• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

New Cybersecurity Companies Have Their Heads In The Cloud

October 1, 2019 by Percy Jacob Rwandarugali 1 Comment

Privacy has become a big deal. Government regulators are moving to squash indiscretions and protect consumers while preserving constitutional liberties … a tall task.The Federal Trade Commission recently announced wide-ranging monetary settlements with Facebook  and Equifax to resolve ongoing investigations.Facebook will pay $5 billion for its part in the Cambridge Analytica data scandal. State attorneys general asserted that lax standards at the social media giant allowed political operatives to weaponize fake news accounts and influence the 2016 presidential election.

 

https://myaccount.google.com/privacycheckup?utm_source=paid-media&utm_medium=1043393&utm_campaign=P-S-campaign&utm_content=441554961&dclid=COrf4peX–QCFdVDNwodG64KKg&pli=1

Filed Under: Week 05: Metasploit Tagged With:

Reader Interactions

Comments

  1. Imran Jordan Kharabsheh says

    October 3, 2019 at 6:10 am

    Hello Percy,
    As I was reading through your post and the article, I began to feel sympathy towards the difficult job of government regulators who fight to protect the liberties of consumers such as ourselves. The $5 billion dollar fine that Facebook ultimately ended up getting will resonate and provide precedent for future FTC transgressions in regards to privacy breaches. Thanks for following up with these stories, since I was curious how they would incentivise organizations to put in place better controls.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in