Data Privacy

Privacy International Crowdfunds Legal Costs in Fight Against UK State Hacking

Privacy International Crowdfunds Legal Costs in Fight Against UK State Hacking

Reports have revealed that Privacy International has turned to crowdfunding as a means of covering costs associated with their legal battle against UK’s state-sponsored hacking. The group alleges that the British government is using hacking to gather intelligence for the purposes of mass surveillance. It had been opposing this government action since 2014, where it additionally found that the government is not required to provide individual warrants to hack devices and services. Privacy International argued that this kind of untargeted hacking violates privacy and free speech according to Articles 8 and 10 of the European Convention on Human Rights.      […]

WhatsApp Serves as Paedophile Cover, UK Interior Minister Says

WhatsApp Serves as Paedophile Cover, UK Interior Minister Says

Last Tuesday, British interior minister Amber Rudd expressed her concerns regarding WhatsApp’s encryption, saying that it can allow criminals like paedophiles to operate beyond the law’s reach. Speaking to party activists in Manchester, she added that companies should be compelled to move with greater urgency to address such issues, especially since they have the resources to do so. Rudd also called on Facebook, Twitter, Google, Microsoft, and other tech giants to put in greater effort in combatting extremist content. Source: Reuters

NY Startup Says Decentralization is Key to Preventing “Equifax-like” Incidents

NY Startup Says Decentralization is Key to Preventing “Equifax-like” Incidents

New York-based cybersecurity startup HYPR announced that it recently closed an $8 million Series A funding round led by RRE Ventures. HYPR uses an authentication technology that secures biometrics, as well as traditional passwords. According to CEO George Avetisov, his startup is also creating a decentralized system that would prevent incidents such as the Equifax hack where the attackers were able breach an enterprise in one shot. He says that cybercriminals would have to go through the impossible task of hacking a multitude of devices to crack the system’s security and get to the data. Avetisov added that HYPR intends […]

Court Says FBI Can Keep Hacking Tool Info Secret

Court Says FBI Can Keep Hacking Tool Info Secret

A court in District of Columbia allowed the FBI to keep the info of the tool it used to crack the iPhone of the San Bernardino shooter, in a lawsuit filed against the agency last 2016. The case was filed by three major news agencies last year in an attempt to get more details on the tool after previously receiving heavily redacted FOIA requests. The judge ruled in favor of the FBI for reasons of national security, as well as to protect the tool’s supplier. It was revealed that the FBI purchased the hacking tool for $900,000 from an unknown […]

Data Breach Notification Under the Data Privacy Act

In November 2016, Landbank debit cardholders were warned not to use their Automated Teller Machine (ATM) cards for online transactions.1 This came following reports that some of the bank’s ATM terminals may have been compromised.2 The bank did not provide details of the extent and nature of the attack. However, it did notify its clients of the possible breach. Subsequently, it permanently blocked their debit cards. Also in 2016, tech giant Yahoo! disclosed that more than a billion user accounts were compromised in a 2013 attack.3 The company attributed the attack to a possible theft of its proprietary code by […]

Some Macs Susceptible to Attacks, According to Security Firm

Some Macs Susceptible to Attacks, According to Security Firm

According to a report by Duo Security, a number of Mac computers are vulnerable to attacks. In a survey that Duo conducted, out of 73,000 functioning Mac computers, 4.2 percent have firmware installed that is not intended for their operating system. Other models such as the 2015 iMac had units as many as 43 percent which had firmware that was outdated.  These issues have made Macs susceptible to attacks like “Thunderstrike” where a Mac can be taken control of once an Ethernet adapter gets plugged into the thunderbolt port. Apple had been made aware of these issues according to Duo. […]

Security Bypass Flaw in macOS Quietly Patched by Apple

Security Bypass Flaw in macOS Quietly Patched by Apple

Earlier this week, a flaw in macOS appears to have been quietly patched by Apple. The flaw would have enabled hackers to bypass the built-in quarantine system of the OS and inject malicious code. Filippo Cavallion, a researcher for security firm Segment, discovered the vulnerability. He used the SSD program from Beyond Security to securely inform Apple of the issue. According to Beyond Security, Cavallin’s findings were forwarded to Apple last July. The team reported in an update yesterday that a recent inspection of the macOS Sierra 10.13 showed that the vulnerability has been fixed by Apple. There was no […]

US Allies Pressure Spy Agency to Lay Low

US Allies Pressure Spy Agency to Lay Low

The United States’ National Security Agency (NSA), has been pressured by a global team of expert cryptographers to back down two of the data encryption techniques it has been pushing for implementation as industry standards around the world. According to Reuters, the correspondence from industry specialists from countries that included Israel, Germany, and Japan, expressed concern that the NSA was pushing for the new encryption tools primarily because it had the ability to go around it, and not because of its benefits. Simon and Speck, the two NSA data encryption techniques, had been discussed in a number of closed-door meetings […]

SDDC in the Philippines Driven by Changing Customer Needs

SDDC in the Philippines Driven by Changing Customer Needs

Last week, country manager of Data Centre Group, Lenovo Philippines and Indochina Abraham Lim said that his organization is moving to the next generation of infrastructure, the software-defined data centre, which gives them the agility to respond to the growing complexity of their customer’s needs. He added that as the IT requirements of businesses increase, the need to deploy a cloud-like infrastructure becomes more obvious. Han Chon, General Manager of Lenovo Asean also states that with SDDC, the dependency on hardware is eliminated, allowing organizations to scale in a linear manner, without the baggage that needs to be continuously fed […]

New WikiLeaks Release Details Russian Surveillance Apparatus

New WikiLeaks Release Details Russian Surveillance Apparatus

In a move which many say is a deflection of pro-Russia accusations against its founder, a recent release of documents from WikiLeaks claims to detail the surveillance apparatus that the Russian government uses to snoop on mobile and Internet users. Julian Assange is currently facing charges which allege that his organization is a front for Kremlin. The suspicions were reinforced when WikiLeaks released a trove of hacked DNC emails last year. The said documents, mostly in Russian, mentions a company called Peter-Service which has become a major software supplier to the telecoms industry. The company is said to be working […]

Read more about the Data Privacy practice at Disini & Disini Law Office