IOS notification loophole lets apps collect data about you
Adguard.com · 2024-02-17 6 min Apple has long said that fingerprinting — tracking a user through the hardware and software features of their device — is not allowed. But apparently some popular apps have found a backdoor that they are exploiting in plain sight.Privacy researcher Tommy Mysk has discovered t
Chi vusa püsé la vaca l'è sua
Bernieri.blogspot.com · 2024-02-17 25 min    Nota preliminare alla lettura: il Garante ha ragione. Non è mia intenzione confrontarmi ma ragionare e, purtroppo, lo so fare solo così. Si prega di leggere questo pezzo tenendo ben presenti le mie intenzioni semiserie e l’animo giocoso, con il dovuto rispetto per le
Google attempts to defend Web Environment Integrity proposal
Theregister.com · 2023-07-28 6 min Google's Web Environment Integrity (WEI) proposal, according to one of the developers working on the controversial fraud fighting project, aims to make the web "more private and safe."Ben Wiser, a software engineer at the Chocolate Factory, responded on Wednesday to serious conce
Part 1 Discovering that your Bluetooth car battery monitor is siphoning up your location data
Doubleagent.net · 2023-07-24 12 min Hello Hacker News, thanks for visiting!A Bluetooth enabled battery monitor that records car battery voltages. The hardware requires a smartphone for pairing The product collects GPS co-ordinates, cell phone tower data and nearby Wifi beacons Location data is sent over the Intern
Do Foundation Model Providers Comply with the Draft EU AI Act? (germany)
Crfm.stanford.edu · 2023-06-22 14 min Stanford researchers evaluate foundation model providers like OpenAI and Google for their compliance with proposed EU law on AI.Requirements   Rubrics   Grades   GitHubFoundation models like ChatGPT are transforming society with their remarkable capabilities, serious risks
Passkeys (Passkey Authentication)
Fidoalliance.org · 2023-05-04 13 min Accelerating the Availability of Simpler, Stronger Passwordless Sign-Ins FAQ's ResourcesThis graphic is a genericized representation of what the user experience may be.Passkeys/ˈpasˌkēs/nounBased on FIDO standards, passkeys are a replacement for passwords that provide faster
Passkey: cos'è e come funziona
Smartworld.it · 2023-05-04 13 min Per diversi motivi, le password rappresentano l'anello debole per la sicurezza di un account, e i giganti del web hanno istituito un'alleanza, chiamata FIDO, per promuovere soluzioni più efficaci.Le passkey sono una risposta a questo problema, una soluzione che permette di util
Wallife protegge dalle minacce la nostra identità digitale
Techfromthenet.it · 2023-04-18 7 min Wallife è una startup Insurtech unica nel suo genere, capace di gestire la sicurezza e la protezione dell’identità digitale delle persone, per difenderle dai rischi derivanti dalle nuove tecnologie. Fondata nel 2020 da Fabio Sbianchi e guidata dalla CEO Maria Enrica Ang
Ricercatore Ethereum: Staking rivela l'indirizzo IP, crescono preoccupazioni per la privacy
It.cointelegraph.com · 2023-04-15 2 min Un ricercatore della Ethereum Foundation ha rivelato che gli indirizzi IP degli operatori di Ether (ETH) sono monitorati come parte di una serie più ampia di metadati, suscitando nella crypto community preoccupazione per la privacy di Ethereum.In un'intervista rilasciata il 12 a
“Early Thoughts on Generative AI”Prepared Remarks of Commissioner Alvaro M. Bedoya, Federal Trade CommissionBefore the International Association of Privacy Professionals – Quinta’s weblog
Blog.quintarelli.it · 2023-04-13 6 min questo file “Early Thoughts on Generative AI” Prepared Remarks of Commissioner Alvaro M. Bedoya, Federal Trade Commission Before the International Association of Privacy Professionals vale decisamente la pena. Longtermisti e criti-hype-isti scansatevi. Ormai i policymaker han
Gestione dei documenti di identità nel rispetto della privacy
Federprivacy.org · 2023-04-12 3 min Stazione di ricarica gratutita dello smartrphone? meglio evitare per non rischiare virus e furto dati personaliL'European Data Protection Board adotta le nuove Linee Guida sugli obblighi di notifica dei data breachL'Italia recepisce in via definitiva la direttiva sul whistleblowi
Friday Long Read: What To Do About AI
Wordfence.com · 2023-04-09 18 min Mark MaunderApril 7, 2023This is a Friday long-read, so grab a warm cup of something and kick back because we’re going to take our time on this. The world is about to profoundly change. I know you’re nervous – perhaps excited and optimistic, but if you’ve been paying att
Medical Devices Should Use Free Software +++ 25 New Videos FSFE
Fsfe.org · 2023-03-07 4 min Pubblicato il  In this issue we have a podcast episode about the need that medical devices have Free Software. Watch our talks from FOSDEM and videos about legal issues when developing. Participants of YH4F are already coding. Thanks to all your contributions, our fundraising e
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!
