WASHINGTON: The US Supreme Court is to rule on whether employees have a right to privacy when they send text messages on electronic devices supplied by their emloyers.
Keylogging and spyware, backdoor or command/control and SQL injection are the top three cyber attack vectors according to a recent study by the Verizon Business RISK Team. The full “2009 Data Breach Investigations Supplemental Report ” is available here.
Last week, U.S. House of Representatives legislators passed the Data Accountability and Trust Act (DATA), which requires security policies for consumer information, regulates the information broker industry, and establishes a national breach notification law. The bill now moves to the U.S. Senate, which is also considering a similar measure.
It’s snowing here at Virtual Shadows, just as it’s snowing here in Stockholm 🙂
Today is an exciting day because I have on Virtual Shadows added new authors to the blog. Each is either an expert in information security and privacy or they have done alot of research in this space. Please welcome them to this blog, I expect it to become much richer in content. Each will be posting events/issues on the privacy landscape on their respective countries.
So far we have Leo (Iceland), Roman (Latvia & Russia), David (Australia & New Zealand), May (Singapore), aliasname (China).
More authors to be added over the next couple of weeks 🙂
I just love this, the first known case ever, a man has been arrested for stealing virtual artifacts in a virtual world!
He hacked into accounts to steal virtual characters and their possessions on one of the world’s biggest multi-player online games RuneScape, a web-based role playing game with more than ten million members.
Thanks to David Lacey for highlighting that the Information Commissioner’s Office has just published a detailed Guide to Data Protection that is an excellent, well presented piece of work.