Pegasus: il Garante privacy chiede informazioni alla società che distribuisce il software
In relazione alle recenti notizie di stampa che hanno fatto emergere un quadro preoccupante riguardo al trattamento di dati personali effettuato attraverso un indebito utilizzo del software Pegasus, il Garante per la protezione dei dati personali ha chiesto alla società che distribuisce il software di comunicare all’Autorità
https://www.garanteprivacy.it/home/docweb/-/docweb-display/docweb/9683988
In relazione alle recenti notizie di stampa che hanno fatto emergere un quadro preoccupante riguardo al trattamento di dati personali effettuato attraverso un indebito utilizzo del software Pegasus, il Garante per la protezione dei dati personali ha chiesto alla società che distribuisce il software di comunicare all’Autorità
https://www.garanteprivacy.it/home/docweb/-/docweb-display/docweb/9683988
www.garanteprivacy.it
Pegasus: il Garante privacy chiede informazioni alla società che distribuisce il software
EU Telecom Security Authorities discuss the challenges of Over-the-top Communications Services Supervision
The 34th meeting of the ECASEC expert group mainly focused on the challenges and open issues of the supervision of the Number-Independent Interpersonal Communication Services (NI-ICS) under the European Electronic Communications Code (EECC). NI-ICS, also referred to as over-the-top communication services (OTTs), are a new set of services in scope of the EU telecom [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/eu-telecom-security-authorities-discuss-the-challenges-of-over-the-top-communications-services-supervision
The 34th meeting of the ECASEC expert group mainly focused on the challenges and open issues of the supervision of the Number-Independent Interpersonal Communication Services (NI-ICS) under the European Electronic Communications Code (EECC). NI-ICS, also referred to as over-the-top communication services (OTTs), are a new set of services in scope of the EU telecom [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/eu-telecom-security-authorities-discuss-the-challenges-of-over-the-top-communications-services-supervision
www.enisa.europa.eu
EU Telecom Security Authorities discuss the challenges of Over-the-top Communications Services Supervision
The European Union Agency for Cybersecurity hosted the 34th meeting of the European Competent Authorities for Secure Electronic Communications (ECASEC).
Capture-The-Flag Competitions: all you ever wanted to know!
The European Union Agency for Cybersecurity releases a report addressing the contemporary use of Capture-The-Flag (CTF) competitions around the world. It explores how these competitions work and provides a high-level analysis of the dataset of the most recent major public events. Based on the results of the findings, the report suggests recommendations for consideration in [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/capture-the-flag-competitions-all-you-ever-wanted-to-know
The European Union Agency for Cybersecurity releases a report addressing the contemporary use of Capture-The-Flag (CTF) competitions around the world. It explores how these competitions work and provides a high-level analysis of the dataset of the most recent major public events. Based on the results of the findings, the report suggests recommendations for consideration in [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/capture-the-flag-competitions-all-you-ever-wanted-to-know
ENISA
Capture-The-Flag Competitions: all you ever wanted to know!
The report reviews the current formats of Capture-The-Flag (CTF) competitions at a global scale. Find out how they operate and what experts recommend for designing such events.
Phishing most common Cyber Incident faced by SMEs
The European Union Agency for Cybersecurity identifies the cybersecurity challenges SMEs face today and issues recommendations.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/phishing-most-common-cyber-incidents-faced-by-smes
The European Union Agency for Cybersecurity identifies the cybersecurity challenges SMEs face today and issues recommendations.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/phishing-most-common-cyber-incidents-faced-by-smes
ENISA
Phishing most common Cyber Incident faced by SMEs
The European Union Agency for Cybersecurity identifies the cybersecurity challenges SMEs face today and issues recommendations.
How to Help National Authorities deal with the Challenges of Mobile Networks Security?
