Ultimi argomenti trovati in 30 risorse su 290 in totale:
Tutti / Software: algoretica assicurativonews attacchi backup blockchain caffe20 cambiavalute chat control chatbot chatgpt cie civilenews cloud controllo remoto costituzionalità criptovalute cross platform csa cybernews cybersecurity cybersecurity act dark patterns democrazia digitale denuncia ecommerce element elezioni elon musk english enisa europe fake news garante geofence germany giochi health data intelligenza artificiale iot israele lavoratori legal design messenger minori monitoraggio nextcloud notizie open source parere password manager polizia pratiche scorrette press release privacy privacydb ransomware ransonware regolamentazione sanzioni signal smart car smart things smartcar soffiate software sorveglianza spid spyware trojan di stato uk videogames videosorveglianza whistelblowing
Tutti / Software: algoretica assicurativonews attacchi backup blockchain caffe20 cambiavalute chat control chatbot chatgpt cie civilenews cloud controllo remoto costituzionalità criptovalute cross platform csa cybernews cybersecurity cybersecurity act dark patterns democrazia digitale denuncia ecommerce element elezioni elon musk english enisa europe fake news garante geofence germany giochi health data intelligenza artificiale iot israele lavoratori legal design messenger minori monitoraggio nextcloud notizie open source parere password manager polizia pratiche scorrette press release privacy privacydb ransomware ransonware regolamentazione sanzioni signal smart car smart things smartcar soffiate software sorveglianza spid spyware trojan di stato uk videogames videosorveglianza whistelblowing
Newsletter e Podcast:
Petruta Pirvan on LinkedIn: #cybersecurity #ai #aiact #machinelearning #aisystems #algorithms…
Linkedin.com · 2023-03-21 1 min Petruta PirvanHead of Privacy and Compliance l Center of Excellence Lead l IAPP Training Advisory Board Member l Fellow of Information Privacy l Trusted Advisor19h The European Union Agency for Cybersecurity (ENISA) publishes a Report on Cybersecurity of AI and Standardisation Th
Linkedin.com · 2023-03-21 1 min Petruta PirvanHead of Privacy and Compliance l Center of Excellence Lead l IAPP Training Advisory Board Member l Fellow of Information Privacy l Trusted Advisor19h The European Union Agency for Cybersecurity (ENISA) publishes a Report on Cybersecurity of AI and Standardisation Th
Restic · Backups done right!
Restic.net · 2023-03-16 3 min Restic is a modern backup program that can back up your files: from Linux, BSD, Mac and Windows to many different storage types, including self-hosted and online services easily, being a single executable that you can run without a server or complex setup effectively, only
Restic.net · 2023-03-16 3 min Restic is a modern backup program that can back up your files: from Linux, BSD, Mac and Windows to many different storage types, including self-hosted and online services easily, being a single executable that you can run without a server or complex setup effectively, only
Medical Devices Should Use Free software +++ 25 New Videos FSFE
Fsfe.org · 2023-03-07 4 min Pubblicato il In this issue we have a podcast episode about the need that medical devices have Free software. Watch our talks from FOSDEM and videos about legal issues when developing. Participants of YH4F are already coding. Thanks to all your contributions, our fundraising e
Fsfe.org · 2023-03-07 4 min Pubblicato il In this issue we have a podcast episode about the need that medical devices have Free software. Watch our talks from FOSDEM and videos about legal issues when developing. Participants of YH4F are already coding. Thanks to all your contributions, our fundraising e
Signal would 'walk' from UK if Online Safety Bill undermined encryption
Bbc.com · 2023-03-01 4 min Image source, Getty ImagesBy Chris VallanceTechnology reporter, BBC NewsThe encrypted-messaging app Signal has said it would stop providing services in the UK if a new law undermined encryption.If forced to weaken the privacy of its messaging system under the Online Safety Bill,
Bbc.com · 2023-03-01 4 min Image source, Getty ImagesBy Chris VallanceTechnology reporter, BBC NewsThe encrypted-messaging app Signal has said it would stop providing services in the UK if a new law undermined encryption.If forced to weaken the privacy of its messaging system under the Online Safety Bill,
VW WOULDN'T HELP FIND KIDNAPPED CHILD BECAUSE HIS MOTHER WASN'T PAYING FOR FIND MY CAR SUBSCRIPTION
Pluralistic.net · 2023-02-28 9 min Today's links VW wouldn't help find kidnapped child because his mother wasn't paying for find-my-car subscription: All the harms of surveillance, none of the benefits. Hey look at this: Delights to delectate. This day in history: 2003, 2008, 2013, 2018 Colophon: Recent publicati
Pluralistic.net · 2023-02-28 9 min Today's links VW wouldn't help find kidnapped child because his mother wasn't paying for find-my-car subscription: All the harms of surveillance, none of the benefits. Hey look at this: Delights to delectate. This day in history: 2003, 2008, 2013, 2018 Colophon: Recent publicati
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!
