Google heads to European court to fight ‘right to be forgotten’ rule

Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someonePrint this page

Europe’s “right to be for­got­ten” rul­ing, which allows pri­vate cit­i­zens in the region to make requests that search engines delist incor­rect, irrel­e­vant or out of date infor­ma­tion returned by an online search for their full name, is set to return to the region’s top court to set­tle an ongo­ing dis­pute between Google and the French data pro­tec­tion agency, CNIL. The lat­ter has pushed for Google to make these delist­ings apply glob­al­ly, across all web domains, rather than geo-lim­it­ing delist­ings to the person’s home ter­ri­to­ry (as Google prefers to)—arguing that for Google not to do this offers a triv­ial workaround to a rule that’s intend­ed to pre­serve European’s pri­va­cy rights. Google filed an appeal against the CNIL’s order for glob­al delist­ing in May last year, fol­low­ing a fine of €100,000 ($115,000) hand­ed to it by the reg­u­la­tor for non­com­pli­ance. Source: Tech Crunch

Atlanta clinic discovers data breach while looking into ransomware case

Peachtree Neu­ro­log­i­cal Clin­ic in Atlanta dis­cov­ered a 15-month breach in the process of inves­ti­gat­ing a recent ran­somware inci­dent. Its elec­tron­ic health record sys­tem was encrypt­ed by the virus. Instead of pay­ing the ran­somware, offi­cials were able to restore the files and func­tion­al­i­ty from back­up records. Source: Health­care IT News

Ashley Madison parent to pay $11.2 million to settle suits in U.S.

The own­er of the Ash­ley Madi­son web­site will pay $11.2 mil­lion to set­tle U.S. lit­i­ga­tion brought on behalf of rough­ly 37 mil­lion users whose per­son­al details were exposed in a July 2015 data breach. Ruby Corp, for­mer­ly known as Avid Life Media, denied wrong­do­ing in agree­ing to the pre­lim­i­nary class-action set­tle­ment, which requires approval by a fed­er­al judge. Source: CNBC

U.S. cybersecurity coordination office could soon close

Sec­re­tary of State Rex Tiller­son plans to close an office that coor­di­nates with oth­er coun­tries on cyber­se­cu­ri­ty and fold it into a bureau focused on eco­nom­ic issues. The move would shut­ter the Office of the Coor­di­na­tor for Cyber Issues, which opened in 2011. Source: The Hill

Hacker takes control of Segway scooter 

A researcher was able to hack into a Seg­way scoot­er and oper­ate it. The Seg­way MiniPro app uses Blue­tooth to con­nect to the scoot­er, allow­ing users to con­trol the device from phones, turn it off, and update the scooter’s firmware. But researcher Thomas Kil­bride found that the PIN meant to pro­tect the Blue­tooth com­mu­ni­ca­tion from unau­tho­rized access wasn’t being used for authen­ti­ca­tion at every lev­el. This, Kil­bride says, allows oth­ers to send com­mands to the scoot­er with­out the PIN. Source: The Con­sumerist

Democratic committee turns to encryption software to fight hacks 

The Demo­c­ra­t­ic Con­gres­sion­al Cam­paign Com­mit­tee, the tar­get of a cyber attack on House Democ­rats, has tran­si­tioned to Wickr, an end-to-end encrypt­ed soft­ware, for all inter­nal com­mu­ni­ca­tion and for com­mu­ni­ca­tion between the DCCC and the 20 most vul­ner­a­ble House incum­bent cam­paigns. The soft­ware serves as the pri­ma­ry chat and mes­sage func­tion inside the DCCC. Source: Buz­zFeed

Bad guys hack into Teslas, steal nine of high-end cars

Thieves have found a way to hack into and steal Tes­las unde­tect­ed by cir­cum­vent­ing the vehicle’s GPS track­ing sys­tem. They may have stolen as many as nine Tes­las with­in a week. Last Sep­tem­ber, a Chi­nese secu­ri­ty firm dis­cov­ered mul­ti­ple secu­ri­ty vul­ner­a­bil­i­ties that allowed them to manip­u­late var­i­ous com­po­nents of the car. Tes­la has since patched the flaw. Source: SC mag­a­zine

Internet of Things devices share a common vulnerability

Mil­lions of net-con­nect­ed devices around the world can be hacked due to a com­mon flaw. Researchers have found that secu­ri­ty cam­eras using an open-source code called gSOAP could be eas­i­ly hacked and that attack­ers can send com­mands remote­ly. This allowed researchers at Sen­rio to take over a video feed, pause the record­ing and turn the cam­era off. Researchers named the zero-day exploit “Devil’s Ivy.” Source: CNet

Hacker claims to have State Department official’s email

A hack­er going by the name of “John­nie Walk­er” sent a group email to an unknown num­ber of recip­i­ents claim­ing to have emails from the pri­vate account of a U.S. intel­li­gence offi­cial. “The U.S. State Depart­ment officer’s email has been hacked,” the email announced, and includ­ed at least two years’ worth of per­son­al emails from the pri­vate gmail account of a State Depart­ment offi­cial work­ing in the intel­li­gence arm of the State Depart­ment focus­ing on Rus­sia. Source: Chica­go Tri­bune

Hacker halts startup’s effort to go public

An ini­tial coin offer­ing (ICO) for start­up Coin­Dash was abrupt­ly halt­ed when it was revealed the sale had been com­pro­mised short­ly after it began. In total, the ICO was able to raise $7.53 mil­lion before the ethereum address it was using to solic­it funds was altered to a fake one by an uniden­ti­fied hack­er, result­ing in the ether going to anoth­er source. Source: Coin­Desk

Actor’s Twitter account taken over; hacker ‘shares’ a personal secret

Super­nat­ur­al actor Jared Padalecki’s Twit­ter account was hacked, send­ing a mes­sage, since delet­ed, say­ing: “I don’t mind hav­ing a small penis.” His Super­nat­ur­al part­ners in crime were quick to jump on the tweet, with Jensen Ack­les say­ing, “Shar­ing with your friends is one thing … shar­ing with the world is anoth­er. Lock it up, dude.” Source: TV Guide