Microsoft Outlook vulnerability allows hackers to steal Windows passwords

In November 2016, Microsoft was alerted to a vulnerability in Microsoft Outlook by security researcher Will Dormann. Only this month-18 months later, has Microsoft released a patch to address the flaw. Having said that, it is only a partial fix! Dormann discovered that the Microsoft Outlook flaw (CVE-2018-0950) can enable attackers to steal confidential information […]

Read More… from Microsoft Outlook vulnerability allows hackers to steal Windows passwords

Countdown to May 25th: time to take your GDPR preparation to the next level

Companies and consumers suffered a record number of cyber-attacks and data breaches last year as businesses failed to keep data private and customers had little control over how companies used or held personal information. The imminent implementation of General Data Protection Regulation (GDPR), enforceable in all EU countries from May 25th, is designed to change […]

Read More… from Countdown to May 25th: time to take your GDPR preparation to the next level

YouTube accused of violating the Children’s Online Privacy Protection Act

A group of over 20 consumers of child safety and privacy advocacy groups has accused YouTube of breaching child protection laws within the US. The group has filed a complaint with the Federal Trade Commission (FTC) claiming that YouTube gathers data (location data, device types, mobile phone numbers and browsing habits) of children aged under […]

Read More… from YouTube accused of violating the Children’s Online Privacy Protection Act

Under Armour reports MyFitnessPal data breach affecting 150 million accounts

In 2015 Under Armour bought MyFitnessPal website and app for $475 million, which provides nutrition and exercise functionality. It forms part of Under Armours connected fitness division, whose revenue last year accounted for 1.8 percent of the companies $5 billion in overall sales. On 29 March 2018 Under Armour reported a data breach of their […]

Read More… from Under Armour reports MyFitnessPal data breach affecting 150 million accounts

Warning: Rise in W-2 Form phishing scams

It’s tax season in the United States and cybercriminals are attempting to capitalise on this, once again.  A spike in phishing scams, related to the W-2 Form, has been noted since first records at the beginning of 2017. The Internal Revenue Service (IRS), state tax agencies and the tax industry has issued a warning to […]

Read More… from Warning: Rise in W-2 Form phishing scams

Don’t be caught short – how to keep your business’ data secure in a Cambridge Analytica age

Data is a headache. Senior business people have a lot on their plate, they hardly need yet another problem. But that is exactly what data has become, a confusing, confounding problem that can no longer just be left to IT departments. The Cambridge Analytica story has made this abundantly clear. Facebook’s share price has taken […]

Read More… from Don’t be caught short – how to keep your business’ data secure in a Cambridge Analytica age

Focus your security efforts right: data-centric security is spot-on!

Way back when data centres were largely company owned, as well as the servers, machines, and the software installed on them, we knew where our data was, who had access to our network, and we had pretty good control over who was accessing the data. The working and company environment was reasonably contained and simpler […]

Read More… from Focus your security efforts right: data-centric security is spot-on!

Our Privacy is under attack…it’s time to protect it!

We face an unparalleled threat to the digital safety of our personal information daily. Believe it or not, we are all fighting an information war, our data is under constant attack and our privacy is at risk. Our data is a target for multiple reasons and by a variety of individuals, gangs and institutions. We […]

Read More… from Our Privacy is under attack…it’s time to protect it!

Data threat report, perhaps an eye-opener for some…

A recent report by Thales (a Galaxkey partner), compiled using information gathered from 1200 senior IT executives from numerous industries worldwide including: automotive, energy, government, financial services, healthcare, IT, manufacturing, retail, and telecommunications shows that 94% of organisations process sensitive information in cloud, big data, IoT, container, blockchain and/or mobile environments. This is resulting in […]

Read More… from Data threat report, perhaps an eye-opener for some…

Google in landmark ‘right to be forgotten’ case

Google has made the decision not to remove links to information that references a businessman’s criminal conviction (a criminal conviction for false accounting from the 1990s) from search engines. This has led to the first ‘right to be forgotten’ case in the English courts with the businessman challenging Googles decision. The hearing that commenced on […]

Read More… from Google in landmark ‘right to be forgotten’ case

The 6 GDPR privacy principles and encryptions primary role

The six principles are found in article 5 of the GDPR regulation and aim to drive compliance. Businesses should use them as a guide to best manage personal data. Through adhering to these principles, businesses are positioned to handle personal data in a more compliant manner. They succeed the principles outlined in the EU Data […]

Read More… from The 6 GDPR privacy principles and encryptions primary role

Massive attack on the Norwegian healthcare provider, Health South-East RHF

A Norwegian healthcare provider, Health South-East RHF, is investigating an unauthorised intrusion into its IT systems which may have breached the personal data of over half the country’s population. Health South-East RHF delivers healthcare through 15 health trusts and a network of 19 pharmacies, covering nearly three million of the five million inhabitants of Norway. […]

Read More… from Massive attack on the Norwegian healthcare provider, Health South-East RHF