By Jason Cheung on April 2, 2019 | Tagged with corporate responsibility, Data, data abuse, Data Protection, data regulation, data security, Hacking, information fiduciary, private data
In this two-part blog post, we will look at: What is an ‘information fiduciary’? What you should do when an information fiduciary you trust gets hacked? Are there adequate legal repercussions for losing customer data to hackers? Ways to assess the strength of a potential information fiduciary before doing business and creating an account What […]
Read More | No Comments
By Jason Cheung on April 2, 2019 | Tagged with anti-virus, Government Surveillance, Hacking, malware, privacy, smartphone, spyware, surreptitious, surveillance
A report by Vice News [1] published last week points to a report made by the cybersecurity group Security Without Borders [2] about Android malware that disguises itself as innocuous apps on Google’s Play Store. While disguising malicious software as harmless applications is not a technique that is new [3], the article published by Vice […]
Read More | No Comments
People said…