Privacy Commissioner issues statement about BASH/Shellshock/Bourne Again vulnerabilities and need to protect IT systems

September 30, 2014

The Privacy Commissioner has today issued a statement about the Bourne Again Shell (BASH) vulnerability that has caused more than a few waves within the IT community in the last week or so.  The statement Read the rest of this entry »

Shellshock flaw and obligations under the Privacy Act

The Shellshock flaw has sent more than a ripple through the IT industry. There is a data protection regulation issue involved as well.  The genesis of the problem is a flaw in longstanding software, Bash, which was first installed in 1989.  Given the software enables users to issue commands to computers an exploitable weakness is of particular concern.  Exploitable flaws in ubiquitous software which is now part of the structure of many operating systems pose immediate cyber security threats and require immediate response when detected.  The Age in  Shellshock: The latest security superbug explained provides an exellent explanation.  In addition there has been coverage at Shellshock flaw ‘intertwined’ with modern internet, may affect some Mac usersShellshock: How to protect your Unix, Linux and Mac servers,  Shellshock makes Heartbleed look insignificant and Shellshock flaw ‘intertwined’ with modern internet, may affect some Mac users.

The seriousness of the threat has prompted the Information Commissioner’s Office in the United Kingdom to issue a release under the heading ICO highlights need to apply security updates after Shellshock flaw discovered which provides:

The Information Commissioner’s Office is urging organisations and individuals to make sure that their IT systems are up-to-date.

The warning comes after the identification of a flaw, referred to by the researchers who discovered it as Shellshock, which has been found in a software component called Bash. Bash is a part of many Linux systems, as well as the OS X operating system used by Apple Macs. The flaw potentially allows any computer with the vulnerability to be taken control of remotely. Read the rest of this entry »

Drones go showbiz and an article on drones and privacy

September 26, 2014

Two articles, Cirque du Soleil Is Incorporating Drones and Filmmakers Get Permission to Use Drones in the U.S. highlight how ubiquitous drones are becoming; becoming part of a show and another way to get that perfect angle for a movie.

An article in the Smithsonian titled The Invention of the “Snapshot” Changed the Way We Viewed the World draws the comparison of the onset of drones and their privacy intrusive capabilities with the invention of Kodak’s personal camera.  It is a very useful historical comparison between the advent of an early valuable piece of technology which had an impact on privacy and the latest development.  The rapid take up of Read the rest of this entry »

ACMA finds Channel Nine Queensland breached privacy and accuracy guidelines

September 25, 2014

ACMA announced that Channel Nine breached the factual accuracy and privacy clauses of the Commercial Television Code of Practice.

The media announcement

The announcement provides Read the rest of this entry »

Home Depot confirms massive data breach with potential unauthorised access of credit card details of to 56 million customers

September 24, 2014

Home Depot’s announcement of a massive data breach highlights the need for proper data security. The announcment Read the rest of this entry »

Google funding to Stanford is tied to not doing privacy research

Pro publica in Stanford Promises Not to Use Google Money for Privacy Research  reports on Google providing funding to Stanford University’s Centre for Internet and Security provided that it does not use it to undertake privacy research.  Tied grants are usually Read the rest of this entry »

Rise in drone usage prompts privacy calls

RINF in Drone Nation: 300 companies and public bodies using arial surveillance tech (not my spelling of aerial)  and the Independent in Drones are filling Britain’s skies: Look up now to see what is looking back down at youreports on the soaring, pun intended, use of drones in British skys and the consequential call for greater privacy protections.  The reportage is consistent with earlier reports and articles, that the increasing affordability of drones and their constantly improving ability to remain aloft for longer and longer and perform more and more functions make them a valuable tool for many businesses and governmental authorities. The problem has always been the inability of government to set out coherent and enforceable regulations to allow their use but also protect competing interests and rights of others.  Clearly privacy is Read the rest of this entry »

Advertising and surveillance

September 22, 2014

The Economist has taken an interest in privacy issues for some time now.  Its latest offering focuses on adversting and its use of cyber tracking devices, such as cookies and surveillance tools such as beacons in Stalkers, Inc.  It further covers the issue in Little Brother.  The USA privacy landscape is looser than in Australia and the polar opposite to that which exists in Europe.  The key exposure for Read the rest of this entry »

More data breaches of celebrity photos

The media has spilt several barrels of ink over the  the unauthorised access of nude and otherwise compromising photographs of various celebrities in icloud, notably Jennifer Lawrence, with Nude photos of Jennifer Lawrence and other celebs posted by hacker  and Jennifer Lawrence nude photo backlash: online community slams privacy breach withthe cybersecurity consequences in Celebrity nude photo theft: How to make sure your phone’s photos stay secure and Andrew Hornery: Jennifer Lawrence pics aren’t the scandal, lack of iCloud security is just to name a few articles. After short pause there is another reported breach of cyber security of Read the rest of this entry »

Privacy, Victorian government agenices and notification about data breaches

September 19, 2014

There are no mandatory data breach notification laws in any jurisdiction in Australia. In that regard Australia lags the USA where 47 o f the 50 states have such laws.  A voluntary system of notification results in patchy notification, often after or in anticipation of negative publicity. The Age in Government agency leaks customer details without telling reports on the reluctance on a yet unknown government agency to notify the less than 50 customers whose personal information, which included their full names, addresses and sums on their bills, was leaked through a Bpay View system.  The agency Read the rest of this entry »