Privacy

The European Commission is contemplating labels for Internet connected devices that inform consumers about their security and privacy practices.

European Commission Ponders Security Labels for IoT | EurActiv.com

The web site EurActiv.com is reporting that the European Commission (EC) is getting ready to propose new legislation to protect machines from cybersecurity breaches. Among the steps they’re considering: labels for Internet-connected devices that tell consumers they are “approved and secure.” Products across industries from energy and consumer goods to automotive and healthcare could eventually be required to use the labels on their products, just as electrical devices currently contain labels that inform consumers how much power they use, EU officials said. Digital policy chiefs Günther Oettinger and Andrus Ansip presented a plan three weeks ago to speed up internet connections to meet the needs of big industries like car manufacturing and agriculture as they gradually use more internet functions. But lawmakers recognize that the transition to more and faster internet connections has caused many companies to worry that new products and industrial tools that rely on the internet will be more vulnerable […]

Breaches Without Borders: New Data Protection Laws Cast A Wide Net

Breaches Without Borders: New Data Protection Laws Cast A Wide Net

In-brief: Like it or not, U.S. companies will be expected to comply with strict new European breach notification laws. The good news: responding to breaches in this new regulatory environment just takes a little preparation, says Michael Bruemmer of Experian. 

Reuters reported on a secret program at Yahoo to scan email messages for content of interest to the National Security Agency.

Exclusive: Yahoo Secretly Scanned Customer Emails for NSA | Reuters

In-brief: Yahoo created a special program to scan through hundreds of millions of Yahoo Mail accounts for certain keywords at the behest of the U.S. government, Reuters reports. 

Physicians and other clinical staff routinely ignore or circumvent security measures, a study found.

Study finds Password Misuse in Hospitals a Steaming Hot Mess

In-brief: efforts by clinical staff to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff, according to a new report. 

A flaw in the way Google's Android verifies mobile applications opens the door to widespread attacks, according to researchers from Bluebox Security.

Smart TV + Rogue App = Surveillance Device

In-brief: researchers have demonstrated how a snooping Android application can turn an Android based smart television set into an omnibus surveillance device. Get ready for more IoT misappropriations like this.