Data Breaches Privacy

Windows 10 location data data breach

The processing of location data is unnecessary, such as Windows 10’s location setting being automatically enabled violates the “data protection by default” requirement under Article 25(2) GDPR. The DPA noted that the principle of “data protection by default” requires that the controller, when using third-party software or firmware, ensures that functions for which there is […]

Security

Top 25 Most Dangerous Software Weaknesses

The 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses list demonstrates the currently most common and impactful software weaknesses. Often easy to find and exploit, these can lead to exploitable vulnerabilities that allow adversaries to completely take over a system, steal data, or prevent applications from working.

Privacy Surveillance

Hikvision: the biggest in camera surveillance

The Chinese Hikvision’s products can be found anywhere from police surveillance systems to baby monitors with 4.8 million networks of Hikvision devices in more than 191 countries. Hikvision could be sanctioned for aiding the Chinese government’s human rights violations in Xinjiang. The US Treasury is reportedly considering adding Hikvision to the Specially Designated Nationals and […]

Vulnerability

Agent- or network-based vulnerability scanning

With remote working now the norm agent-based scanning is becoming a must, while network-based scanning is an optional extra.External vulnerability scanning can give a great overview of what you look like to a hacker, the information that can be gleaned without access to your systems can be limited. Internal vulnerability scanning is about protecting the […]