisurewear and casual clothes brand, for example,...
- Data Vendor Sends SPAM about The Dangers of Prospecting Databases
ComplianceAndPrivacy.Com received an email that appears to be from Harris Infosource, a D&B Company. Not a lot wrong with that, you may say. The email is a cold unsolicited email, or SPAM, What makes this amusing is that the SPAM has this subject line: "Why Using Cheap Prospect Lists Can Cost Y...
- Bank Customer Personal Data Sold on eBay for £35
An investigation is under way into how a computer containing bank customers' personal data was sold on an internet auction site. The PC, which was reportedly sold for £35 on eBay, had sensitive information on the hard drive. The Royal Bank of Scotland (RBS) and its subsidiary, Natwest, have confir...
- Best Western Denies Report of Massive Data Breach
A Scottish newspaper Friday ran a story that claimed to uncover a massive theft of data from Best Western's customer database, including personal information on all 8 million customers at the chain's 1,300 hotels in the past year. After initially thanking the newspaper and doing its own investigati...
- Best Western Data Loss - Indian hacker alleged brain behind biggest cyber-heist
An unknown Indian hacker is being 'charged' with the greatest cyber-heist in history for allegedly helping a criminal gang steal identities of an estimated eight million people in a hacking raid that could ultimately net more than 2.8 billion pounds in illegal funds. An investigation by Scotland's...
- Vietnam introduces heavy fines for spammers
Organisations and individuals who send spam mail and text messages or trade in e-mail addresses may be fined up to VND80 million (US$5,000), according to the newly-issued Decree on Anti-spam mail. The decree bans organi-sations and individuals from using electronic means to deliver spam messages, ...
- Republic of the Phillipines can?t do without policy on data privacy, security
Under no circumstances can the Philippines compete, let alone thrive, in the lucrative outsourcing market and the global marketplace without a fool-proof policy on data protection and security. This was the clear message sent out by participants in a recent conference dubbed "Mapping the Future of ...
- National Gateway Security Survey 2008 Shows Interesting Changes in Threat Lan...
The National Gateway Security Survey 2008, carried out for value added distributor and security specialist Wick Hill and sponsored by WatchGuard Technologies, leaders in unified threat management systems, has highlighted the increasing move toward remote and mobile use, as well as the concerns users...
- Unified Threat Management (UTM) - Watchguard Technologies
Unified threat management (UTM) spawned a new era of IT security. The promise of these integrated security appliances proved to be an exceptional and efficient way of securing commercial networks. However, businesses today face an inflection point, dictated by changing market trends and new technolo...
- Transatlantic Events - Data Privacy Conference
As a grand special offer to readers of ComplianceAndPrivacy.Com, Transatlantic Events has slashed the ticket price to £200 per day. Reach the special Compliance and Privacy booking page directly from here: Special ComplianceAndPrivacy.Com Delegate Booking Page. This event is a Must See for th...
- Special Privacy Event Offer
EXCLUSIVE READERS OFFER: Dear Readers of Compliance and Privacy, It's our pleasure to announce and invite you as a VIP Delegate to: The 5th Annual Privacy & Data Protection UK 2008 3rd & 4th of September 2008 at The Law Society, 113 Chancery Lane, London, United Kingdom The event is broken ...
- Trust is not about SSL. It's about domains
At ComplianceAndPrivacy we've been running a study on domains to trust. We don't mean "trustmydomain.com", we mean the domain suffic; the little thing that you choose when buying "myfabulousdomain". Do you choose .com, or do you think, incorrectly "That is for the USA"? Do you choose .biz? Is .org ...
|
Please note: News feeds contain items from other websites gathered by our aggregating the news feeds that they offer. Where an item comes in a news feed from another website it is presented "as is" with no endorsement from, nor editing by, nor approval from complianceandprivacy.com or its sponsors, VeriSign. News feeds are dynamic. We offer them in good faith, but, where the content is outside our control we cannot be responsible for their errors, omissions or other conduct. Some of the links on this page remain on this site, others go to other sites; that is the nature of a newsfeed. When you leave this site you are encouraged to be aware of the privacy policy of the new site before leaving personal data there.
|