Segui le novità via Telegram
Privacynews.it: privacy, solo notizie selezionate. Segnala anche tu (livechat)

BRATA, il malware bancario per Android evolve in attacchi persistenti anche contro l'Italia: i dettagli Cyber Security 360
Cybersecurity360.it · 2022-06-23 04:07 estimated reading time: 3 min Una recente analisi di Cleafy rileva ulteriori cambiamenti nel modus operandi di BRATA, uno dei più noti malware per smartphone che colpisce dispositivi Android e ormai ben noto anche in Europa tra Regno Unito, Spagna e Italia. Il gruppo criminale dietro q
UK plan to scrap cookie consent boxes will make it ‘easier to spy’ on web users
Theguardian.com · 2022-06-22 22:27 estimated reading time: 2 min Proposals to scrap pop-up cookie consent boxes on websites will make it easier to spy on web users, a privacy campaign group has warned.Cookie banners are a common feature for web users, who are asked to give their consent for websites as well as marketing
Attacco informatico ai danni di Mps, nel mirino gli indirizzi email
Ilsole24ore.com · 2022-06-21 11:40 estimated reading time: < 1 min Sempre in ottemperanza a quanto previsto dal Gdpr, Mps ha inoltrato una comunicazione sull'accaduto al Garante per la Protezione dei Dati Personali. E nella comunicazione inviata ai clienti, ha scritto: «Le confermiamo che non è stato registrato alcu
Emotet: come proteggersi al meglio dal trojan
Kaspersky.it · 2022-06-20 17:45 estimated reading time: 9 min   Cos'è Emotet? Emotet è un programma malware originariamente sviluppato sotto forma di trojan bancario. L'obiettivo era quello di accedere a dispositivi stranieri e spiare i dati privati sensibili. Emotet ha ingannato i programmi anti-virus di base nasc
Google collects almost 40 data points per user most out of top tech giants Atlas VPN
Atlasvpn.com · 2022-06-05 19:12 estimated reading time: 3 min Edward G. | May 25, 2022Data analyzed by Atlas VPN reveals that Google collects the most information about its users out of five selected tech giants - Google, Facebook, Twitter, Amazon, and Apple. Barely anyone has the time or patience to read through doz
France: CNIL opens door to cookie walls a closer look at the new criteria
Dataguidance.com · 2022-05-29 08:55 estimated reading time: 11 min BackgroundAs noted, CNIL's new guidance arrives in the context of a complex regulatory patchwork knit by several major regulatory stakeholders at a national and EU level. Cookie walls have been the subject of major contention in ePrivacy regulation for man
EFF: Don't Let Police Turn Our Cars Into Surveillance Platforms
Cleantechnica-com.cdn.ampproject.org · 2022-05-29 08:23 estimated reading time: 5 min The Home Security Camera Problem EFF Talks AboutFor those unfamiliar with the issue of Ring cameras, there’s a dark side that comes with protecting your home from criminals. When you install a camera and let someone else manage the footage (which is way e
Google urged to stop collecting phone location data before Roe v. Wade reversal
Arstechnica.com · 2022-05-26 23:06 estimated reading time: 5 min Enlarge / A pro-choice demonstrator in front of the US Supreme Court in Washington, DC, on May 11, 2022. Getty Images | Stefani Reynolds More than 40 Democratic members of Congress called on Google to stop collecting and retaining customer location data tha
Data protection issues arising in connection with the use of Artificial Intelligence
Edpb.europa.eu · 2022-05-25 10:01 estimated reading time: 2 min Background informationDate of final decision: 8 February 2022Cross-border case or national case: National caseController: Budapest Bank Zrt.Legal Reference: Lawfulness of Processing (Article 5(1)(a), Article 6(1), Article 6(4)), Purpose Limitation (Article
Cases and guidelines AI based speech signal processing technology and data protection
Naih.hu · 2022-05-25 10:00 estimated reading time: < 1 min Keresés... Home Data Protection Cases and guidelines Data protection cases and guidelines AI-based speech-signal processing technology and data protection AI-based speech-signal processing technology and data protectionFájlméret:437.20 kBDá
