A new publication in a reputable journal
Dr. Daniel Dimov has just published an article entitled “Strategies for Dealing with Reverse Domain Name Hijacking” in the Journal of Internet Law edited by DLA Piper. The article is available in issue 3 of volume 27 of the journal.
The article provides guidance on how to identify domain name hijacking and broadly outlines the strategies a respondent can use to deal with it.
We got a certificate from Harvard Business School
Our privacy lawyer, Rasa Juzenaite LLM, obtained a Certificate in Business Analytics from Harvard Business School. The certificate demonstrates (i) an ability to interpret data to make informed business decisions, (ii) recognize trends and summarize data sets, (iii) analyze complex relationships between variables, (iv) develop and test hypotheses, (v) craft survey questions and reach...
We are now ECPC-B DPO certified
In December 2022, our co-founder, Rasa Juzenaite, who is a Certified Information Privacy Professional (CIPP/Europe and the United States) and has a Master’s Degree in IP and ICT law (Brussels) added a new certification to her portfolio. More particularly, she became a Certified Data Protection Officer (DPO).
The certification was issued by the European Centre on Privacy...
Key findings from ESG’s Modern Application Development Security report
A deep dive into security issuesIn August 2020, the Enterprise Strategy Group (ESG) published its report, “Modern Application Development Security.” ESG is a company specialized in IT-related research. It provides market intelligence to companies all over the world. To compile its report, ESG surveyed 378 cybersecurity, application development...
Octopus Scanner malware: What it is, how it works and how to prevent it | Malware spotlight
IntroductionOctopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has been extensively discussed in numerous information security publications. This type of malware attacks repositories on...
Business email compromise (BEC) scams level up: How to spot the most sophisticated BEC attacks
Introduction to BEC attacksThe term “business email compromise” (BEC) refers to the use of email fraud with the aim to accomplish malicious purposes. BEC attacks usually rely on the lack of information security awareness of the employees of the targeted...
Tesla Model 3 vulnerability: What you need to know about the web browser bug
IntroductionIn 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Tesla Model 3 automobile. If a user of the car’s boarding computer visits a specific website, the...
The State of the Art and the Future of GDPR Compliance Software
The General Data Protection Regulation (GDPR) is an EU regulation that became effective on the 25th of May 2018. It imposes a number of obligations on individuals and entities collecting personal data of EU residents, including, but not limited to, (i) implementing appropriate technical and organizational measures to ensure the security of the collected personal data, (ii) processing...
Understanding Privacy Risks and Benefits of Skype Communication
Although Skype is considered by many to be a secure and privacy-oriented Voice over Internet Protocol (VoIP) messenger, privacy activists often warn about the threats to privacy posed by it.
If you don’t already know, Skype allows us to take part in verbal conversations over the Internet. In 2018, it had about 300 million monthly active users, so needless to say it’s still widely...
FinCEN BEC attacks report: Analysis
The Financial Crimes Enforcement Network (FinCEN) is a U.S. government institution responsible for collecting and analyzing financial information with the aim of combating financial crimes. In 2016, FinCEN issued an advisory to financial institutions on business email compromise (BEC) fraud. On the 16th of July 2019, FinCEN updated the 2016 advisory.
In this article, we’ll examine the five...