Nakedsecurity.sophos.com · 2023-02-27 12 min by Thanks to Tommy Mysk and Talal Haj Bakry of @mysk_co for the impetus and information behind this article. The duo describe themselves as “two iOS developers and occasional security researchers on two continents.” In other words, although cybersecurity isn’t their core b
Nakedsecurity.sophos.com · 2023-02-27 12 min by Thanks to Tommy Mysk and Talal Haj Bakry of @mysk_co for the impetus and information behind this article. The duo describe themselves as “two iOS developers and occasional security researchers on two continents.” In other words, although cybersecurity isn’t their core b
EDPS to pilot the use of Open Source software
Edps.europa.eu · 2023-02-24 2 min Press Release EDPS to pilot the use of Open Source software In February 2023, the EDPS has started piloting the use of the Open Source software Nextcloud and LibreOffice Online. Together, theyoffer the possibility to share files, send messages, make video calls, and allows collab
Edps.europa.eu · 2023-02-24 2 min Press Release EDPS to pilot the use of Open Source software In February 2023, the EDPS has started piloting the use of the Open Source software Nextcloud and LibreOffice Online. Together, theyoffer the possibility to share files, send messages, make video calls, and allows collab
HardBit 2.0 Ransomware
Varonis.com · 2023-02-21 12 min IntroductionFirst observed in October 2022, HardBit is a ransomware threat that targets organizations to extort cryptocurrency payments for the decryption of their data.Seemingly improving upon their initial release, HardBit version 2.0 was introduced toward the end of November
Varonis.com · 2023-02-21 12 min IntroductionFirst observed in October 2022, HardBit is a ransomware threat that targets organizations to extort cryptocurrency payments for the decryption of their data.Seemingly improving upon their initial release, HardBit version 2.0 was introduced toward the end of November
Hardbit, il ransomware che negozia il riscatto sulla base della polizza cyber delle vittime Cyber Security 360
Cybersecurity360.it · 2023-02-21 3 min Scoperto la prima volta nell’ottobre 2022 e aggiornato poi con una seconda versione nel novembre dello stesso anno, la min accia ransomware Hardbit presenta dei retroscena criminali interessanti sulla gestione della richiesta di riscatto: il malware, infatti, avvia una vera e p
Cybersecurity360.it · 2023-02-21 3 min Scoperto la prima volta nell’ottobre 2022 e aggiornato poi con una seconda versione nel novembre dello stesso anno, la min accia ransomware Hardbit presenta dei retroscena criminali interessanti sulla gestione della richiesta di riscatto: il malware, infatti, avvia una vera e p
Parere su due schemi di specifiche tecniche dell
Garanteprivacy.it · 2023-02-18 26 min [doc. web n. 9856315]Parere su due schemi di specifiche tecniche dell'OAM in materia di operatori di valuta virtuale - 21 dicembre 2022Registro dei provvedimentin. 449 del 21 dicembre 2022IL GARANTE PER LA PROTEZIONE DEI DATI PERSONALINELLA riunione odierna, alla quale hanno pre
Garanteprivacy.it · 2023-02-18 26 min [doc. web n. 9856315]Parere su due schemi di specifiche tecniche dell'OAM in materia di operatori di valuta virtuale - 21 dicembre 2022Registro dei provvedimentin. 449 del 21 dicembre 2022IL GARANTE PER LA PROTEZIONE DEI DATI PERSONALINELLA riunione odierna, alla quale hanno pre
Grazie a ChatGpt, imprese e giovani scoprono un "tesoro" di nuove opportunità
