Category Archives: GDPR

CyberSecurity minute: a lot happens in just sixty seconds

CyberSecurity minute It is a matter of fact that we are currently living a difficult period as far as Cyber Attacks are concerned. The number of stolen records is constantly increasing. Nowadays, according to a RiskIQ report, we have a very busy CyberSecurity minute: 5.518 records leaked (as far as well-known and disclosed data breaches Read more »

Foreshadow – Intel CPUs Affected By L1TF Vulnerabilities

Foreshadow: While the chaos for the horrifying Spectre and Meltdown is still going, researchers discover another vulnerability in Intel CPUs that is even more robust. Two different groups of researchers discovered the vulnerability named “Foreshadow” and reported it to Intel. Upon further investigations, Intel found two more related flaws, which the researchers termed as “Foreshadow-NG”. Read more »

SamSam Ransomware Has Raised $6 Million

samsam ransomware: Criminal Hackers exploit ransomware attacks as a robust money making strategy as they easily coerce the victims to pay money. Continuing with this strategy, they are now making money with the notorious SamSam malware. A latest study reveals that SamSam ransomware has raised around $6 million for Criminal hackers in ransom demands. SamSam Read more »

Web Security: top 5 attacks targeting web applications

Web Security is a hot topic for everyone in these days. A Positive Technologies report of 2017 showed how all of the websites and web applications have at least one well-known vulnerability. The same report shows how the 70% of websites and web applications have at least one high severity vulnerability as well.   As a matter of Read more »

GDPR Assessment: How can I assess my Compliance?

GDPR Assessment The GDPR Assessment is a compliance assessment in terms of GDPR, the new Data Privacy  European law. As a matter of fact, companies have a growing need: they need to be compliant. To this end, a GDPR Assessment is necessary. This assessment, however, not only provides for indicators showing your compliance level but it Read more »

Wi-fi Security: WPA3 is not hacker proof.

Wi-Fi Security? It’s time. Wi-Fi Alliance launched WPA3. It will certainly ensure a higher CyberSecurity level and, as a consequence, it will benefit users both in terms of privacy and GDPR Compliance. However, WPA3 does not make wireless networks hacker proof. First of alla, let’s have a look together at the features and benefits of WPA3. Read more »

GDPR Compliance: Swascan – top provider of GDPR services

GDPR Compliance Nowadays, GDPR Compliance is a really hot topic. As a matter of fact, there is a lot of data supporting this idea. The market related to GDPR services is estimated around 750 million dollars in 2017. Looking ahead, this amount is going to grow and grow and in 5 years it should get to 2.6 billion dollars. The Read more »

Data processing: introduction and explanation

Data processing: definition The fourth article of the new European legislation ( GDPR ) describes data processing as follows: “any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, Read more »

Data controller: explanation of the figure and duties

Data Controller According to what the new Data Protection European Regulation ( GDPR ) states, the data controller – described in article 4 – is: “the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the Read more »

CyberSecurity trends: what is going to happen in 2018?

Top 5 CyberSecurity trends for 2018 CyberSecurity trends: 2018 will surely be an interesting year as far as Cybersecurity is concerned. We already witnessed some big incidents, including data breaches and tumultuous developments regarding cryptocurrencies that led Governments of a lot of countries to issue official directives and implement actions in these directions. CyberSecurity trends: IoT & CyberSecurity threats We should Read more »