‘MFA Bombing’ examples include:– Sending a bunch of MFA requests and hoping the target finally accepts one to make the noise stop.– Sending one or two prompts per day. This method often attracts less attention, but “there is still a good chance the target will accept the MFA request.”– Calling the target, pretending to be […]
“Various claims are filed as a result of the issuance of duplicate SIM cards to third parties other than subscribers. As a result of the above, the holders of the telephone line are not only left without service, but the third parties access their bank accounts.” “Spanish DPA carries out research actions to analyze the […]
“The European Union has just announced reaching an agreement in principle with the US on a revived transatlantic data flows deal — potentially signalling an end to the many months of legal uncertainty that has dogged cloud services after a landmark court ruling in July 2020 which struck down the EU-US Privacy Shield. ‘We have found an agreement in […]
Systematically asking a copy of the ID of the data subject as a condition to send an access request is illegal, says the Belgian DPA, in accordance with the EDPB guidelines on the right to access.
Ministers and government officials could be stopped from sending ‘disappearing messages’ after failing to keep public records of exchanges on personal phones, email and WhatsApp.Some of those communications addressed matters of considerable public importance relating to the pandemic response and the awarding of government contracts.”
This study by the European Parliamentary Research Service describes two main dimensions of 5G technology, i.e. privacy and security. The focus of this research paper is the analysis of cybersecurity risks and threats, privacy challenges and 5G technology opportunities, at the EU level and worldwide, as well as the relationship between cybersecurity risks and privacy […]
A group of attackers calling themselves Lapsus$, and previously responsible for attacks on chip giant NVIDIA, Portuguese media giant Impresa and the Brazilian Ministry of Health, posted screenshots on their Telegram channel showing that they have access to Okta systems. Okta offers solutions for identity and access management. “More than 15,000 global brands entrust Okta […]
The German hosting company ZAP-Hosting has warned customers about a data breach in which their private data was stolen and then published on the internet. Customers are offered a discount voucher of twenty euros as an apology. Due to the attack, ZAP was forced to shut down part of the infrastructure. According to ZAP, an […]
The Guidelines offer practical recommendations to designers and users of social media platforms on how to assess and avoid so called “dark patterns” in social media interfaces that infringe on GDPR requirements. In the context of these Guidelines, “dark patterns” are considered as interfaces and user experiences implemented on social media platforms that lead users […]
The CNIL – French DPA-published its guide for DPOs. This Guide https://lnkd.in/eMXdDeRh analyzes, among other issues why and how to appoint a DPO, what means should be provided to fulfill its mission and the pros and cons of the internal, external and shared DPO roles are compared: 1) If you choose to appoint a member of the […]