The series of educational webinars on mobile networks security topics was organised in collaboration with OTE Academy. These webinars, scheduled over the month of June covered the three generations of mobile networks, namely 3G, 4G and 5G and also addressed the migration from these generations to 5G. Why a webinar series on mobile network [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/how-to-help-national-authorities-deal-with-the-challenges-of-mobile-networks-security
The series of educational webinars on mobile networks security topics was organised in collaboration with OTE Academy. These webinars, scheduled over the month of June covered the three generations of mobile networks, namely 3G, 4G and 5G and also addressed the migration from these generations to 5G. Why a webinar series on mobile network [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/how-to-help-national-authorities-deal-with-the-challenges-of-mobile-networks-security
www.enisa.europa.eu
How to Help National Authorities deal with the Challenges of Mobile Networks Security?
Organised this month by the European Union Agency for Cybersecurity (ENISA) webinars explored the security challenges of mobile networks.
Pandemic urges strong measures to address risks on the security of personal data
The 9th edition of the Annual Privacy Forum was co-organised by the EU Agency for Cybersecurity (ENISA), the European Commission (Directorate General for Communications Networks, Content and Technology) and the University of Oslo, with the support of the Norwegian Data Protection Authority.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/pandemic-urges-strong-measures-to-address-risks-on-the-security-of-personal-data
The 9th edition of the Annual Privacy Forum was co-organised by the EU Agency for Cybersecurity (ENISA), the European Commission (Directorate General for Communications Networks, Content and Technology) and the University of Oslo, with the support of the Norwegian Data Protection Authority.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/pandemic-urges-strong-measures-to-address-risks-on-the-security-of-personal-data
ENISA
Pandemic urges strong measures to address risks on the security of personal data
The 9th edition of the Annual Privacy Forum was co-organised by the EU Agency for Cybersecurity (ENISA), the European Commission (Directorate General for Communications Networks, Content and Technology) and the University of Oslo, with the support of the…
Can Digital Identity Solutions Benefit from Blockchain Technology?
What is blockchain technology used for? Blockchain technology was first introduced as a technology for digital currencies, but recently new application areas are emerging. There are proposals to use blockchain technology for electronic voting and secure sharing of medical data. Besides, there is now a booming market of NFTs (non-fungible tokens) underpinned by blockchain [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/can-digital-identity-solutions-benefit-from-blockchain-technology
What is blockchain technology used for? Blockchain technology was first introduced as a technology for digital currencies, but recently new application areas are emerging. There are proposals to use blockchain technology for electronic voting and secure sharing of medical data. Besides, there is now a booming market of NFTs (non-fungible tokens) underpinned by blockchain [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/can-digital-identity-solutions-benefit-from-blockchain-technology
www.enisa.europa.eu
Can Digital Identity Solutions Benefit from Blockchain Technology?
The knowledge building seminar organised today by the EU Agency for Cybersecurity explores the possible applications of blockchain technology in the field of digital identity and online trust.
Care amiche, cari amici, che seguite il mio canale, come vi sarete probabilmente accorti, ho appena aggiunto l'ENISA tra le fonti delle notizie pubblicate. Spero che sia di Vs gradimento.
L'ENISA è l'Ente Europeo per la Cybersecurity: "ENISA contributes to EU cyber policy, enhances the trustworthiness of ICT products, services and processes with cybersecurity certification schemes, cooperates with Member States and EU bodies, and helps Europe prepare for the cyber challenges of tomorrow."
L'ENISA è l'Ente Europeo per la Cybersecurity: "ENISA contributes to EU cyber policy, enhances the trustworthiness of ICT products, services and processes with cybersecurity certification schemes, cooperates with Member States and EU bodies, and helps Europe prepare for the cyber challenges of tomorrow."
Exploring Research Directions in Cybersecurity
Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the new EU Cybersecurity Strategy. In an effort to support this cybersecurity strategy, the European Union Agency for Cybersecurity releases today a report intended to look into digital strategic autonomy in the EU and suggests future research directions. [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/exploring-research-directions-in-cybersecurity
Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the new EU Cybersecurity Strategy. In an effort to support this cybersecurity strategy, the European Union Agency for Cybersecurity releases today a report intended to look into digital strategic autonomy in the EU and suggests future research directions. [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/exploring-research-directions-in-cybersecurity
ENISA
Exploring Research Directions in Cybersecurity
The European Union Agency for Cybersecurity has identified key research directions and innovation topics in cybersecurity to support the efforts of the EU towards a Digital Strategic Autonomy.