Rainews.it · 2023-02-16 5 min "Credo che l'Italia possa vincere questa sfida, ha tutti gli elementi per farlo". Così il min istro delle Imprese e del Made in Italy Adolfo Urso, sul passaggio all'auto elettrica, a margine della XI Cabina di regia per l'internazionalizzazione. "Ovviamente - ha aggiunto - abbia
Rainews.it · 2023-02-16 5 min "Credo che l'Italia possa vincere questa sfida, ha tutti gli elementi per farlo". Così il min istro delle Imprese e del Made in Italy Adolfo Urso, sul passaggio all'auto elettrica, a margine della XI Cabina di regia per l'internazionalizzazione. "Ovviamente - ha aggiunto - abbia
German Constitutional Court strikes down predictive algorithms for policing
Euractiv.com · 2023-02-16 3 min The German Federal Constitutional Court declared the use of Palantir surveillance software by police in Hesse and Hamburg unconstitutional in a landmark ruling on Thursday (16 February). The ruling concludes a case brought by the German Society for Civil Rights (GFF) last year, h
Euractiv.com · 2023-02-16 3 min The German Federal Constitutional Court declared the use of Palantir surveillance software by police in Hesse and Hamburg unconstitutional in a landmark ruling on Thursday (16 February). The ruling concludes a case brought by the German Society for Civil Rights (GFF) last year, h
LockBit Attacco all'azienda italiana che produce i peluche Trudi
Redhotcyber.com · 2023-02-16 7 min La famigerata banda ransomware Lockbit, colpisce un’altra organizzazione italiana. Oggi è il turno della famosa azienda che produce peluche Trudi che si trova a combattere con il ransomware.LockBit 3.0 avvia il consueto “countdown” fissato a 15gg, data della pubblicazione
Redhotcyber.com · 2023-02-16 7 min La famigerata banda ransomware Lockbit, colpisce un’altra organizzazione italiana. Oggi è il turno della famosa azienda che produce peluche Trudi che si trova a combattere con il ransomware.LockBit 3.0 avvia il consueto “countdown” fissato a 15gg, data della pubblicazione
‘All we have had is losses’: Royal Mail dismisses ‘absurd’ $80m ransom demand
Theguardian.com · 2023-02-16 2 min Royal Mail rejected an “absurd” ransom demand for $80m (£67m) from hackers linked to Russia, according to transcripts that offer a rare glimpse into negotiations when companies are hit by a ransomware cyberattack.The delivery company has been battling a ransomware attack sin
Theguardian.com · 2023-02-16 2 min Royal Mail rejected an “absurd” ransom demand for $80m (£67m) from hackers linked to Russia, according to transcripts that offer a rare glimpse into negotiations when companies are hit by a ransomware cyberattack.The delivery company has been battling a ransomware attack sin
Intelligenza artificiale e ruolo della protezione dei dati personali. L’analisi di Ginevra Cerrina Feroni (Garante Privacy)
Garanteprivacy.it · 2023-02-15 18 min Intelligenza artificiale e ruolo della protezione dei dati personali. L’analisi di Ginevra Cerrina Feroni (Garante Privacy)Intervento di Ginevra Cerrina Feroni, vice Presidente del Garante per la protezione dei dati personali(AgendaDigitale, 14 febbraio 2023)Il rapporto tra in
Garanteprivacy.it · 2023-02-15 18 min Intelligenza artificiale e ruolo della protezione dei dati personali. L’analisi di Ginevra Cerrina Feroni (Garante Privacy)Intervento di Ginevra Cerrina Feroni, vice Presidente del Garante per la protezione dei dati personali(AgendaDigitale, 14 febbraio 2023)Il rapporto tra in
Disinformazione ed elezioni: screditare il candidato ai familiari, entrando in gmail e telegram.
