1Password received a handy new feature last week that allows the app to temporarily remove all passwords, credit cards, and other stored data from a user’s devices. The feature is called Travel Mode, and it was created to protect users worried about running into trouble with security agents while traveling. Source: 1Password adds a ‘travel […]
security
While fingerprint scanners are pretty common feature on smartphones now, Samsung is trying to further with iris scanners stating it makes new Samsung Galaxy S8 and S8+ their securest phones. However, German white-hat hacker group Chaos Computer Club (CCC) have announced that they’ve found relatively easy way to trick the iris-recognition system of new Samsung Galaxy S8. Read more: Breaking the […]
Cybertools allegedly stolen from the NSA were used to craft the WannaCry ransomware. Privacy experts are calling the global ransomware attack that hit 150 countries a prime example of why requiring tech companies to create backdoors into computer programs is a bad idea, because of the danger those digital keys might be stolen. Source: Ransomware attack […]
Cybersecurity takes priority over a person’s data protection rights in some cases, the Federal Court has ruled. This specifically refers to the right to save IP addresses as defense against cyberattacks. Source: Germany′s highest court rules IP addresses may be saved in interest of cybersecurity | News | DW | 16.05.2017
Security researchers have found striking similarities in the code used in the global attack to that used in previous breaches attributed to North Koreans. Source: Daily Report: Evidence Points to North Korea in Ransomware Attack – The New York Times
Whether you’re tweeting, shopping or just browsing, internet companies are monitoring you. Here’s how to evade the snoopers Source: How to escape the online spies | Technology | The Guardian
When the National Security Agency began using a new hacking tool called EternalBlue, those entrusted with deploying it marveled at both its uncommon power and the widespread havoc it could wreak if it ever got loose. Some officials even discussed whether the flaw was so dangerous they should reveal it to Microsoft, the company whose […]
IN MID-APRIL, an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known only as the “Shadow Brokers.” Not even a whole month later, the hypothetical threat that criminals would use the tools against the general public has become real, and tens of thousands […]
This guidance will help you to understand the importance of encryption as an appropriate technical measure to protect the personal data you hold. Whether you are a controller or a processor, encryption is a technique that you can use to protect personal data. The guidance outlines the concept of encryption in the context of the […]
A key principle of the GDPR is that you process personal data securely by means of ‘appropriate technical and organisational measures’ – this is the ‘security principle’. Doing this requires you to consider things like risk analysis, organisational policies, and physical and technical measures. You also have to take into account additional requirements about the security of […]