Will The GDPR Frustrate Europe’s Plans For AI?

The EU plans to become the most attractive, secure and dynamic data-agile economy in the world. The Commission’s new digital strategy includes an ambition for the EU to seize new opportunities in digitised industry and business-to-business artificial intelligence (AI) applications. However, the vital question of whether GDPR is an obstacle to the EU’s plans to […]
Industry Leader Reaction To Princess Cruises Admits Data Breach

It has been reported that Princess Cruises, the cruise liner forced to halt its global operations after two of its ships confirmed on-board outbreaks of Coronavirus, has now confirmed a data breach. The notice posted on its website, believed to have been posted in early March, said the company detected unauthorised access to a number of its email accounts […]
Coronavirus Cash Handling Scare: Virus Lives On Paper; Spike in Mobile Payments & Fraud Risk – Expert Advise

As research today shows the Coronavirus can survive on paper-based surfaces for up to 24hrs, fear of handling cash is tangible amongst consumers due to Coronavirus, and until the Federal Reserve and Treasury Department issue an official statement about the safety of paper currency, many consumers are moving towards mobile payment platforms. But attackers are catching on […]
Security Expert On IMDA Plans To Introduce Rules For Safer Experience Of IoT Devices

The Infocomm Media Development Authority (IMDA) have announced their plans to introduce requirements that provide a safer experience for users of IoT devices in their homes. The new rules proposed state that home routers need to meet requirements that include stronger password administration in order to prevent hackers stealing personal information. The IMDA and the […]
100K Sites Affected By Vulnerabilities Patched In Popup Builder Plugin – Exper Insight

On March 4, researchers discovered several vulnerabilities in Popup Builder, a WordPress plugin installed on over 100,000 sites, including one that allowed an unauthenticated attacker to inject malicious JavaScript into any published popup, which would then be executed whenever the popup loaded. The other vulnerability allowed any logged-in user, even those with minimal permissions such as a subscriber, […]