Optus, Australia’s second-largest telecommunications company, reportedly sustained a cyberattack, BBC News reports. Information stolen included personally identifiable information. The company announced it would notify customers if they are at “heightened” risk of their information being stolen. However, customer payment information was not compromised.
Full Story
shareShare This
Related Stories
Microsoft adds AI to search engine, web browser
Microsoft unveiled a new Bing search engine and Edge web browser that offer artificial intelligence chatbots, The New York Times reports. The new Bing version was released to a limited number of users and will expand to millions by the end of the month. "This technology will reshape pretty much ev...
Kirk Nahra embraces privacy ‘opportunity;’ mentors young professionals
When Kirk Nahra, CIPP/US, talks about his career, the WilmerHale partner and Cybersecurity Privacy Practice co-chair doesn’t give the impression that he is a leading voice on privacy and cybersecurity matters in the U.S. Undoubtedly, however, Nahra is a go-to resource on topics like data security an...
IAPP launches page on AI
The IAPP is tracking the latest developments around artificial intelligence in its Resource Center. The page contains articles, resources and white papers that cover the ethical considerations when AI is used, regulation to tackle the technology and where it intersects with privacy. It also highligh...
Roundup: Canada, EU, US and more
In this week’s Global News Roundup, the European Commission launched a new General Data Protection Regulation enforcement review plan. The U.S. Department of Health and Human Services’ Office for Civil Rights entered a settlement with a health care provider for a patient privacy rights violation. An...
Takeaways from Ohio court ruling on ransomware and insurance exclusions
In Emoi Services LLC v. Owners Insurance Company, the Ohio Supreme Court recently found software is an intangible item that cannot experience direct physical loss or damage and, therefore, the plaintiff’s inability to access or use its software during a ransomware attack was outside the scope of its...
Comments
If you want to comment on this post, you need to login.