WAMR per recuperare i messaggi cancellati dalle chat WhatsApp
“How annoying it is when your friends delete their messages before you can see them?The curiosity takes over.… Source
by Zerozone.it - https://www.zerozone.it/tecnologia-privacy-e-sicurezza/wamr-per-recuperare-i-messaggi-cancellati-dalle-chat-whatsapp/19561
“How annoying it is when your friends delete their messages before you can see them?The curiosity takes over.… Source
by Zerozone.it - https://www.zerozone.it/tecnologia-privacy-e-sicurezza/wamr-per-recuperare-i-messaggi-cancellati-dalle-chat-whatsapp/19561
Il blog di Michele Pinassi
WAMR per recuperare i messaggi cancellati dalle chat WhatsApp • Il blog di Michele Pinassi
How annoying it is when your friends delete their messages before you can see them? The curiosity takes over. You just found the solution: WAMR!" Prima di tutto una precisazione…
Un attore ha messo in vendita, in data odierna, un presunto database del popolare social ClubHouse. Asserisce di avere un database di oltre 3,8 miliardi di numeri telefonici (cellulare + numero fisso + numero privato + numeri di lavoro).
Se confermato, è tra i #dataleak più grossi del 2021.
Se confermato, è tra i #dataleak più grossi del 2021.
Crossing a bridge: the first EU cybersecurity certification scheme is availed to the Commission
In July 2019, the EUCC was the first candidate cybersecurity certification Scheme request received by the EU Agency for Cybersecurity (ENISA) under the Cybersecurity Act. This scheme aims to serve as a successor to the currently existing schemes operating under the SOGIS MRA (Senior Officials Group Information Systems Security Mutual Recognition Agreement). It [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/crossing-a-bridge-the-first-eu-cybersecurity-certification-scheme-is-availed-to-the-commission
In July 2019, the EUCC was the first candidate cybersecurity certification Scheme request received by the EU Agency for Cybersecurity (ENISA) under the Cybersecurity Act. This scheme aims to serve as a successor to the currently existing schemes operating under the SOGIS MRA (Senior Officials Group Information Systems Security Mutual Recognition Agreement). It [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/crossing-a-bridge-the-first-eu-cybersecurity-certification-scheme-is-availed-to-the-commission
ENISA
Crossing a bridge: the first EU cybersecurity certification scheme is availed to the Commission
The European Union Agency for Cybersecurity formally transmits to the European Commission the first candidate cybersecurity certification scheme on Common Criteria.
First visit of Security Union Vice-President Margaritis Schinas to ENISA and announcement of ‘Team EU’ for the first Cyber World Cup
On the occasion of his visit to the EU Agency for Cybersecurity, Security Union Vice-President Margaritis Schinas announced today the preselection of players for Team EU who will participate in the first International Cybersecurity Challenge.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/vice-president-schinas-announces-team-eu-for-the-first-cyber-world-cup
On the occasion of his visit to the EU Agency for Cybersecurity, Security Union Vice-President Margaritis Schinas announced today the preselection of players for Team EU who will participate in the first International Cybersecurity Challenge.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/vice-president-schinas-announces-team-eu-for-the-first-cyber-world-cup
ENISA
First visit of Security Union Vice-President Margaritis Schinas to ENISA and announcement of ‘Team EU’ for the first Cyber World…
On the occasion of his visit to the EU Agency for Cybersecurity, Security Union Vice-President Margaritis Schinas announced today the preselection of players for Team EU who will participate in the first International Cybersecurity Challenge.
Remote Identity Proofing: How to spot the Fake from the Real?
What is identity proofing? Traditionally, proofing an individual’s identity consists in physically providing evidence of an individual’s identity, by presenting a government issued ID. Remote identify proofing methods are a way to identify individuals, without relying on physical presence. Remote identity proofing has received a lot of attention recently, due to the COVID-19 pandemic. [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/remote-identity-proofing-how-to-spot-the-fake-from-the-real
What is identity proofing? Traditionally, proofing an individual’s identity consists in physically providing evidence of an individual’s identity, by presenting a government issued ID. Remote identify proofing methods are a way to identify individuals, without relying on physical presence. Remote identity proofing has received a lot of attention recently, due to the COVID-19 pandemic. [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/remote-identity-proofing-how-to-spot-the-fake-from-the-real
www.enisa.europa.eu
Remote Identity Proofing: How to spot the Fake from the Real?
