Automatic License Plate Readers Are Coming to Schools
Fears around children is opening up a new market for automatic license place readers.
More results...
Fears around children is opening up a new market for automatic license place readers.
A cyberattack on Bouygues Telecom exposed data for 6.4 million customers. Find out what information was compromised and…
ICO cookie compliance crackdown Earlier this year, the ICO (Information Commissioner’s Office) announced its intention to tackle cookie compliance across the UK’s top 1,000 websites. We were subsequently contacted by a company that operates one of those websites and which the ICO had contacted about its cookie compliance. The ICO gave the company two weeks’ notice to rectify its cookie compliance before reviewing the site and, if necessary, taking action. So, we performed a cookie compliance assessment on the website to help the company ensure its compliance ahead of the ICO’s review. Our recent webinar Cookie Law in 2025: What
The post Data Protection Enforcement: Your Cookie Compliance Questions Answered appeared first on IT Governance Blog.
Florida firm IMDataCenter exposed 38GB of sensitive data including names, emails and ownership info. At least one hacker accessed and downloaded the files.
KLM confirms a data breach exposing customer info via a third-party system, affecting names, contact details and Flying Blue membership data.
Pandora cyber attack exposes customer data via third-party breach. No passwords or payment info leaked, but phishing risks remain.
Skechers is making a line of kid’s shoes with a hidden compartment for an AirTag.
Security researchers at Bitdefender have found two critical vulnerabilities (CVE-2025-31700, CVE-2025-31701) in popular Dahua security cameras, including the Hero C1 model.
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Choicejacking is a new USB attack that tricks phones into sharing data at public charging stations, bypassing security prompts in milliseconds.