Theguardian.com · 2023-02-15 8 min The undercover footage was filmed by three reporters, who approached Team Jorge posing as prospective clients.In more than six hours of secretly recorded meetings, Hanan and his team spoke of how they could gather intelligence on rivals, including by using hacking techniques to a
Theguardian.com · 2023-02-15 8 min The undercover footage was filmed by three reporters, who approached Team Jorge posing as prospective clients.In more than six hours of secretly recorded meetings, Hanan and his team spoke of how they could gather intelligence on rivals, including by using hacking techniques to a
Cheering emerging PETs: Global privacy tech support on the rise
Iapp.org · 2023-02-13 10 min The data economy is facing a paradox. The exponential increase in the processing of personal data has created a wide array of unprecedented possibilities to gain useful insights via artificial intelligence and machine learning. At the same time, these developments expose individ
Iapp.org · 2023-02-13 10 min The data economy is facing a paradox. The exponential increase in the processing of personal data has created a wide array of unprecedented possibilities to gain useful insights via artificial intelligence and machine learning. At the same time, these developments expose individ
EU Cyber Resilience Act
Digital-strategy.ec.europa.eu · 2023-02-09 1 min From baby-monitors to smart-watches, products and software that contain a digital component are omnipresent in our daily lives. Less apparent to many users is the security risk such products and software may present. The Commission’s proposal for a new Cyber Resilience Act (CR
Digital-strategy.ec.europa.eu · 2023-02-09 1 min From baby-monitors to smart-watches, products and software that contain a digital component are omnipresent in our daily lives. Less apparent to many users is the security risk such products and software may present. The Commission’s proposal for a new Cyber Resilience Act (CR
EU chat control law will ban open source operating systems Blog | Mullvad VPN
Mullvad.net · 2023-02-02 3 min Update: Open source OSes might be saved from being covered depending on the interpretation of EU regulation 2019/1150 2.2.c.To be considered an online intermediation service it requires a contractual relationship between the service and any businesses using it. The open source li
Mullvad.net · 2023-02-02 3 min Update: Open source OSes might be saved from being covered depending on the interpretation of EU regulation 2019/1150 2.2.c.To be considered an online intermediation service it requires a contractual relationship between the service and any businesses using it. The open source li
Statement before the European Parliament hearing on "Spyware used in third countries and implications for EU foreign relations"
Privacyinternational.org · 2023-02-02 2 min PI Opening Statement at PEGA Hearing on "Spyware used in third countries and implications for EU foreign relations" Thank you very much for offering me the opportunity to give evidence before this Committee for another time on behalf of Privacy International (or PI) – a London-
Privacyinternational.org · 2023-02-02 2 min PI Opening Statement at PEGA Hearing on "Spyware used in third countries and implications for EU foreign relations" Thank you very much for offering me the opportunity to give evidence before this Committee for another time on behalf of Privacy International (or PI) – a London-
Appliance makers sad that 50% of customers won’t connect smart appliances
Arstechnica.com · 2023-02-02 3 min Enlarge / This hypothetical dishwasher owner is one of a min ority of smart appliance customers getting the full value of their device, including timely reminders to buy more of the company's recommended dishwasher tabs and cleaning packs. Dani Serrano/Getty Images Appliance make