The workshop organised yesterday by the European Union Agency for Cybersecurity analysed attack scenarios on remote identification methods and discussed countermeasures
How to Secure the Connected & Automated Mobility (CAM) Ecosystem
The Connected and Automated Mobility sector in a nutshell Today, connected vehicles, environments and infrastructures need to be designed with new capabilities and features. These capabilities and features should aim to provide: increased safety; better vehicle performance; competitive digital products and services; improved comfort; environmental friendliness; user-friendly systems [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/how-to-secure-the-connected-automated-mobility-cam-ecosystem
The Connected and Automated Mobility sector in a nutshell Today, connected vehicles, environments and infrastructures need to be designed with new capabilities and features. These capabilities and features should aim to provide: increased safety; better vehicle performance; competitive digital products and services; improved comfort; environmental friendliness; user-friendly systems [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/how-to-secure-the-connected-automated-mobility-cam-ecosystem
ENISA
How to Secure the Connected & Automated Mobility (CAM) Ecosystem
The European Union Agency for Cybersecurity discloses an in-depth analysis of the cybersecurity challenges faced by the CAM sector and provides actionable recommendations to mitigate them.
New Light Shed on Capabilities in Energy & Healthcare
Sectoral CSIRTs and PSIRTs in a nutshell Europeans can count on more than 500 Computer Incident Response Teams (CSIRTs) and on the CSIRTs network to respond to cybersecurity incidents and attacks. In addition to CSIRTs, Product Security Incident Response Teams (PSIRTs) have emerged more recently. Their role is to manage the vulnerabilities of [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/new-light-shed-on-capabilities-in-energy-healthcare
Sectoral CSIRTs and PSIRTs in a nutshell Europeans can count on more than 500 Computer Incident Response Teams (CSIRTs) and on the CSIRTs network to respond to cybersecurity incidents and attacks. In addition to CSIRTs, Product Security Incident Response Teams (PSIRTs) have emerged more recently. Their role is to manage the vulnerabilities of [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/new-light-shed-on-capabilities-in-energy-healthcare
www.enisa.europa.eu
New Light Shed on Capabilities in Energy & Healthcare
A new report released today by the EU Agency for Cybersecurity (ENISA) showcases the product vulnerability management landscape, unveiling challenges faced by sectoral CSIRTs and PSIRTs.
EU Boost against cyberattacks: EU Agency for Cybersecurity welcomes proposal for the Joint Cyber Unit
The European Union Agency for Cybersecurity welcomes the European Commission proposal to launch the new Joint Cyber Unit which will act as a platform to ensure an EU coordinated response to large-scale cyber incidents and crises.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/eu-boost-against-cyberattacks-eu-agency-for-cybersecurity-welcomes-proposal-for-the-joint-cyber-unit
The European Union Agency for Cybersecurity welcomes the European Commission proposal to launch the new Joint Cyber Unit which will act as a platform to ensure an EU coordinated response to large-scale cyber incidents and crises.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/eu-boost-against-cyberattacks-eu-agency-for-cybersecurity-welcomes-proposal-for-the-joint-cyber-unit
ENISA
EU Boost against cyberattacks: EU Agency for Cybersecurity welcomes proposal for the Joint Cyber Unit
The European Union Agency for Cybersecurity welcomes the European Commission proposal to launch the new Joint Cyber Unit which will act as a platform to ensure an EU coordinated response to large-scale cyber incidents and crises.
EU Member States test rapid Cyber Crisis Management
CySOPEx 2021 is testing for the first time today the procedures for prompt and effective cyber crisis management in the EU to face large-scale, cross border cyber-attacks.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/eu-member-states-test-rapid-cyber-crisis-management
CySOPEx 2021 is testing for the first time today the procedures for prompt and effective cyber crisis management in the EU to face large-scale, cross border cyber-attacks.
by ENISA - https://www.enisa.europa.eu/news/enisa-news/eu-member-states-test-rapid-cyber-crisis-management
ENISA
EU Member States test rapid Cyber Crisis Management
CySOPEx 2021 is testing for the first time today the procedures for prompt and effective cyber crisis management in the EU to face large-scale, cross border cyber-attacks.
