The Guidelines offer practical recommendations to designers and users of social media platforms on how to assess and avoid so called “dark patterns” in social media interfaces that infringe on GDPR requirements. In the context of these Guidelines, “dark patterns” are considered as interfaces and user experiences implemented on social media platforms that lead users […]
The CNIL – French DPA-published its guide for DPOs. This Guide https://lnkd.in/eMXdDeRh analyzes, among other issues why and how to appoint a DPO, what means should be provided to fulfill its mission and the pros and cons of the internal, external and shared DPO roles are compared: 1) If you choose to appoint a member of the […]
The Google Dialer and Messages apps, which are installed by default on Android phones, collect all kinds of private data from users and send it to Google, according to researchers from Trinity College Dublin based on their own research. The apps are used for calling and sending and receiving SMS and other messages. According to […]
Escobar malware steals Google Authenticator multi-factor authentication codes, and this malware is the remake of the Aberebot Android banking trojan. This new version of Aberebot Android banking trojan has been detected with a name and icon similar to the legitimate anti-virus app McAfee, and it enables its operators to perform the following tasks:– Using VNC take […]
The French DPA fined a French company for not having a retention period, keeping personal data since 2007. In fact they were using an out of date hashtag, not actually deleting data after data subject request. The CNIL fined the company 120.000 € for not taking all necessary measures to be compliant.
Did HBO forget about the Video Privacy Protection Act, a US act passed in 1988? A class action lawsuit alleges it shares the viewing history of its’ subscribers with Facebook, without their consent.“HBO Max has a privacy policy on its website, in which it discloses that it and its partners use cookies to deliver personalized […]
An economic study commissioned by Computer and Communications Industry (CCIA Europe) finds that the envisaged international transfer requirements could lead to as many as 40% of the polled EU companies to stop moving non-personal, commercially sensitive data to jurisdictions beyond its borders, implying a GDP loss of 79 billion euros per year. This finding contrasts, however, […]
Google’s Advanced Technology and Products division has spent the past year exploring how computers can use radar to understand our needs or intentions and then react to us appropriately. Radar’s electromagnetic waves pick up precise gestures and movements by which the technology itself cane take a few more cues from us.
Cybersecurity responsibilities to identify and disseminate threats in the network infrastructure:– Network architecture and design– Security maintenance– Authentication, authorization, and accounting (AAA)– Local administrator accounts and passwords– Remote logging and monitoring– Remote administration and network services– Routing– Interface ports– Notification and consent banners
Operators of the malware will most probably try and infect as many systems as possible with it — both inside and outside Ukraine — to make their DDoS attacks more powerful. Another indication is a sharp increase in phishing attacks out of Russia over the past 24 hours that already have affected some organizations in […]