Arstechnica.com · 2023-02-02 3 min Enlarge / This hypothetical dishwasher owner is one of a min ority of smart appliance customers getting the full value of their device, including timely reminders to buy more of the company's recommended dishwasher tabs and cleaning packs. Dani Serrano/Getty Images Appliance make
EUR Lex 32019R0881 EN
Eur-lex.europa.eu · 2023-01-31 153 min REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCILof 17 April 2019on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act
Eur-lex.europa.eu · 2023-01-31 153 min REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCILof 17 April 2019on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act
Newsletter del 24/01/23 Sanità: Garante sanziona tre Asl friulane per uso algoritmo Whistleblowing: sì del Garante privacy al recepimento della direttiva Ue Decreto trasparenza e lavoro: le prime indicazioni del Garante Ok del Garante Privacy alla nuova Carta della cultura
Gpdp.it · 2023-01-25 7 min NEWSLETTER N. 499 del 24 gennaio 2023Sanità: Garante sanziona tre Asl friulane per uso algoritmo Whistleblowing: sì del Garante privacy al recepimento della direttiva Ue Decreto trasparenza e lavoro: le prime indicazioni del Garante Ok del Garante Privacy alla nuova Carta della
Gpdp.it · 2023-01-25 7 min NEWSLETTER N. 499 del 24 gennaio 2023Sanità: Garante sanziona tre Asl friulane per uso algoritmo Whistleblowing: sì del Garante privacy al recepimento della direttiva Ue Decreto trasparenza e lavoro: le prime indicazioni del Garante Ok del Garante Privacy alla nuova Carta della
Il software che hackera gli smartphone è online. Scopriamo cosa contiene il leak di Cellebrite
Redhotcyber.com · 2023-01-16 2 min Cellebrite è una società israeliana di intelligence digitale che fornisce strumenti per le forze dell’ordine federali, statali e locali, nonché per aziende e fornitori di servizi per raccogliere, rivedere, analizzare e gestire i dati digitali.Cosa può fare il software Celle
Redhotcyber.com · 2023-01-16 2 min Cellebrite è una società israeliana di intelligence digitale che fornisce strumenti per le forze dell’ordine federali, statali e locali, nonché per aziende e fornitori di servizi per raccogliere, rivedere, analizzare e gestire i dati digitali.Cosa può fare il software Celle
Obbligo comunicazione ai sindacati e decreto trasparenza
Privacylab.it · 2023-01-15 9 min Home Blog NOVITÀ Decreto trasparenza, sistemi decisionali e di monitoraggio automatizzato: quando vale l’obbligo di comunicazione ai sindacati Tempo di lettura stimato: 8'Quali sono i nuovi obblighi informativi previsti dal decreto trasparenza nell’ipotesi in cui l'azienda,
Privacylab.it · 2023-01-15 9 min Home Blog NOVITÀ Decreto trasparenza, sistemi decisionali e di monitoraggio automatizzato: quando vale l’obbligo di comunicazione ai sindacati Tempo di lettura stimato: 8'Quali sono i nuovi obblighi informativi previsti dal decreto trasparenza nell’ipotesi in cui l'azienda,
Carta d'Identità Elettronica al posto dello SPID | Donna Moderna
Donnamoderna.com · 2023-01-04 5 min Da ottobre è possibile usare la Cie per accedere ai servizi della pubblica amministrazione al posto dello Spid. Esistono, però, alcune differenzeCome cambia la Carta d’Identità Elettronica Come ci si autentica con la CIE Quali operazioni si possono fare con Carta d’Identit
Donnamoderna.com · 2023-01-04 5 min Da ottobre è possibile usare la Cie per accedere ai servizi della pubblica amministrazione al posto dello Spid. Esistono, però, alcune differenzeCome cambia la Carta d’Identità Elettronica Come ci si autentica con la CIE Quali operazioni si possono fare con Carta d’Identit
Home | Cyber Risk Management
Sicurezzait.gov.it · 2022-12-28 4 min Sicurezza informatica: dalla consapevolezza alla gestione del rischio Il tool di valutazione e trattamento del rischio cyber, sviluppato da AgID, consente ad ogni PA di effettuare le operazioni di self assessment, i piani di trattamento e il monitoraggio delle iniziative volte