Calling on you, 5G Experts! Join us on 5G Cybersecurity Certification
The European Union Agency for Cybersecurity received earlier this year the request from the European Commission to prepare a new candidate certification scheme on 5G. The call launched today is intended to set up an ad hoc working group on 5G cybersecurity certification meant to support the Agency for the purpose of preparing the new [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/calling-on-you-5g-experts-join-us-on-5g-cybersecurity-certification
The European Union Agency for Cybersecurity received earlier this year the request from the European Commission to prepare a new candidate certification scheme on 5G. The call launched today is intended to set up an ad hoc working group on 5G cybersecurity certification meant to support the Agency for the purpose of preparing the new [...]
by ENISA - https://www.enisa.europa.eu/news/enisa-news/calling-on-you-5g-experts-join-us-on-5g-cybersecurity-certification
www.enisa.europa.eu
Calling on you, 5G Experts! Join us on 5G Cybersecurity Certification
The European Union Agency for Cybersecurity (ENISA) launches a call for expression of interest today to create an Ad Hoc Working Group on 5G cybersecurity certification.
Forwarded from Informa Pirata: informazione e notizie
Venerdì 30 luglio, inizio ore 21.
Un warm up di #HackMeeting:
"Le criptovalute spiegate alla nonna".
È possibile pagare il dorghiere virtuale rimanendo anonimƏ?
Il collettivo #lab61 e l’assemblea di gestione di #Nebbia, due comunità nate intorno alla critica dei meccanismi dello sviluppo tecnologico, invitano tuttƏ a fare quattro chiacchiere sul tema delle *criptovalute*.
"Scegliamo di essere parte del percorso che porta ad Hackmeeting 0x18, l’incontro annuale delle controculture digitali italiane, che quest’anno si terrà dal **3 al 5 Settembre** a Casona di Ponticelli (Bologna).
Parleremo di criptovalute non per amore della finanza, ma perchè pensiamo che ogni nuova tecnologia vada innanzitutto studiata."
#WarmUp #HackMeeting #Crypto #CriptoValute #0x18
https://www.lab61.org/2021/07/warmup-hackmeeting2021/
https://boccaccio.noblogs.org/post/2021/07/25/warm-up-per-hackmeeting/
https://hackmeeting.org/hackit21/
Un warm up di #HackMeeting:
"Le criptovalute spiegate alla nonna".
È possibile pagare il dorghiere virtuale rimanendo anonimƏ?
Il collettivo #lab61 e l’assemblea di gestione di #Nebbia, due comunità nate intorno alla critica dei meccanismi dello sviluppo tecnologico, invitano tuttƏ a fare quattro chiacchiere sul tema delle *criptovalute*.
"Scegliamo di essere parte del percorso che porta ad Hackmeeting 0x18, l’incontro annuale delle controculture digitali italiane, che quest’anno si terrà dal **3 al 5 Settembre** a Casona di Ponticelli (Bologna).
Parleremo di criptovalute non per amore della finanza, ma perchè pensiamo che ogni nuova tecnologia vada innanzitutto studiata."
#WarmUp #HackMeeting #Crypto #CriptoValute #0x18
https://www.lab61.org/2021/07/warmup-hackmeeting2021/
https://boccaccio.noblogs.org/post/2021/07/25/warm-up-per-hackmeeting/
https://hackmeeting.org/hackit21/
lab61 |
[30/07 – WarmUp HackMeeting] Le criptovalute spiegate alla nonna. @FOA BOCCACCIO – MONZA | LAB61
Le criptovalute spiegate alla nonna È possibile pagare il dorghiere virtuale rimanendo anonimƏ? Il collettivo lab61 e l’assemblea di gestione di Nebbia, due comunità nate intorno alla critica dei meccanismi dello sviluppo tecnologico, invitano tuttƏ a fare…