Privacy and AI #9
Linkedin.com · 2024-01-23 17 min In this edition of Privacy and AI:PRIVACY • EDPB bans Meta's processing PD for behavioral ads using legitimate interests or contract in the EU• Guidelines on the use of API• AI development and use - legal basis• EDPB Guidelines 2/2023 on Technical Scope of Art. 5(3) of e
Gestione automatica dei consensi della privacy online
Wired.it · 2023-06-25 2 min Una soluzione automatizzata per redigere e gestire i contratti su privacy, dati e altro, ottenendo il consenso o il rifiuto degli utenti in diversi contesti. Si chiama Clickwrap ed è il nuovo software as a service (Saas) ideato per le aziende da Namirial, azienda leader nella fo
Passkeys (Passkey authentication)
Fidoalliance.org · 2023-05-04 13 min Accelerating the Availability of Simpler, Stronger Passwordless Sign-Ins FAQ's ResourcesThis graphic is a genericized representation of what the user experience may be.Passkeys/ˈpasˌkēs/nounBased on FIDO standards, passkeys are a replacement for passwords that provide faster
Texts adopted Data Act Tuesday, 14 March 2023
Europarl.europa.eu · 2023-04-12 206 min THE EUROPEAN PARLIAMENT AND THE COUNCIL OF THE EUROPEAN UNION,Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof, Having regard to the proposal from the European Commission, After transmission of the draft legislative act
Data brokers: Identification possible to sell ads, not to exercise fundamental rights
Noyb.eu · 2023-03-01 2 min Today, noyb filed a series of complaints against websites and data brokers that did not correctly address access requests using cookies as an authentication factor. The companies had shown obstructive approaches when authenticating users; ranging from denying the right to access,
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!
Nakedsecurity.sophos.com · 2023-02-27 12 min by Thanks to Tommy Mysk and Talal Haj Bakry of @mysk_co for the impetus and information behind this article. The duo describe themselves as “two iOS developers and occasional security researchers on two continents.” In other words, although cybersecurity isn’t their core b
The EU Digital Identity Wallet: Episode 1 An Overview
Edps.europa.eu · 2023-02-26 2 min EDPS traineesWhat is it and how does it work? What are its key data protection benefits and risks?Welcome to the first episode of a three-part podcast series focused on the EU Digital Identity Wallet (DIW), organised by the trainees of the European Data Protection Supervisor and
EUR Lex 32019R0881 EN
Eur-lex.europa.eu · 2023-01-31 153 min REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCILof 17 April 2019on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act
Yubico Home
Yubico.com · 2023-01-24 2 min Yubico phishing-resistant, multi-factor authentication (MFA) stops account takeovers for the world’s largest organizations.Protect your accountsThe YubiKey is hardware authentication reimagined. Secure the identities of your employees and users, reduce support costs, and experi
Apple iOS 16.3 arrives with support for hardware security keys
Bleepingcomputer.com · 2023-01-24 2 min Apple released iOS 16.3 today with long-awaited support for hardware security keys to provide extra protection against phishing attacks and unauthorized access to your devices. Hardware security keys are small physical devices that resemble thumb drives and support USB-C (using
LastPass finally admits: Those crooks who got in? They did steal your password vaults, after all…
Nakedsecurity.sophos.com · 2022-12-26 10 min by Popular password management company LastPass has been under the pump this year, following a network intrusion back in August 2022. Details of how the attackers first got in are still scarce, with LastPass’s first official comment cautiously stating that: [A]n unauthorized
Wasted | F Droid Free and Open Source Android App Repository
F-droid.org · 2022-11-13 3 min New in version 1.5.10recast optionYou can use PanicKit, tile, shortcut or send a message with a secret code. On trigger, usingDevice Administration API, it locks a device and optionally runs wipe (factory reset). Also it cansend a broadcast message instead of the wipe.Also you ca
Commissione UE , fattura elettonica, did e crypto: tracciare tutte le transazioni
Wired.it · 2022-10-21 2 min L'Italia, insomma, ha da dirne ai tavoli europei, dove però vogliono guidare i negoziati sono la Francia (molto più indietro sul fronte dell'identità digitale) e la Germania (che con la sua carta elettronica ha ottenuto risultati più timidi di quelli italiani), nonché patrie
Lookout Uncovers Android Spyware Deployed in Kazakhstan
Lookout.com · 2022-06-24 13 min Lookout Threat Lab researchers have uncovered enterprise-grade Android surveillanceware used by the government of Kazakhstan within its borders. While we’ve been following this threat for a while using Lookout Endpoint Detection and Response (EDR) these latest samples were det
Tykn is creating a future of opportunity through digital identity
Tykn.tech · 2022-05-17 < 1 min The adoption of Decentralized Identity technology, also known as Self-Sovereign Identity, is rampantly growing around the world. In this report we bring you its most notable implementations in different verticals: Government, Banking, Higher Education, Healthcare, Human Reso
Entering a Higher State of Vigilance Ukraine Under Attack
Wordfence.com · 2022-02-24 3 min It appears that Russia has just commenced the invasion of Ukraine. Check your preferred international news outlet, but according to the Ukrainian foreign min ister “Putin has just launched a full-scale invasion of Ukraine.”Ukrainian airspace is closed with flights diverting.
Beware of Digital ID attacks: your face can be spoofed!
Enisa.europa.eu · 2022-01-25 7 min Trust in the identity of a natural or legal person has become the cornerstone of our online activities. It is therefore essential that digital identity is kept highly secure for a safe access to financial services, e-commerce,  delivery or transport platforms, telecommunications
How to minimise the risk of personal data breaches happening
Ico.org.uk · 2022-01-13 2 min This simple guide has been written to help small organisations improve the security of their data and keep it from getting lost, damaged or stolen.       The 72 hours following a personal data breach are particularly critical. If you’re dealing with one right now, follow ou

dal 2004 diritto e informatica