September 2020 – Cybersecurity & Data Safety: perpetual awareness and innovation presupposed

1social

Messengers and social media can serve to disclose personal data

I was watching The Social Dilemma on Netflix earlier this month and highly recommend it. The quintessence of the film is that today’s technology that connects us also monetizes us – or even controls us – with frightening consequences.  Although we are aware of that already – and in general the fact that nothing is […]

Messengers and social media can serve to disclose personal data Read More »

onlineD

Not all data is created equal

In marketing, data is divided into first, second, and third-party data, based on their origin. Third party data, which currently still is the basis for dominant forms of advertising, such as programmatic advertising and thus for a large part of personalization in marketing, in particular in the form of cookies, loses in many cases applicability

Not all data is created equal Read More »

freel

What needs to be considered in terms of data protection when cooperating with freelancers

Hiring freelancers has many advantages for companies: they do not have to pay social security contributions for them, they can be used flexibly, are often specialized in a certain subject area and can be implemented for projects that arise at short notice.

What needs to be considered in terms of data protection when cooperating with freelancers Read More »

globalD

Growing security risks to drive APAC managed security services revenue to US$17bn in 2024

Growing security risks and incidents of ransomware have been forcing enterprises across the Asia-Pacific (APAC) region to search for trusted and competent security services providers. Against this backdrop, managed security services (MSS) revenue in the region is estimated to reach US$17bn in 2024, according to the data and analytics company GlobalData.

Growing security risks to drive APAC managed security services revenue to US$17bn in 2024 Read More »

EAT

The importance of E-A-T in content creation

Google’s goal is to provide searchers with high-quality answers to every question they could possibly ask. To do this, it relies on a complex collection of rules and ranking factors. Some of these factors fall under the category of E-A-T, meaning Expertise, Authoritativeness and Trustworthiness.

The importance of E-A-T in content creation Read More »

4cyber

List of Asian countries most at risk of RDP brute-force attacks

The number of people working from home has risen astronomically this year due to Covid-19. Consequently, numerous companies have been reliant on remote desktop connections to enable their employees to access their work computer from home. One of the most popular applications for accessing Windows workstations and servers is Microsoft’s remote desktop protocol (RDP), which

List of Asian countries most at risk of RDP brute-force attacks Read More »

onlineS

Malaysia successfully fighting streaming piracy

A new study, researching content viewing behavior of Malaysian consumers, has found a massive 64% decrease in consumers accessing piracy websites over the past 12 months, due to the Ministry of Domestic Trade and Consumer Affairs’ (MDTCA) site blocking efforts.The survey, commissioned by AVIA’s Coalition Against Piracy (CAP) and conducted by the international research and

Malaysia successfully fighting streaming piracy Read More »

wls cisco 3428611 fb

Novel Linux malware targets VoIP softswitches

ESET researchers have discovered a previously unknown Linux malware that targets Voice over IP (VoIP) soft switches. The malicious program was named by the analysts of the European IT security manufacturer CDRThief. It is designed to target a very specific VoIP platform, used by two China-produced softswitches (software switches): Linknat VOS2009 and VOS3000. A softswitch

Novel Linux malware targets VoIP softswitches Read More »

middle

Manipulated language AI can write manifestos that appear human and radicalize automatically

Shockingly, researchers at the Middlebury Institute of International Studies at Monterey, California, managed to teach Artificial Intelligence (AI) “GPT-3” to believe in the “QAnon” conspiracy theories that are widely spread on the Internet. Generative Pre-trained Transformer 3 (GPT-3) is an autoregressive language model that uses deep learning to produce human-like text. It is the third-generation

Manipulated language AI can write manifestos that appear human and radicalize automatically Read More »

ecommerce

Sentryc stops product piracy on the internet

Every year, brand abuse and product piracy result in losses of billions in e-commerce. The start-up Sentryc wants to change this by using AI to scan the Internet and remove plagiarism almost automatically. The young technology company, founded in 2019 and headquartered in Berlin, offers companies a unique digital solution with its proprietary brand protection

Sentryc stops product piracy on the internet Read More »