IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, www.infosecurity-magazine.com

South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence

2025-08-19 11:08

South Yorkshire Police have been reprimanded by the ICO after deleting 96,000 pieces of evidence from officers’ bodycams

This article has been indexed from www.infosecurity-magazine.com

Read the original article:

South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence

Tags: EN www.infosecurity-magazine.com

Post navigation

← Analyzing evolution of the PipeMagic malware
The Hidden Risks of External AI Models and How Businesses can Mitigate Them →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • Weaponized Copyright Documents Used by Threat Actors to Target Key Employees with Noodlophile Stealer August 19, 2025
  • This new C-suite role is more important than ever in the AI era – here’s why August 19, 2025
  • The best Apple TV VPNs of 2025: Expert tested and reviewed August 19, 2025
  • iPhone users may finally be able to send encrypted texts to Android friends with iOS 26 August 19, 2025
  • I tested Sony’s new premium gaming headphones, and can’t go back to boring audio August 19, 2025
  • Workday Hit by Social Engineering Attack, Third-Party Data Exposed August 19, 2025
  • North Korean Kimsuky Hackers Leveraged GitHub to Attack Foreign Embassies with XenoRAT Malware August 19, 2025
  • MCDonald’s Free Nuggets Hack Leads to Expose of Confidential Data August 19, 2025
  • Threat Actors Attacking Organizations Key Employees With Weaponized Copyright Documents to Deliver Noodlophile Stealer August 19, 2025
  • Microsoft Defender AI to Uncover Plain Text Credentials Within Active Directory August 19, 2025
  • Scans From Hacked Cisco Small Business Routers, Linksys and Araknis are at the Raise August 19, 2025
  • Federal Agency Makes Steampunk Appearance at Black Hat 2025 August 19, 2025
  • Casino tech outfit Bragg cops to intrusion but says data jackpot untouched August 19, 2025
  • BSidesSF 2025: Charting the SSH Multiverse August 19, 2025
  • Public Exploit Released for Critical SAP NetWeaver Flaw August 19, 2025
  • Over a Million Healthcare Devices Hit by Cyberattack August 19, 2025
  • Profero Cracks DarkBit Ransomware Encryption After Israel-Iran Cyberattack Links August 19, 2025
  • New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code August 19, 2025
  • The Importance of Customer Empathy and Direction in the Cybersecurity Industry August 19, 2025
  • Citizen Lab Reports Hidden VPN Networks Sharing Ownership and Security Flaws August 19, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}