Tykn is creating a future of opportunity through digital identity
Tykn.tech · 2022-05-17 05:47 estimated reading time: < 1 min The adoption of Decentralized Identity technology, also known as Self-Sovereign Identity, is rampantly growing around the world. In this report we bring you its most notable implementations in different verticals: Government, Banking, Higher Education,
L'Assistente Google cambierà automaticamente le password compromesse
Redhotcyber.com · 2022-05-16 13:28 estimated reading time: 1 min Panoramica sulla privacyQuesto sito Web utilizza i cookie per migliorare la tua esperienza durante la navigazione nel sito Web. Di questi, i cookie classificati come necessari vengono memorizzati nel browser in quanto sono essenziali per il funzionamento de
Ordinanza ingiunzione nei confronti di Azienda ospedaliera di Perugia 7 aprile 2022 [9768363]
Gpdp.it · 2022-05-11 13:23 estimated reading time: 48 min VEDI NEWSLETTER DELL'11 MAGGIO 2022[doc. web n. 9768363]Ordinanza ingiunzione nei confronti di Azienda ospedaliera di Perugia - 7 aprile 2022Registro dei provvedimentin. 134 del 7 aprile 2022IL GARANTE PER LA PROTEZIONE DEI DATI PERSONALINELLA riunione odi
Privacy and encryption | IPFS Docs
Docs.ipfs.io · 2022-03-09 12:42:51+0 estimated reading time: 9 min As a protocol for peer-to-peer data storage and delivery, IPFS is a public network: Nodes participating in the network store data affiliated with globally consistent content addresses (CIDs) and advertise that they have those CIDs available for other nodes
Entering a Higher State of Vigilance Ukraine Under Attack
Wordfence.com · 2022-02-24 10:33:55+0 estimated reading time: 3 min It appears that Russia has just commenced the invasion of Ukraine. Check your preferred international news outlet, but according to the Ukrainian foreign min ister “Putin has just launched a full-scale invasion of Ukraine.”Ukrainian airspace is closed w
Digital Bridge: Privacy Shield update 3.0 — Semiconductor subsidies — EU US policy spat
Politico.eu · 2022-02-05 08:29:24+0 estimated reading time: 12 min Press play to listen to this articleVoiced by Amazon PollyPresented by Intel. By MARK SCOTTPRESENTED BYSend tips here | Subscribe for free | Listen to the newsletter and view in your browserWHAT’S PACKED FULL OF INFORMATION, and hits your mailbox each Th
Beware of Digital ID attacks: your face can be spoofed!
Enisa.europa.eu · 2022-01-25 15:10:58+0 estimated reading time: 7 min Trust in the identity of a natural or legal person has become the cornerstone of our online activities. It is therefore essential that digital identity is kept highly secure for a safe access to financial services, e-commerce,  delivery or transport platfo
GDPR and Google Analytics: Google, you are not an island!
Linkedin.com · 2022-01-16 01:00:35+0 estimated reading time: 13 min This might seem a long post, but it’s length is needed to accurately explain my personal interpretation on how Google, and more specifically Google Analytics is dealing with the GDPR. Opinions are my own.I was fortunate enough to receive, through my trus
How to minimise the risk of personal data breaches happening
Ico.org.uk · 2022-01-13 19:16:51+0 estimated reading time: 2 min This simple guide has been written to help small organisations improve the security of their data and keep it from getting lost, damaged or stolen.       The 72 hours following a personal data breach are particularly critical. If you’re dealing with o
DPO, come svolgere gli audit sull'amministratore di sistema Cyber Security 360
Cybersecurity360.it · 2021-10-15 16:43 estimated reading time: 5 min L’amministratore di sistema è la figura chiave nella gestione, manutenzione e protezione dei sistemi informativi: l’attività di audit del DPO assume pertanto grande importanza per verificare che svolga la sua funzione secondo quanto richiesto dalla no