Legal, privacy, and security concerns about driverless cars
Application security Legal Analysis Malware Analysis Press Privacy Security awarenessAugust 23, 2024
In the last five years, there has been a steady increase in the number of driverless cars. First, such cars were launched in the city of Phoenix...
Our partner, Rasa Juzenaite LLM, CIPP/E/US,
News & EventsAugust 23, 2024
was accepted as a PhD candidate at the Gent University and, in parallel with her work for Dimov Internet Law Consulting, will engage in writing a...
A new publication in a reputable journal
News & Events PublicationsSeptember 28, 2023
Dr. Daniel Dimov has just published an article entitled “Strategies for Dealing with Reverse Domain Name Hijacking” in the...
We got a certificate from Harvard Business School
Certifications News & EventsAugust 7, 2023
Our privacy lawyer, Rasa Juzenaite LLM, obtained a Certificate in Business Analytics from Harvard Business School. The certificate demonstrates...
We are now ECPC-B DPO certified
Certifications News & EventsJanuary 30, 2023
In December 2022, our co-founder, Rasa Juzenaite, who is a Certified Information Privacy Professional (CIPP/Europe and the United States) and has...
Key findings from ESG’s Modern Application Development Security report
Application security PressJune 16, 2021
A deep dive into security issues
In August 2020, the Enterprise Strategy Group (ESG) published its report, “Modern Application Development...
Octopus Scanner malware: What it is, how it works and how to prevent it | Malware spotlight
Malware Analysis PressDecember 9, 2020
Introduction
Octopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has been...
Business email compromise (BEC) scams level up: How to spot the most sophisticated BEC attacks
Press Security awarenessOctober 27, 2020
Introduction to BEC attacks
The term “business email compromise” (BEC) refers to the use of email fraud with the aim to accomplish malicious...
Tesla Model 3 vulnerability: What you need to know about the web browser bug
Malware Analysis News & EventsAugust 5, 2020
Introduction
In 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web...
The State of the Art and the Future of GDPR Compliance Software
BlogMarch 15, 2020
The General Data Protection Regulation (GDPR) is an EU regulation that became effective on the 25th of May 2018. It imposes a number of...
Understanding Privacy Risks and Benefits of Skype Communication
BlogJanuary 27, 2020
Although Skype is considered by many to be a secure and privacy-oriented Voice over Internet Protocol (VoIP) messenger, privacy activists often...
FinCEN BEC attacks report: Analysis
BlogNovember 20, 2019
The Financial Crimes Enforcement Network (FinCEN) is a U.S. government institution responsible for collecting and analyzing financial information...
Can We Expect a U.S. Federal Consumer Privacy Law?
BlogSeptember 6, 2019
The EU General Data Protection Regulation (GDPR) came into effect on the 25th of May 2018. Shortly afterwards, the EU data protection authorities...
How to ensure Windows Server is GDPR-compliant
BlogAugust 20, 2019
The General Data Protection Regulation (GDPR), an EU law regulating the processing of personal data, came into force on May 25th, 2018....
5 Common Myths About the GDPR
BlogJune 12, 2019
The EU General Data Protection Regulation (GDPR) entered into force on the 25th of May 2018. Since that time, companies have spent billions of...