To protect accounts related to the US presidential election, Twitter will require a strong password for these accounts. These users are also recommended to set up two-factor authentication. The microblogging service has announced this on its own website. In this way, Twitter wants to protect so-called “high-profile accounts” during the upcoming presidential elections. These include […]
A new survey by research firm Vanson Bourne of 1,350 business IT decision-makers in the US and 13 other countries sought to identify current IoT security vulnerabilities and threats in corporate organizations. One of the questions was a question that asked respondents to identify the strangest IoT devices they found connected to their organization’s networks. […]
The Multi-year Plan for Improving Central Government Information Management prescribes that all government organizations must implement a method of e-mail archiving by 2021, whereby this applies in In principle, all e-mail from officials is kept for a period of ten years. After that period, the e-mails are either destroyed or transferred to the National Archives. […]
More and more digital cyber resilience services are being outsourced to large foreign tech companies. According to the researchers at the Rathenau Institute , the Netherlands and Europe are losing as a result. control and say over data. These problems can be reduced by encrypting sensitive data by default, by making stricter requirements. suppliers and […]
The security of routers for end users leaves something to be desired. The devices are full of known vulnerabilities, often use hard-coded passwords and do not receive security updates for a long time, according to research by the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE. 127 routers from seven major suppliers were investigated […]
An ICT company that installed the network without a firewall, external backups and strong authentication on the RPD service has been convicted by the court. The judgment stated that this assignment was not properly carried out and that two thirds of the damage, namely more than 10,000 Euro, and the legal costs must be reimbursed […]
People rarely change their passwords after a data breach of their online service and if they do, the new passwords are often no stronger than the old ones, according to research by researchers at two American universities. 33% of the persons thanged their password on a compromised website had an average of thirty accounts with […]
Research by Nivel shows that three quarters of GP practices since the corona crisis has started to make more use of e-health applications in general and video calling in particular. 47% started with a video consultation. Of the e-health applications that were already used before the corona crisis, the online application for prescriptions and the […]
Europol provides public awareness and prevention by offering a safety guid for the “new normal”after COVID-19.
Due to an error at Bureau Jeugdzorg Utrecht, the files of thousands of vulnerable children have been leaked. In the files you will find extremely sensitive information, such as their mental disorders, details of sexual abuse and even suicide attempts. Research from RTL Nieuws shows.