Week of July 08, 2016


Week of July 08, 2016

Korean Government Releases Guidelines For De-Identification Of Personal Information

  • South Korean government agencies promulgated the Guidelines for DeIdentification of Personal Information (the “Guidelines”)
  • The Guidelines set out standards and procedures for the proper de-identification of personal information, particularly in order to reduce any uncertainties involved in the utilization of big data.
  • The Guidelines are expected to positively impact the use of big data by various industries including the IT, finance, and medical industries, as the use of deidentified personal information is now clearly allowed without any consent.
  • These Guidelines are expected to promote further development of the big-data industry in Korea by dispelling legal uncertainties.
  • It is important to comply with the Guidelines, as a breach—especially reidentification of de-identified data and provision of such data to others — may constitute a violation of the relevant personal-information protection laws which may result in up to 5 years in jail and a maximum fine of KRW 50 million.

Source: Lexology, July 6, 2016

E.U. Plans $2 Billion Investment In Cybersecurity Research

  • The European Union is stumping up $500 million to fund research into cybersecurity and wants industry to contribute three times that.
  • The European Commission is concerned about the vulnerability of the EU economy to cyberattacks.
  • The $2 billion cybersecurity public-private partnership (cPPP) is intended boost cross-border research into cybersecurity.
  • The Commission is also working on the Network and Information Security Directive, which will require EU member states to identify essential infrastructure operators and ensure that they address the risk of cyberattack.
  • The cPPP should be up and running by the third quarter, and accepting bids for its research funding early next year.

Source: PC World, July 5, 2016

Hacker Took Down Wiki-Leaks

  • The hacker group called OurMine that previously broke into the social accounts of tech heavyweights like the Google CEO, Facebook founder, and Uber CEO, has now taken down the Wikileaks site.
  • The reason cited was a spat with the global hacker group Anonymous.
  • In December, OurMine took down Wikileaks with a Distributed Denial of Service attack (DDoS) and Anonymous responded by asking OurMine to stop compromising the Wikileaks site and publishing personal information about OurMine members.
  • More than half a year later, OurMine took down Wikileaks once again with e DDoS attack, claiming one of Anonymous’ account holders is abusing the group.
  • It’s worth nothing that there are various ways of carrying out a DDoS attack and it isn’t always easy to mitigate them as soon as they occur, but it appears that Wikileaks is now back online.

Source: The Nextweb, July 4, 2016

Fighting Hackers From The Future

  • For years, experts have recommended using secure browser communications (the URL in the address bar starts with “https://”).
  • That encryption has a potential weakness according to Google.
  • If quantum computers get sufficiently powerful in the future, they could be used to break TLS, the cryptographic protocol that’s one of the foundations of HTTPS.
  • Google is addressing the problem today by testing a post-quantum key exchange algorithm in Chrome, which should ideally protect from such future attempts.
  • The algorithm is called New Hope and Google is using it on top of the existing crypto algorithm, in case New Hope turns out to be breakable with today’s computers.
  • The post-quantum algorithm protects you from hackers form the future, but it might be vulnerable against today’s machines.
  • The elliptic curve algorithm Google is normally using might be worthless against future’s quantum computers, but it’s the best option against the computers of today.

Source: Mashable, July 8, 2016

Get in Touch With Us!

Are you interested in receiving more information about our products? Do you have questions about sensitive data security? Would you like a demo? Complete the details below and one of our specialists will get in touch with you.

We love to help our customers solve their data security problems. Please tell us about what you are trying to accomplish, details about your environment, and any other information that will help us understand your needs better.

scroll top