You are here
Home > Author: Peter Glock

How businesses could be exposed to security risks from employees using FaceApp

Where the app itself may not be as risky as some jittery US Senators think, it's generally a bad idea for employees to download unauthorised apps onto corporate devices. My twitter feed is swamped with discussions about this years-old app. It's truly "gone viral"...: [...] FaceApp CEO Yaroslav Goncharov talked to TechRepublic about the safety of his app. "FaceApp performs most of the photo processing in the cloud. We only upload a photo selected by a user for editing. We nev

Google to clamp down on Incognito Mode detection

One incognito-mode use for me is to compare the prices I get offered where cookies are set against 'new visitor' pricing. Incognito isn't just for pr0n sites...: Google has chosen to remove a method websites could use to detect visitors that used Chrome's Incognito Mode when on a web site. When Chrome 76 lands at the end of July, sites will no longer be able to check if the FileSystem API is available or not. If it was not available, sites could deduce the visitor was in

Encryption laws to run up against CLOUD Act and GDPR: Law Council

As predicted, Australian law is now at odds with European and US regulatory frameworks. This may lead to fragmentation of service offers...: [...] In a submission to the Parliamentary Joint Committee on Intelligence and Security's encryption law review, the Law Council said Australian law enforcement will have to continue seeking data through the slower mutual legal assistance treaties (MLAT), rather than the expedited service the CLOUD Act would offer once Canberra and Wash

Photo editor FaceApp goes viral again, prompting security concerns

Fallback Image

I'm still suspicious of these kind of apps so don't take part though lots of my Facebook contacts have shared photos...: FaceApp, a more than 2-year-old app created by a Russia-based developer, has seen a recent spike in use due to some celebrities and influencers taking part in the "FaceApp Challenge." But the sudden popularity of the app has also triggered growing concerns about how apps use the data and images supplied by users, particularly those that are owned ...

Walmart scoring execs against one another on security performance

I like this approach but I'd link it more directly to pay. In my days at Orange everyone's bonus calculation included a measure of the overall customer satisfaction. That meant a focus on making sure customer-facing issues received maximum attention...: [...] The dashboard, known as the executive scorecard, provides every executive within Walmart with a real-time overview of how they're performing. They're given a grade -- A, B, C, D, and F -- and ranked against other exe

From Data Breach to Bankruptcy – A Cautionary Tale for Those Without Cyber Insurance

Two lessons from this: 1. It's worth investing in cyber security (a full program, not just shiny security tools); 2. Insurance can make the difference between survival and bankruptcy if/when the worst happens...: A data breach may cost a company millions in recovery and liability damages, but rarely does a breach force a company into bankruptcy. However, a months-long data breach at American Medical Collection Agency (AMCA) in 2018-2019 did just that, forcing its parent comp

New Study Shows AI Made Scientific Discoveries Humans Missed: What are the Implications for eDiscovery?

Legal process usually lags behind commercial application of new technology. Here's a discussion about a potential use for AI, but why it's difficult to implement...: [...]In a recent study published in Nature, researchers from the Lawrence Berkeley National Laboratory used an algorithm called Word2Vec to read scientific papers. The algorithm was given no training in scientific knowledge, instead relying only on word associations. While reviewing over 3 million previously wri

Google says leaked assistant recordings are a violation of data security policies

Do you think it's ok for Google (or Amazon, or Apple....)  to listen to your family conversations for the purposes of 'training'? I can see the logic, but I don't see how most people would sign up for this if they knew what was happening...: [...] Google has responded to the report, publishing a blog titled "More information about our processes to safeguard speech data". The search engine giant confirmed that it uses recordings in partnership with language experts from ar