A report by the Committee of Supervision of the Intelligence and Security Services shows that bulk data sets collected according to the ISS Act 2017 have sometimes been fully (or largely) incorrectly declared ‘relevant’ so that they can be kept for longer than eighteen months. “. Bulk datasets are datasets of which the majority of […]
The European Commission is going after cloud computing, the online data storage business dominated by big American companies. A draft bill seeks to address concerns about dependence on a small group of providers: chiefly Amazon Web Services, Google Cloud, IBM Cloud and Microsoft Azure. The bill creates an oversight system designed “to preserving the […]
Awareness training in the field of cybersecurity and phishing must be repeated after approximately six months to ensure that employees continue to recognize phishing emails properly. This is evident from a study that was carried out by a number of German universities at an organization from the public sector. In Germany, public organizations are required […]
Last Thursday in the Northern District of California, Brittany Conditi filed a class-action complaint against Instagram and its parent company Facebook for invasion of privacy alleging that Instagram accessed users’ smartphone cameras when not using features that would require camera access, despite the defendants’ representations to the contrary. Specifically, the party who initiated the lawsuit […]
Düsseldorf University Hospital has become infected with ransomware through a known vulnerability in Citrix. The disrupted systems caused that the hospital could no longer receive ambulances, among other things. The Ministry of Justice of the German state of North Rhine-Westphalia released a message yesterday that a patient had died as a result of the ransomware […]
The encrypted email service Tutanota has been the target of DDOS attacks for over a month, preventing users from using the service for several days. The attacks began in mid-August and the attackers kept changing their attack vector, Tutanota said. Last weekend, the e-mail service came under fire again and this week it was busy […]
According to the Managed Service Providers based on a study from Altaro, with home workers in mind, they can shift their services to that domain, whereby more devices must be secured outside the company walls. This provides a way to partially offset the losses that MSPs have suffered from the COVID-19 pandemic. Cloud computing and […]
According to Dutch magazine Vrij Nederland (VN), in 2016 three ethical hackers known only as Edwin, Mattijs and Victor, scoured through the password database with the username of Donald Trump’s email address which had leaked out of LinkedIn a few years before. With the helpf of the program John the Ripper – a tool that […]
To protect accounts related to the US presidential election, Twitter will require a strong password for these accounts. These users are also recommended to set up two-factor authentication. The microblogging service has announced this on its own website. In this way, Twitter wants to protect so-called “high-profile accounts” during the upcoming presidential elections. These include […]
CISA and FBI are actively reporting vulnerabilities in F5, Pulse Secure, Citrix, BIG-IP and Exchange
Groups of attackers are actively exploiting known vulnerabilities in F5, Pulse Secure, Citrix, Exchange and BIG-IP to attack organizations, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) of the US Department of Homeland Security said in warnings. It would be groups operating from Iran and China. The group actively searches the Internet for […]