Security SOC Vulnerability

How to defend with(out) a SOC as first defense?

Do you want to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attack?Don’ts:1.) Don’t give everything easily to the attacker, make it harder for him to get. (Control Measures in the network)2.) Don’t enable legitimate vulnerable application if not in use, attackers always use legit applications in the network. (Abuse […]

Biometrics EIDAS

Secure and trusted European digital ID by 2030

In its latest ambitious digital policy announcement, the European Union has proposed creating a framework for a “trusted and secure European e-ID” (aka digital identity) — available to all citizens, residents and businesses to make it easer to use a national digital identity to prove who they are in order to access public sector or […]

GDPR Privacy

Several Android devices to collect and share data on a large scale

Several popular Android phones have been found to collect and share data on a large scale, including with third parties, and users cannot opt ​​out, according to researchers from Trinity College Dublin and the University of Edinburgh. The study https://lnkd.in/eiVzvJj3 examined six variants of the Android operating system, namely those from Samsung, Xiaomi, Huawei, Realme, LineageOS and […]

Data Protection Data Rights Data Subjects GDPR

Did you sign a contract with Facebook for your data being purchased for 8.6 Eurocents?

The Irish Data Protection Commission (DPC) has sent a “draft decision” to the other European Data Protection Authorities on Facebook’s legal trick to bypass the GDPR. noyb has published the relevant documents today https://lnkd.in/eQBMMg7C. In the DPC’s view Facebook can simply choose to include the agreement on data processing in a “contract”, which would make the […]