The use of “invisible” tracking tech in emails is now “endemic”, according to a messaging service that analysed its traffic at the BBC’s request. 66% of emails sent to its users’ personal accounts contained a “spy pixel”, even after excluding for spam.Emails pixels can be used to log:– if and when an email is opened– […]
Municipalities will: – Share more structural incidents with each other and with other sectors via the Information Security Service (IBD); – Share an annual incident overview with the IBD, so that a complete insight into threats, trends and developments exists; – Update and adopt their digital incident response plan every year; – Help each other […]
The Consumers’ Association and seventeen other European consumer organizations today filed a complaint against TikTok with the European Commission and the European network of regulators CPC. The complaints include the “unfair” copyright terms of TikTok, which gives the platform the right to reuse, distribute and reproduce videos without compensation to users, while these rights should […]
The use of “invisible” tracking tech in emails is now “endemic”, according to a messaging service that analysed its traffic at the BBC’s request. 66% of emails sent to its users’ personal accounts contained a “spy pixel”, even after excluding for spam. Emails pixels can be used to log: (1) if and when an email […]
Read more about this article here: https://www.ft.com/content/43ed5e0a-7b0a-40db-800f-6f3b9c58b9a8
Read more about this article here: https://www.ft.com/content/43ed5e0a-7b0a-40db-800f-6f3b9c58b9a8
Lubach states that politicians are often digitally illiterate based on responses to GGD data leaks, secure digital meetings, encryption, Facebook session in the US, etc. with all the dangers this entails for society. Now this does not apply to all MPs. Fortunately, a digital committee has been set up…. Watch the video here: https://www.youtube.com/watch?v=TRNJN_GQnRA&t=2s
Many schools wonder whether they can register which of their pupils or students is infected with corona. For example, in connection with government measures to send groups of children home for a number of days if there is an infection. Or because the schools are concerned about safety at school. Read more about this article […]
Key to bringing the mob to justice has been the event’s digital detritus: location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing. So when they stormed the Capitol their apps tracked them down and identified individuals from a trove of leaked smartphone location data. Read more about this article: https://www.nytimes.com/2021/02/05/opinion/capitol-attack-cellphone-data.html
Key to bringing the mob to justice has been the event’s digital detritus: location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing. So when they stormed the Capitol their apps tracked them down and identified individuals from a trove of leaked smartphone location data. Read more about this article here: https://www.nytimes.com/2021/02/05/opinion/capitol-attack-cellphone-data.html