Data Protection DPA DPO GDPR

Internal, external or shared DPO?

The CNIL – French DPA-published its guide for DPOs. This Guide https://lnkd.in/eMXdDeRh analyzes, among other issues why and how to appoint a DPO, what means should be provided to fulfill its mission and the pros and cons of the internal, external and shared DPO roles are compared: 1) If you choose to appoint a member of the […]

Malware Multifactor Authentication Password Management Security
Passwordless requires a key

Watch out for Google Authenticator Codes being stolen

Escobar malware steals Google Authenticator multi-factor authentication codes, and this malware is the remake of the Aberebot Android banking trojan. This new version of Aberebot Android banking trojan has been detected with a name and icon similar to the legitimate anti-virus app McAfee, and it enables its operators to perform the following tasks:– Using VNC take […]

Privacy

HBO shares the viewing history with Facebook

Did HBO forget about the Video Privacy Protection Act, a US act passed in 1988? A class action lawsuit alleges it shares the viewing history of its’ subscribers with Facebook, without their consent.“HBO Max has a privacy policy on its website, in which it discloses that it and its partners use cookies to deliver personalized […]

GDPR Privacy Privacy Shield

40% of EU companies stop to move non-personal data beyond its borders

An economic study commissioned by Computer and Communications Industry (CCIA Europe) finds that the envisaged international transfer requirements could lead to as many as 40% of the polled EU companies to stop moving non-personal, commercially sensitive data to jurisdictions beyond its borders, implying a GDP loss of 79 billion euros per year. This finding contrasts, however, […]

Infrastructure Security Network Security Security
OpenSSL

NSA: network infrastructure security guidance

Cybersecurity responsibilities to identify and disseminate threats in the network infrastructure:– Network architecture and design– Security maintenance– Authentication, authorization, and accounting (AAA)– Local administrator accounts and passwords– Remote logging and monitoring– Remote administration and network services– Routing– Interface ports– Notification and consent banners