I’ve had enough. Actually, I’ve had more than enough. I should have written this post months ago. Last week I received notice from Twitter Legal that they had been served with a grand jury subpoena for my account information. Also listed in the grand jury subpoena were four other Twitter accounts, only one of which…
Category: Commentaries and Analyses
DOJ Subpoenas Twitter About Popehat, Dissent Doe And Others Over A Smiley Emoji Tweet
Over on TechDirt, Mike Masnick had the patience to write up and report on some of what I should have written up already, but hadn’t. Read Mike’s report on how I and others wound up as the targets of a grand jury subpoena on TechDirt. And if you read carefully, you’ll see that I wound…
WP29 guidelines on personal data breach notification under GDPR
Anita Anand of Allen & Overy writes: The Article 29 Working Party this week published draft Guidelines on personal data breach notificationunder GDPR. The relevant GDPR provisions are often misrepresented, and in many respects leave matters open to interpretation – a good or bad thing depending on the day. Many are now asking what further…
Watch out, Aadhar biometrics are an easy target for hackers
Ankush Johar writes, in part: The government claimed that Aadhaar is completely secure, and the data of the consumers was absolutely safe from any malicious party until a severe flaw was detected in the system. The bug allowed a malicious operator to save a user’s biometrics and simply use it to carry out transactions on…
Computer hacking victims to receive up to £6,000 compensation for ‘distress’ caused by cyber crime, under new plans
Not the most technical/legal explanation of the new EU regs, but this Daily Mail piece by Ben Ellery does convey some of what is concerning businesses: Computer hacking victims will be able to claim thousands of pounds in compensation under new laws – even if they do not lose any money. The ‘distress’ they suffer…
Kromtech Security Center Releases Tool to Identify and Prevent Data Leaks for Amazon S3 Users
Since 2015, this site has been reporting on data leaks due to misconfigured databases or devices that are indexed on shodan.io or other specialized search engines. Many of the leaks I have reported on involve AWS S3 buckets. And despite the fact that Amazon has issued reminders and guidance to its customers about securing buckets,…