{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
The FTC takes legal action against a data broker for revealing personal information that could expose visits to abortion clinics. Sneaky crypto mining software hides behind a Google Translate app. And federal agency leaders discuss zero trust challenges. This is CyberScoop for Aug. 29.

Data broker in FTC crosshairs over reproductive privacy

The Federal Trade Commission filed a lawsuit Monday against data broker Kochava, alleging the company sold geolocation information from hundreds of millions of mobile devices — often without user permission — that could reveal individual’s sensitive behaviors, including visits to reproductive health clinics. “Where consumers seek out health care, receive counseling, or celebrate their faith is private information that shouldn’t be sold to the highest bidder,” Samuel Levine, director of the FTC’s Bureau of Consumer Protection, said in a statement. “The FTC is taking Kochava to court to protect people’s privacy and halt the sale of their sensitive geolocation information.” The lawsuit demonstrates how the agency has responded to a July request from the Biden administration to use its authorities to protect reproductive privacy. Tonya Riley reports.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Crypto miner hides behind Google Translate

A Turkish-speaking entity was running a crypto miner hidden within a Google Translate desktop application, researchers with cybersecurity firm Check Point revealed Monday. The campaign, dubbed "Nitrokod," ran crypto mining software through a Google Translation desktop application designed in such a way to evade checks and attempt to delete evidence of its activity. The malware was found on thousands of victim machines globally, the researchers said. Read the research.

The zero trust marathon at HHS

The Department of Health and Human Services is still figuring out how to implement zero-trust security across its divisions’ many applications, according to the executive director for app and platform solutions. Speaking at FedTalks presented by FedScoop last week, George Chambers said the department continues to work on making information on who’s accessing its network, using what equipment, from what location actionable across apps to enable continuous monitoring. HHS spent the last 15 to 20 years building walls between its various infrastructures it must now dissolve, all while responding to a global pandemic. The department requires zero-trust technologies from multiple vendors to meet its needs. Dave Nyczepir writes in FedScoop.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}