Thursday, August 18, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

‘Right to be Forgotten’: Israel Firm Promises to Purge Digital Footprint

Researcher by Researcher
May 1, 2022
in Cybersecurity
0
High-Severity Flaw in Argo CD is Information Leak Risk
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Three young Israelis formerly serving in military cyber units have figured out how to locate your digital footprint — and give you the tools to delete it.

The company Mine, co-founded by Gal Ringel, Gal Golan and Kobi Nissan, says it uses artificial intelligence to show users where their information is being stored — like whether an online shoe store kept your data after a sneaker purchase three years ago.

Related articles

Spring Framework Flaw Exploited in Mirai Malware Attacks

CISA Warns of Ongoing Exploitation Against Zimbra Flaws

August 18, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Apple Patches New macOS, iOS Zero-Days

August 18, 2022

Ringel said Mine’s technology has already been used by one million people worldwide, with over 10 million “right to be forgotten” requests sent to companies using the firm’s platform.

Mine launched after the European Union’s General Data Protection Regulation (GDPR) — now an international reference point — set out key rights for users, including the deletion of personal data that was shared with a site for a limited purpose.

The company’s AI technology scans the subject lines of users’ emails and flags where data is being stored.

Individuals can then decide which information they want deleted and use Mine’s email template to execute their right to be forgotten.

It means they can delete their digital footprint “with a click of a button”, Ringel said.

“We’re not telling people to not use Facebook or Google. We say: go ahead, enjoy, use whatever you want,” he said. 

“But as you enjoy using the internet, we’ll show you who knows what about you, what they know about you… what is the risk” and how to remove it, he added. 

– ‘Challenging’ –

Last year, hackers broke into the database of Atraf, an Israeli LGBTQ dating website, using the personal information there for extortion.

The year before, Shirbit, a major insurance company, was hacked and troves of data stolen.

Despite those and smaller breaches, Naama Matarasso Karpel from advocacy group Privacy Israel said the public was relatively indifferent.

She also criticised Israel’s privacy legislation as inadequate for tackling today’s online challenges.

“Privacy is a bit like health or air — we don’t really feel the need for it until we really see how much we lack it,” she said.

While public awareness on privacy rights has been slow on the uptake, she said many corporations were realising that better privacy practices made for good business.

“Nobody wants to be caught off-guard,” Matarasso Karpel said.

Companies are starting to see privacy “as a value that has to be maintained in order to establish trust with customers”, she added.

Mine’s co-founder Ringel said companies had contacted his firm for help with the “challenging and cumbersome” process of locating and removing information, in line with the right to be forgotten.

“We help companies to automate that process without any human involvement,” he said, reducing their efforts and costs.

But lawyer Omer Tene, co-founder of the Israel Tech Policy Institute, cautioned that deleting specific individual requests was “a complicated technical exercise”.

Some companies and organisations cannot legally delete information like blockchains or records of financial interactions needed for tax purposes.

Even information that can be deleted is often kept in varying degrees of identifiability, Tene said. 

“All of this nuance makes it difficult to deliver on a promise from both the consumer side and the corporate side, to enable deletion by pressing a button,” Tene warned.

Read: US, EU Sign Data Transfer Deal to Ease Privacy Concerns

view counter

© AFP 2022

Tags:



Source link

Tags: DigitalFirmFootprintForgottenIsraelpromisesPurge
Share76Tweet47

Related Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

CISA Warns of Ongoing Exploitation Against Zimbra Flaws

August 18, 2022
0

Attackers are exploiting multiple, previously disclosed flaws that impact Zimbra’s enterprise collaboration software and email platform, warned the Cybersecurity and...

High-Severity Flaw in Argo CD is Information Leak Risk

Apple Patches New macOS, iOS Zero-Days

August 18, 2022
0

Apple on Wednesday rolled out emergency patches for a pair of already exploited zero-day vulnerabilities in its flagship macOS and...

Seaborgium targets sensitive industries in several countries

Seaborgium targets sensitive industries in several countries

August 17, 2022
0

Image: Adobe Stock New research from Microsoft Threat Intelligence Center (MSTIC) sheds light on a cyberespionage threat actor known as...

DEF CON – “don’t worry, the elections are safe” edition

DEF CON – “don’t worry, the elections are safe” edition

August 17, 2022
0

Don’t worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference. Scattered...

Azure Developers Targeted By Malicious NPM Packages

RubyGems Requires MFA for Popular Projects

August 17, 2022
0

RubyGems, the popular community site for hosting Ruby projects, is now requiring the maintainers of the most popular projects to...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 18/08

August 18, 2022
Spring Framework Flaw Exploited in Mirai Malware Attacks

CISA Warns of Ongoing Exploitation Against Zimbra Flaws

August 18, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Apple Patches New macOS, iOS Zero-Days

August 18, 2022
How Can Crypto and CBDCs Help Communities?

How Can Crypto and CBDCs Help Communities?

August 18, 2022

Recent Posts

This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 18/08

August 18, 2022
Spring Framework Flaw Exploited in Mirai Malware Attacks

CISA Warns of Ongoing Exploitation Against Zimbra Flaws

August 18, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Apple Patches New macOS, iOS Zero-Days

August 18, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly breach bug Cisco critical Cyber Cybersecurity Data devices Digital financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open patches Payments phishing platform Ransomware RoundUp security Software TFT Threat vulnerability warns Week Windows

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved