Legal cases and privacy rulings aim to curtail facial biometics.

Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.

Accessed on 02 December 2021, 1044 UTC.

Content provided by email subscription to “Dark Reading Daily.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGllCnlHCqgWZCXqxKKMdKPZXvV

Please click link or scroll down to read your selections.

Dark Reading Daily darkreading@nw.nwsltechwebresources.com Unsubscribe

Dec 1, 2021, 4:13 AM (20 hours ago)
 
to me
 
 
 
 
 
 
 
Follow Dark Reading:
 December 01, 2021
LATEST SECURITY NEWS & COMMENTARY
Legal Cases and Privacy Rulings Aim to Curtail Facial Biometrics
Decisions in the UK and Australia, and lawsuits in the United States, could force facial-recognition providers to remove data from their machine-learning models.
HP Issues Firmware Updates for Printer Product Vulnerabilities
More than 150 HP printer models have bugs that could enable attackers to steal data and gain an initial foothold on enterprise networks.
Government-Industry Cooperation May Be the Most Potent Ransomware Antidote
The side that’s better at collaborating with allies will have the upper hand, and until now, that distinction has gone to the cybercriminals.
Finding Your Niche in Cybersecurity
With a little patience and research, you can discover a role you love that also protects those around you.
Attacker Sentenced in Multimillion-Dollar SIM Hijacking Scheme
A sixth member of international hacking group The Community was sentenced to 10 months in prison and ordered to pay $121,549.37 in restitution.

MORE NEWS / MORE COMMENTARY

 
HOT TOPICS
 
In Appreciation: Dark Reading’s Tim Wilson
Dark Reading co-founder and editor-in-chief Tim Wilson passed away on Nov. 23.
Phishing Remains the Most Common Cause of Data Breaches, Survey Says
Despite heightened concerns over ransomware, fewer organizations in a Dark Reading survey reported being an actual victim of a ransomware attack over the past year.
Paving the Road to Zero Trust With Adaptive Authentication
A gradual transition to a world beyond passwords predisposes zero-trust projects to success.

MORE

EDITORS’ CHOICE

Over 1,000 Individuals Arrested in Global Cybercrime-Fighting Operation
HAECHI-II initiative represents Interpol’s stepped-up efforts to tackle the operators of financially motivated online scams and other cyberattacks.
LATEST FROM THE EDGE

What’s the Difference Between SASE and SD-WAN?
While SD-WAN is a key part of a hybrid workplace and multicloud operation, it should be treated as a stepping stone to SASE, not an alternative.
LATEST FROM DR TECHNOLOGY

Digitally Transforming Trusted Transactions Through Biometrics, ML & AI

The pandemic has increased the appetite for e-commerce and contactless payments, and biometrics and artificial intelligence are playing a larger role in securing those transactions.

Tech Resources
ACCESS TECH LIBRARY NOW
 
  • Cybersecurity Outlook 2022 Virtual Event

    Join Omdia, Black Hat and Dark Reading at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year. On December 8, Cybersecurity Outlook 2022 will look at some of the new threats …

  • Preventing Attackers from Navigating Your Enterprise Systems

    Over the past few years, cyber attackers have favored exploits in which they steal a legitimate user’s credentials and then navigate enterprise defenses as a trusted end user. This “lateral movement” enables the attacker to quickly gain access to a …

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
 
 
CURRENT ISSUE
How Data Breaches Affect the Enterprise
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
 
 
 
PRODUCTS & RELEASES

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.

Russ Roberts

https://cyber-security-intelligence.org