New Approach to GDPR: Using Machine Learning to Enhance Privacy

The General Data Protection Regulation (GDPR) will come into effect on the 25th of May. Although this particular law applies to the European Union, it does not only concern businesses registered there: every entity that has EU clients will have to comply with it. GDPR has no precedent. However, it could become the worldwide gold standard of privacy laws. In …

New DNS Encryption Tools Accelerate Privacy Online

Brand new Domain Naming Service (DNS) Cloudflare is gaining firm ground among internet users. Unlike many other DNS providers, Cloudflare positions itself as strictly privacy-oriented service. According to CUJO AI data, it has acquired nearly 4% of the total DNS market since its launch on April 1st and now stands as the fifth most popular DNS provider. Moreover, Google and …

Don’t get burnt by the Firefox

Beware: Critical Vulnerability Discovered in Mozilla Firefox Browser

What happened? On 29th of January Mozilla developer, Johann Hofmann reported that unsanitized output in the browser UI could lead to arbitrary code execution. On January 30th, Mozilla has released a security update to address a vulnerability (CVE-2018-5124) in Firefox. Exploitation of this vulnerability may allow an attacker to take control of an affected system. Read an article about the …

Connected home is way more fun than this

Smart Home Security: What You Should Know?

By Kestas Malakauskas Home automation is the future. Smart thermostats and lighting systems make your home look and feel just right. Smart refrigerator orders food while you enjoy a lazy night in with a selection of movies, picked to fit your mood. All of that is already a reality or just a few years away. How to make sure that …

Why You Shouldn’t Trust Two Factor Authentication?

On June 26th Wired shared: Since two-factor authentication became the norm for web services that care about securing your accounts, it’s started to feel like a security blanket, an extra layer keeping your data safe no matter whether your password is as strong as 8$&]$@I)9[P&4^s or as dumb as dadada. Two-factor authentication (2FA) works by generating a temporary code, which …

Lawyers: how you can protect yourself from hackers

The National Law Review called 2016: “the year of the breach,” with headlines regularly proclaiming a new hack or attack on a law firm. It’s is because law firms and lawyers are privy to sensitive information. They are entrusted with the personal data and intellectual property of their clients. A breach of security can lead to business downtime, denial of …