Microsoft has issued a warning for a zerodaylek in Internet Explorer, where it operates through Office documents to any other. The vulnerability is located in MSHTML, which is the Microsoft-developed browser engine in Internet Explorer. MSHTML in Office applications, is used to display web content in a document.As now observed the attack send the attackers […]
Apple has abandoned its once-famous commitment to security and privacy. The next version of iOS will contain software that scans users’ photos and messages. Under pressure from U.S. law enforcement, Apple has put a backdoor into their encryption system.
According to the CEO the bad actor leveraged their knowledge of technical systems, along with specialized tools and capabilities, to gain access to our testing environments and then used brute force attacks and other methods to make their way into other IT servers that included customer data.”Compromised information includes customer names, addresses, Social Security numbers […]
Using only a password to access or manage systems remotely is unwise and should be seen as a “bad practice,” according to the Cybersecurity and Infrastructure Security Agency (CISA) of the US Department of Homeland Security. In June, the CISA decided to collect bad practices that are extremely risky and actually increase cyber risks for […]
In the USA 10 major data brokers have data on individuals’ demographic characteristics (from race to gender to income level) and political preferences and beliefs (including support for the NAACP, ACLU, Planned Parenthood, and the National LGBTQ Task Force), and on current US government and military personnel. Several of these firms also market: Americans’ geo-locations. […]
In a large-scale phishing campaign designed to steal credentials, criminals are using open redirects and captchas to deceive victims, Microsoft reports. The attack starts with a phishing email that masquerades as a Zoom invitation, Microsoft 365 notification, or a message that the password has expired. Users are then prompted to open a link in the […]
Power Apps, a low-code development platform for creating business-intelligence tools, were susceptible to a default configuration that made their data sets findable by search engines or anyone with knowledge of the web address. 38 million records pf 47 organizations— containing names, dates of birth, addresses and, in some cases, Social Security numbers were exposed.
Amazon has fired a driver by an automatically generated email by a Bot. Worldwide 4 million drivers have downloaded the app, including 2.9 million in the U.S., according to App Annie which services the AI decision making. Do you think the AI usage in Human Resources here corresponds righteous with the ‘intended purpose’ and ‘reasonably foreseeable misuse’ […]
The European Commission has a plan which enables citizens to identify themselves and share electronic documents from a special wallet app for smartphones. Major platforms will be required to accept the new European digital identity. The European Commission states that the use of identity by citizens will be voluntary. “The new European digital identity wallets […]
Today the Commission issued modernised standard contractual clauses under the GDPR for data transfers from controllers or processors in the EU/EEA (or otherwise subject to the GDPR) to controllers or processors established outside the EU/EEA (and not subject to the GDPR). These modernised SCCs will replace the three sets of SCCs that were adopted under […]