Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk //

Compliance

7/22/2019
10:00 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

6 Actions That Made GDPR Real in 2019

In the wake of recent fines levied against British Airways, Marriott, and Facebook, companies are starting to take data privacy and security more seriously.
7 of 7

6. US FTC Reportedly Settles with Facebook for $5B over Cambridge Analytica Scandal

The Federal Trade Commission (FTC) and Facebook reached a settlement about 10 days ago over the Cambridge Analytica privacy scandal that occurred during the 2016 presidential election, according to reports in The Wall Street Journal and other news sites. The $5 billion fine ranks as the largest against a tech company in FTC history considerably larger than the $22.5 million hit Google with in 2012, also for issues with privacy practices.

"Facebook has a much larger challenge with data-sharing practices, including accounting for what data is collected, why is it collected, and who it is sold to," says Steve Schlarman, GRC strategist at RSA. "This is different and much more complex than a vulnerability on a commerce website for example, how the British Airways breach seems to have occurred. Facebook's challenges extend into their data-sharing ecosystem, which we saw with the Cambridge Analytica scenario, a third-party cyber-risk."

The FTC approved the fine along party lines, with three Republicans voting "yes" and two Democrats voting "no." Congressmen from both sides of the aisle said the fine was a "slap on the wrist," calling instead for more structural reform. Analysts pointed out that the $5 billion fine was one month's net income for Facebook, more money than most companies will ever see.

Dark Reading reported the news on July 15.

Image Source: Adobe Stock: Scott Maxwell

7 of 7
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/1/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8109
PUBLISHED: 2020-10-01
A vulnerability has been discovered in the ace.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. This can result in denial-of-service. This issue affects: Bitdefender Engines version 7.84892 and prior vers...
CVE-2019-20902
PUBLISHED: 2020-10-01
Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1.
CVE-2019-20903
PUBLISHED: 2020-10-01
The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.
CVE-2020-25288
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
CVE-2020-25781
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.