Last Thursday in the Northern District of California, Brittany Conditi filed a class-action complaint against Instagram and its parent company Facebook for invasion of privacy alleging that Instagram accessed users’ smartphone cameras when not using features that would require camera access, despite the defendants’ representations to the contrary. Specifically, the party who initiated the lawsuit […]
The Ministry of Justice and Security is investigating whether Google complies with the privacy rules. This is done with the help of a data protection impact assessment (DPIA). Expected completion of this DPIA is in the autumn. The wish arose from education where digitization took place at breakneck speed, not knowing whether these parties that […]
According to researchers at the American Ponemon Institute, cyber attacks are the leading cause of data leaks, followed by technical defects, configuration errors in the cloud and human error. The “Cost of a Data Breach Report 2020” study conducted by IBM among 3,200 people from 524 organizations shows that the average cost per leaked or […]
With the Central Government’s CopyID app, you can cross out the identity details in a copy of your identity document that organizations do not need or are not allowed to process. This can be, for example, the citizen service number (BSN), but also a passport photo or signature. This depends on the organization and purpose […]
A desk clerk had difficulty logging into the hospital information system and asked aloud “How do I log in?” To a colleague who also had a patient in front of the splash screen.Then the login code and then the password were loud and audible for everyone. In hospitals people are notoriously careless, careless and thoughtless […]
Yesterday Uber’s former security chief Joe Sullivan was charged with attempting to conceal a hack from federal investigators. This hack exposed the email addresses and phone numbers of 57 million drivers and passengers. As a result the former CISO could face up to eight years in prison for not promptly disclosing to the employee and […]
NCSC published the following Small Business Guide for Cyber Security with the following steps for which ID Control gives some free trials of cloud security services: Backing up your data; Protecting your organization from malware (f.e. https://antivirusservice.eu/ ); Keep your mobile devices safe (f.e. https://antivirusservice.eu/ ); Using password to keep your data safe (f.e. https://idcontrol.pw); Avoid phishing attacks. […]
One month after the termination of the “Privacy Shield” data treaty between the EU and the US, privacy activist Max Schrems takes websites that continue to send data to the US.8 Belgian and Dutch are also being charged: PostNL, Takeaway, Marktplaats and Lieferando. A month after that ruling, the Schrems organization has now taken stock […]
Transmitted information via satellite broadband connections – something that’s useful in areas where fixed internet connections might be slow or non-existent – could get their traffic sniffed, potentially putting usernames and passwords into the hands of attackers, as well as the ability to track sensitive but often not encrypted information about individuals or corporations. You […]
The FBI has provided Internet users with tips for recognizing malicious web stores. According to the U.S. Service, there is an increase in the number of victims being tracked down through fake online stores. The US regulator FTC also reports an increase in the number of shoppers who do not receive ordered goods. These include […]