10 common mistakes when configuring, managing and securing systems means that attackers can still break into organizations and gain access to networks and data, the US, UK, Canadian, Dutch and New Zealand governments warn in a joint statement. advisory. The advisory wants to point out common mistakes, security practices and configurations that lead to poor […]
Google’s artificial intelligence DeepMind received the data in 2015 from the Royal Free NHS Trust for the purpose of testing a smartphone app called Streams. The smartphone app was tested to detect acute kidney injuries. The claim alleges that Google and DeepMind “obtained and used a substantial number of confidential medical records without patients’ knowledge […]
Organizations often ask how much chance they have on data protection fines and how much financial reserve they should make for that. Unit 27 June EDPB guidelines on calculating GDPR fines are released for public consultation. Interesting is to have a look at the example for mitigating and aggravating factors that could influence the height […]
Each time you open an app on your phone or browse the web, an auction for your eyeballs is taking place behind the scenes thanks to a thriving market for personal data. The report of the Irish Council for Civil Liberties says hat ad platforms transmit the location data and browsing habits of Americans and Europeans about […]
Below an overview of the only comprehensive fining methodologies that were published so far by EU DPAs (specifically, by the Dutch, Danish, and Latvian DPAs), as well as the relevant draft Statutory guidance issued by the UK DPA (ICO) in 2020. Therefore, this analysis will also show how the approach of the ICO in this […]
Providers of hosting services and providers of interpersonal communication services that have received a detection order shall execute it by installing and operating technologies to detect” CSAM upon request by the competent judicial authority or independent administrative authority, the draft regulation states. The obligation also requires tech platforms to conduct risk assessments and “reasonable mitigation […]
When internet users want to log in somewhere or fill in an online form, data such as email addresses and passwords can be sent to advertisers and other third parties before the send or log in button has been clicked, according to researchers from Radboud University, KU Leuven and the University of Leuven. University of […]
Criminals have been able to steal billions of dollars through rogue emails in recent years, the FBI claims. The damage caused by “Business Email Compromise” between June 2016 and December 2021 amounted to more than $ 43 billion, according to the American investigative service. Business Email Compromise (BEC), which also includes CEO fraud, allows attackers […]
The data was collected through ad networks, The Wall Street Journal reports. The information, including location data, has been for sale since at least 2017. Also “historical” data may still be available, anonymous sources tell the American newspaper. Grindr says in a response that the app changed its policy two years ago, so that location […]
Facebook engineers state in a leaked document that they do not have an adequate level of control and explainability over how Facebook systems use data and where it goes.