“The European Union has just announced reaching an agreement in principle with the US on a revived transatlantic data flows deal — potentially signalling an end to the many months of legal uncertainty that has dogged cloud services after a landmark court ruling in July 2020 which struck down the EU-US Privacy Shield. ‘We have found an agreement in […]
Systematically asking a copy of the ID of the data subject as a condition to send an access request is illegal, says the Belgian DPA, in accordance with the EDPB guidelines on the right to access.
Ministers and government officials could be stopped from sending ‘disappearing messages’ after failing to keep public records of exchanges on personal phones, email and WhatsApp.Some of those communications addressed matters of considerable public importance relating to the pandemic response and the awarding of government contracts.”
This study by the European Parliamentary Research Service describes two main dimensions of 5G technology, i.e. privacy and security. The focus of this research paper is the analysis of cybersecurity risks and threats, privacy challenges and 5G technology opportunities, at the EU level and worldwide, as well as the relationship between cybersecurity risks and privacy […]
A group of attackers calling themselves Lapsus$, and previously responsible for attacks on chip giant NVIDIA, Portuguese media giant Impresa and the Brazilian Ministry of Health, posted screenshots on their Telegram channel showing that they have access to Okta systems. Okta offers solutions for identity and access management. “More than 15,000 global brands entrust Okta […]
The German hosting company ZAP-Hosting has warned customers about a data breach in which their private data was stolen and then published on the internet. Customers are offered a discount voucher of twenty euros as an apology. Due to the attack, ZAP was forced to shut down part of the infrastructure. According to ZAP, an […]
The Guidelines offer practical recommendations to designers and users of social media platforms on how to assess and avoid so called “dark patterns” in social media interfaces that infringe on GDPR requirements. In the context of these Guidelines, “dark patterns” are considered as interfaces and user experiences implemented on social media platforms that lead users […]
The CNIL – French DPA-published its guide for DPOs. This Guide https://lnkd.in/eMXdDeRh analyzes, among other issues why and how to appoint a DPO, what means should be provided to fulfill its mission and the pros and cons of the internal, external and shared DPO roles are compared: 1) If you choose to appoint a member of the […]
The Google Dialer and Messages apps, which are installed by default on Android phones, collect all kinds of private data from users and send it to Google, according to researchers from Trinity College Dublin based on their own research. The apps are used for calling and sending and receiving SMS and other messages. According to […]
Escobar malware steals Google Authenticator multi-factor authentication codes, and this malware is the remake of the Aberebot Android banking trojan. This new version of Aberebot Android banking trojan has been detected with a name and icon similar to the legitimate anti-virus app McAfee, and it enables its operators to perform the following tasks:– Using VNC take […]