Below an overview of the only comprehensive fining methodologies that were published so far by EU DPAs (specifically, by the Dutch, Danish, and Latvian DPAs), as well as the relevant draft Statutory guidance issued by the UK DPA (ICO) in 2020. Therefore, this analysis will also show how the approach of the ICO in this […]
Providers of hosting services and providers of interpersonal communication services that have received a detection order shall execute it by installing and operating technologies to detect” CSAM upon request by the competent judicial authority or independent administrative authority, the draft regulation states. The obligation also requires tech platforms to conduct risk assessments and “reasonable mitigation […]
When internet users want to log in somewhere or fill in an online form, data such as email addresses and passwords can be sent to advertisers and other third parties before the send or log in button has been clicked, according to researchers from Radboud University, KU Leuven and the University of Leuven. University of […]
Criminals have been able to steal billions of dollars through rogue emails in recent years, the FBI claims. The damage caused by “Business Email Compromise” between June 2016 and December 2021 amounted to more than $ 43 billion, according to the American investigative service. Business Email Compromise (BEC), which also includes CEO fraud, allows attackers […]
The data was collected through ad networks, The Wall Street Journal reports. The information, including location data, has been for sale since at least 2017. Also “historical” data may still be available, anonymous sources tell the American newspaper. Grindr says in a response that the app changed its policy two years ago, so that location […]
Facebook engineers state in a leaked document that they do not have an adequate level of control and explainability over how Facebook systems use data and where it goes.
The cybersecurity researchers at Morphisec have discovered recently a critical RCE vulnerability in VMware Workspace ONE Access that is being actively exploited by advanced hackers, and this critical flaw has been tracked as “CVE-2022-22954.” By exploiting CVE-2022-22954, the attackers are able to access the network environment initially.
“Since App Tracking Transparency was introduced last year with iOS 14.5, every iPhone and iPad app now has to ask users whether they want to be tracked or not. However, some developers have figured out new ways to keep tracking iOS users even when they opt out of being tracked by third-party apps. A new […]
Spyware installed after a WhatsApp message or iMessage on the phone of politicians, lawyers, and activists in order to know what they are saying, hearing, chatting, searching, etc. All types of government are buying such spying software but how to prevent that it is used in the wrong way?
The Hungarian Data Protection Authority has recently published its annual report in which it presented a case where the Authority imposed the highest fine to date of ca. EUR 670,000 (HUF 250 million). The case involved the personal data processing of a bank (acting as a data controller) which automatically analyzed the recorded audio of […]