In August Halo was lanched by Amazon which is a new wearable device to compete with Apple Watch and Fitbit. The Halo device does not only allow customers to track things like exercise and sleep, as most fitness wearables, but can also track emotional changes by listening to the wearer’s tone of voice and can […]
Facebook reports a 50% drop in advertising revenue since the cookie was declared war by Firefox and Apple. The cookie wall has been taken over by the AP and we are waiting for the first fines. A group of Dutch privacy activists has submitted a claim, which focuses on the collection, bundling, enrichment and sale […]
75% of the GPs surveyed by RTL Nieuws have converted more than half of the consultations to video calling. The opinion of the general practitioners varies from benefits to risks, such as incorrect diagnosis. The majority of the GPs surveyed are positive about telephone and digital contact with patients and want to use it more […]
The top three most popular intrusion methods include unsecured RDP endpoints, email phishing, and the exploitation of corporate VPN appliances. Ransomware attacks targeting the enterprise sector have been at an all-time high in the first half of 2020. RDP is regarded as the single biggest attack vector for ransomware. Remote Desktop Protocol (RDP) is currently […]
Between 55 and 70% of the home workers have positive experiences with working from home during the corona crisis. This share was stable between March and July. About 40-60% of them expect to continue working from home more often when the crisis is over. An increase has been visible here since the start of the […]
The Ministry of Justice and Security is investigating whether Google complies with the privacy rules. This is done with the help of a data protection impact assessment (DPIA). Expected completion of this DPIA is in the autumn. The wish arose from education where digitization took place at breakneck speed, not knowing whether these parties that […]
CyberNews cyber security experts hijacked nearly 28,000 unsecured printers worldwide and forced them to print a printer security manual. How to secure a printer? Limit or disable network printing; Secure your print ports; Use a firewall; Update your printer firmware to the latest version; Change the default password to a strong passphrase. Read more on […]
According to researchers at the American Ponemon Institute, cyber attacks are the leading cause of data leaks, followed by technical defects, configuration errors in the cloud and human error. The “Cost of a Data Breach Report 2020” study conducted by IBM among 3,200 people from 524 organizations shows that the average cost per leaked or […]
Details of the Ukraine Cyber Police in collaboration with cryptocurrency exchange Binance show insight into how the group operated. As per reports, they also offered money laundering services of cryptocurrencies through underground forums which are a hotspot for criminals. This led to a source of money from various illegal activities including but not limited to: […]
With the Central Government’s CopyID app, you can cross out the identity details in a copy of your identity document that organizations do not need or are not allowed to process. This can be, for example, the citizen service number (BSN), but also a passport photo or signature. This depends on the organization and purpose […]