Nakedsecurity.sophos.com · 2023-02-27 12 min by Thanks to Tommy Mysk and Talal Haj Bakry of @mysk_co for the impetus and information behind this article. The duo describe themselves as “two iOS developers and occasional security researchers on two continents.” In other words, although cybersecurity isn’t their core b
HardBit 2.0 Ransomware
Varonis.com · 2023-02-21 12 min IntroductionFirst observed in October 2022, HardBit is a ransomware threat that targets organizations to extort cryptocurrency payments for the decryption of their data.Seemingly improving upon their initial release, HardBit version 2.0 was introduced toward the end of November
Parere su due schemi di specifiche tecniche dell
Garanteprivacy.it · 2023-02-18 26 min [doc. web n. 9856315]Parere su due schemi di specifiche tecniche dell'OAM in materia di operatori di valuta virtuale - 21 dicembre 2022Registro dei provvedimentin. 449 del 21 dicembre 2022IL GARANTE PER LA PROTEZIONE DEI DATI PERSONALINELLA riunione odierna, alla quale hanno pre
Cheering emerging PETs: Global privacy tech support on the rise
Iapp.org · 2023-02-13 10 min The data economy is facing a paradox. The exponential increase in the processing of personal data has created a wide array of unprecedented possibilities to gain useful insights via artificial intelligence and machine learning. At the same time, these developments expose individ
Appliance makers sad that 50% of customers won’t connect smart appliances
Arstechnica.com · 2023-02-02 3 min Enlarge / This hypothetical dishwasher owner is one of a min ority of smart appliance customers getting the full value of their device, including timely reminders to buy more of the company's recommended dishwasher tabs and cleaning packs. Dani Serrano/Getty Images Appliance make
EUR Lex 32019R0881 EN
Eur-lex.europa.eu · 2023-01-31 153 min REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCILof 17 April 2019on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act
Yubico Home
Yubico.com · 2023-01-24 2 min Yubico phishing-resistant, multi-factor authentication (MFA) stops account takeovers for the world’s largest organizations.Protect your accountsThe YubiKey is hardware authentication reimagined. Secure the identities of your employees and users, reduce support costs, and experi
Apple iOS 16.3 arrives with support for hardware security keys
Bleepingcomputer.com · 2023-01-24 2 min Apple released iOS 16.3 today with long-awaited support for hardware security keys to provide extra protection against phishing attacks and unauthorized access to your devices. hardware security keys are small physical devices that resemble thumb drives and support USB-C (using
Open source software vs. the proposed Cyber Resilience Act
Blog.nlnetlabs.nl · 2022-12-28 14 min By Maarten AertsenNLnet Labs is closely following a legislative proposal by the European Commission affecting almost all hardware and software on the European market. The Cyber Resilience Act (CRA) intends to ensure cybersecurity of products with digital elements by laying down
Cosa sono questi "Twitter Files" Il Post
Ilpost.it · 2022-12-06 10 min Caricamento player Durante il weekend il reporter Matt Taibbi, autore di una seguita newsletter e molto noto nel giornalismo americano, ha pubblicato una serie di documenti ottenuti da «fonti interne a Twitter», che secondo molti gli sarebbero stati inviati direttamente dall
Firma la lettera aperta per installare qualsiasi software su qualsiasi dispositivo FSFE
Fsfe.org · 2022-11-29 1 min Pubblicato il: Più di 100 organizzazioni della società civile di tutti i settori hanno già firmato la nostra lettera aperta su “Il diritto universale di installare qualsiasi software su qualsiasi dispositivo”. Nella settimana europea per la riduzione dei rifiuti apriamo la
Wasted | F Droid Free and Open Source Android App Repository
F-droid.org · 2022-11-13 3 min New in version 1.5.10recast optionYou can use PanicKit, tile, shortcut or send a message with a secret code. On trigger, usingDevice Administration API, it locks a device and optionally runs wipe (factory reset). Also it cansend a broadcast message instead of the wipe.Also you ca
Documents Reveal Advanced AI Tools Google Is Selling to Israel
Theintercept.com · 2022-08-08 15 min Training materials reviewed by The Intercept confirm that Google is offering advanced artificial intelligence and machine-learning capabilities to the Israeli government through its controversial “Project Nimbus” contract. The Israeli Finance Ministry announced the contract
I dati delle carte di credito alle Entrate ItaliaOggi.it
Italiaoggi.it · 2022-06-30 4 min Dati delle carte di credito segnalate all'agenzia delle entrate. Arriva la definitiva approvazione da parte della Camera del decreto 30 aprile 2022, n. 36 recante “Ulteriori misure urgenti per l'attuazione del Piano nazionale di ripresa e resilienza“, il cosiddetto decreto Pn
Google collects almost 40 data points per user most out of top tech giants Atlas VPN
Atlasvpn.com · 2022-06-05 3 min Edward G. | May 25, 2022Data analyzed by Atlas VPN reveals that Google collects the most information about its users out of five selected tech giants - Google, Facebook, Twitter, Amazon, and Apple. Barely anyone has the time or patience to read through dozens of pages of privacy

dal 2004 diritto e informatica