Organizations often ask how much chance they have on data protection fines and how much financial reserve they should make for that. Unit 27 June EDPB guidelines on calculating GDPR fines are released for public consultation. Interesting is to have a look at the example for mitigating and aggravating factors that could influence the height […]
Each time you open an app on your phone or browse the web, an auction for your eyeballs is taking place behind the scenes thanks to a thriving market for personal data. The report of the Irish Council for Civil Liberties says hat ad platforms transmit the location data and browsing habits of Americans and Europeans about […]
Below an overview of the only comprehensive fining methodologies that were published so far by EU DPAs (specifically, by the Dutch, Danish, and Latvian DPAs), as well as the relevant draft Statutory guidance issued by the UK DPA (ICO) in 2020. Therefore, this analysis will also show how the approach of the ICO in this […]
Providers of hosting services and providers of interpersonal communication services that have received a detection order shall execute it by installing and operating technologies to detect” CSAM upon request by the competent judicial authority or independent administrative authority, the draft regulation states. The obligation also requires tech platforms to conduct risk assessments and “reasonable mitigation […]
When internet users want to log in somewhere or fill in an online form, data such as email addresses and passwords can be sent to advertisers and other third parties before the send or log in button has been clicked, according to researchers from Radboud University, KU Leuven and the University of Leuven. University of […]
Criminals have been able to steal billions of dollars through rogue emails in recent years, the FBI claims. The damage caused by “Business Email Compromise” between June 2016 and December 2021 amounted to more than $ 43 billion, according to the American investigative service. Business Email Compromise (BEC), which also includes CEO fraud, allows attackers […]
The data was collected through ad networks, The Wall Street Journal reports. The information, including location data, has been for sale since at least 2017. Also “historical” data may still be available, anonymous sources tell the American newspaper. Grindr says in a response that the app changed its policy two years ago, so that location […]
Facebook engineers state in a leaked document that they do not have an adequate level of control and explainability over how Facebook systems use data and where it goes.
The cybersecurity researchers at Morphisec have discovered recently a critical RCE vulnerability in VMware Workspace ONE Access that is being actively exploited by advanced hackers, and this critical flaw has been tracked as “CVE-2022-22954.” By exploiting CVE-2022-22954, the attackers are able to access the network environment initially.
“Since App Tracking Transparency was introduced last year with iOS 14.5, every iPhone and iPad app now has to ask users whether they want to be tracked or not. However, some developers have figured out new ways to keep tracking iOS users even when they opt out of being tracked by third-party apps. A new […]