Covid app’s privacy information ruled not clear enough

Credit to Author: Pieter Arntz| Date: Mon, 28 Feb 2022 21:58:25 +0000

The UK’s data watchdog has issued a reprimand to both the Scottish government and NHS National Services Scotland about their COVID Status app

The post Covid app’s privacy information ruled not clear enough appeared first on Malwarebytes Labs.

Read more

How Microsoft can help reduce insider risk during the Great Reshuffle

Credit to Author: Emma Jones| Date: Mon, 28 Feb 2022 17:00:00 +0000

These are exciting and demanding days for organizations adapting to hybrid work realities, including a wider distributed workforce and more rapid change in employee roles. These dramatic shifts drive business resilience and upside in a world still coping with pandemic disruptions.

The post How Microsoft can help reduce insider risk during the Great Reshuffle appeared first on Microsoft Security Blog.

Read more

How Crisis Text Line crossed the line in the public’s mind: Lock and Code S03E05

Credit to Author: Malwarebytes Labs| Date: Mon, 28 Feb 2022 16:55:48 +0000

This week on Lock and Code, we discuss Crisis Text Line’s data-sharing agreement with its for-profit partner, which has upset many people.

The post How Crisis Text Line crossed the line in the public’s mind: Lock and Code S03E05 appeared first on Malwarebytes Labs.

Read more

In a time of war, it’s important to stay secure

Credit to Author: Susan Bradley| Date: Mon, 28 Feb 2022 06:09:00 -0800

As Russia invaded Ukraine, seeing the disruption in the world occur in near real time on social media brought poignancy to what was happening. While I don’t know anyone in Ukraine, I know many people who have friends or family members that have been impacted by the war. Ukraine has many technology ties around the world. It’s also been a source of cyberattacks, which is why there’s extra concern about what we can do to protect ourselves in case of attack. (Eastern Europe has often been the source of many of the ransomware attacks that occur around the world.)

So what can tech users do to ensure you protect yourself from possible cyberattacks arising from the conflict?

To read this article in full, please click here

Read more