Sicurezzait.gov.it · 2022-12-28 4 min Sicurezza informatica: dalla consapevolezza alla gestione del rischio Il tool di valutazione e trattamento del rischio cyber, sviluppato da AgID, consente ad ogni PA di effettuare le operazioni di self assessment, i piani di trattamento e il monitoraggio delle iniziative volte
Open source software vs. the proposed Cyber Resilience Act
Blog.nlnetlabs.nl · 2022-12-28 14 min By Maarten AertsenNLnet Labs is closely following a legislative proposal by the European Commission affecting almost all hardware and software on the European market. The Cyber Resilience Act (CRA) intends to ensure cybersecurity of products with digital elements by laying down
Blog.nlnetlabs.nl · 2022-12-28 14 min By Maarten AertsenNLnet Labs is closely following a legislative proposal by the European Commission affecting almost all hardware and software on the European market. The Cyber Resilience Act (CRA) intends to ensure cybersecurity of products with digital elements by laying down
LastPass finally admits: Those crooks who got in? They did steal your password vaults, after all…
Nakedsecurity.sophos.com · 2022-12-26 10 min by Popular password management company LastPass has been under the pump this year, following a network intrusion back in August 2022. Details of how the attackers first got in are still scarce, with LastPass’s first official comment cautiously stating that: [A]n unauthorized
Nakedsecurity.sophos.com · 2022-12-26 10 min by Popular password management company LastPass has been under the pump this year, following a network intrusion back in August 2022. Details of how the attackers first got in are still scarce, with LastPass’s first official comment cautiously stating that: [A]n unauthorized
privacy ecommerce videogames minori giochi dark patterns sanzioni caffe20 legal design pratiche scorrette
Epic fail per Fortnite: 520 milioni di dollari per pratiche scorrette contro i propri giocatori minorenniCybersecurity360.it · 2022-12-20 4 min C’è la privacy violata dei min ori dietro la sanzione record americana di 520 milioni di dollari, alla software house Epic Games, quella che produce e distribuisce videogames di grande impatto come Fortnite o Rocket League; la società è stata considerata colpevole anche di
Ultimi argomenti trovati in 30 risorse su 290 in totale:
Tutti / Software: algoretica assicurativonews attacchi backup blockchain caffe20 cambiavalute chat control chatbot chatgpt cie civilenews cloud controllo remoto costituzionalità criptovalute cross platform csa cybernews cybersecurity cybersecurity act dark patterns democrazia digitale denuncia ecommerce element elezioni elon musk english enisa europe fake news garante geofence germany giochi health data intelligenza artificiale iot israele lavoratori legal design messenger minori monitoraggio nextcloud notizie open source parere password manager polizia pratiche scorrette press release privacy privacydb ransomware ransonware regolamentazione sanzioni signal smart car smart things smartcar soffiate software sorveglianza spid spyware trojan di stato uk videogames videosorveglianza whistelblowing
Tutti / Software: algoretica assicurativonews attacchi backup blockchain caffe20 cambiavalute chat control chatbot chatgpt cie civilenews cloud controllo remoto costituzionalità criptovalute cross platform csa cybernews cybersecurity cybersecurity act dark patterns democrazia digitale denuncia ecommerce element elezioni elon musk english enisa europe fake news garante geofence germany giochi health data intelligenza artificiale iot israele lavoratori legal design messenger minori monitoraggio nextcloud notizie open source parere password manager polizia pratiche scorrette press release privacy privacydb ransomware ransonware regolamentazione sanzioni signal smart car smart things smartcar soffiate software sorveglianza spid spyware trojan di stato uk videogames videosorveglianza whistelblowing

dal 2004 diritto e informatica