Blog

RSS

11 results

  • Phishing Campaigns Regarding The Coronavirus

    The alert situation caused by the coronavirus at a global level is a dangerous breeding ground for phishing attacks, which are being carried out internationally through instant messaging services, e-mail and any social media. Cybercriminals always try to take advantage of situations of fear and...

    Read more

  • Virus

    Notification of personal data security breaches during the state of alarm

    The critical situation caused by the COVID-19 pandemic at a global level has forced us to change our habits radically, to adopt social distancing measures and to use teleworking tools in order to continue performing professional tasks. This has led to an increase in risks and threats that take...

    Read more

  • Cifrado homomorfico

    Encryption and Privacy III: Homomorphic encryption

    In the framework of “Encryption and Privacy”, this article focuses on homomorphic encryption. This privacy by default technique is suitable for cases where a controller contracts a processor to carry out part of the processing and the controller wishes to ensure, from a technical point of view, that...

    Read more

  • blog acortadores url

    URL shorteners

    Widespread use of instant messaging tools, microblogging services and other social media with character limitation functions has led to a generalisation of shortened links (URLs) to share web addresses. However, when we click on a short URL we cannot be sure of where it will point to, and this may...

    Read more

  • IoT II

    IoT (II): from the internet of things to the internet of bodies

    The advancement of hyperconnected technology is increasing these days. The Internet of Things or “IoT” is a reality that has reached our houses through all sorts of “intelligent” devices that we may find even in supermarkets but also in vehicles and on our bodies. In this last case, new risks for...

    Read more

  • Reuniones online

    Privacy in Online Meetings

    Virtual online meetings via voice calls, video or web services are a common feature of today's work and teleworking, which has been greatly increased due to the COVID-19 pandemic. Although we are increasingly aware of the need to protect our privacy and security online, virtual meetings require us...

    Read more

  • Blog - Brechas en entornos de PRE

    Personal Data Breaches: Development and Pre-Production Environments

    Frequently, major personal data breaches do not occur in the most important systems of an organisation, but in secondary systems or systems considered less important but which hold a large amount of information or may be the gateway to other systems. This is the case of test, pre-production or...

    Read more

  • Blog: Reconocimiento facial

    Use of biometric data: Assessment from a data protection perspective

    Processing operations involving biometric data operations can be used for many different purposes, such as proof of life, identification, authentication, tracking, profiling, automatic decisions, etc. Biometric operations can use different techniques, some of them simultaneously, and the same...

    Read more

  • machine-learning

    Neurodata and neurotechnology: privacy and protection of personal data

    Recent advances in neuro-technology and artificial intelligence are enabling the emergence of a growing number of connected devices that monitor brain activity for different purposes. 

    Read more