Tag: Privacy
Autonomous Driving: The Race of the Robotaxis: China vs. the USA
Self-Driving Cars The US and China are fighting for supremacy in the industry. Beijing, Chandler The seat behind the wheel is empty when the robotaxi pulls up at the bus…
What the economy misses in the digital strategy of the traffic light
Fiber optic expansion in Lower Saxony Goals of the previous government that were not implemented. (Photo: dpa) Berlin The federal government’s new digital strategy is worrying the economy. Start-up representatives…
Uproar over online commercial register: politicians want to “fix the situation”
Berlin After protests from business against the new online commercial register, politicians are now reacting. The problem at stake: Personal data of company directors such as private addresses, dates of…
Twitter has to release data from 9,000 accounts to Musk
Elon Musk The Tesla CEO had requested the release of the data. (Photo: AP) Wilmington According to a US court, Twitter only has to hand over certain data in the…
Twitter only has to hand over certain data to Musk
Wilmington According to a US court, Twitter only has to hand over certain data in the dispute over the planned purchase by Tesla boss Elon Musk. The Delaware judge on…
Which tech giant is more reliable about privacy?
Today, it is an undeniable fact that big technology companies follow private data. Although companies say that they monitor this data to provide a better experience for their users, for…
Security on Twitter: Ex-employee raises serious allegations
Twitter One of Zatko’s allegations could also play a role in the current struggle between Twitter and tech billionaire Elon Musk. (Photo: imago images/ZUMA Wire) new York A former security…
Two vulnerabilities in the operating systems
Woman with iPhone The duplication of vulnerabilities is an alarming sign for experts. (Photo: imago images/MiS) Dusseldorf Unusually shortly after updating the operating systems last month, Apple is again performing…
Two vulnerabilities in the operating systems
Woman with iPhone The duplication of vulnerabilities is an alarming sign for experts. (Photo: imago images/MiS) Dusseldorf Unusually shortly after updating the operating systems last month, Apple is again performing…
Daughter in France paralyzed by hacker attack
Hensoldt The armaments group specializes in sensors and encryption technology. (Photo: dpa) Berlin, Dusseldorf The security company Hensoldt has been targeted by cybercriminals. In the past few days, hackers have…
Daughter in France paralyzed by hacker attack
Hensoldt The armaments group specializes in sensors and encryption technology. (Photo: dpa) Berlin, Dusseldorf The security company Hensoldt has been targeted by cybercriminals. In the past few days, hackers have…
Daughter in France paralyzed by hacker attack
Hensoldt The armaments group specializes in sensors and encryption technology. (Photo: dpa) Berlin, Dusseldorf The security company Hensoldt has been targeted by cybercriminals. In the past few days, hackers have…
Daughter in France paralyzed by hacker attack
Hensoldt The armaments group specializes in sensors and encryption technology. (Photo: dpa) Berlin, Dusseldorf The security company Hensoldt has been targeted by cybercriminals. In the past few days, hackers have…
How Chinese is Tiktok and how dangerous?
For Brendan Carr, top official of the US communications authority FCC, the matter is clear: In his eyes, the Tiktok video platform is an “unacceptable national security risk”. Massive amounts…
New challenges for companies and municipalities
One of the most urgent IT questions that companies and municipalities alike are currently asking is: Who can I entrust sensitive data to? An answer to this is becoming increasingly…
New challenges for companies and municipalities
One of the most urgent IT questions that companies and municipalities alike are currently asking is: Who can I entrust sensitive data to? An answer to this is becoming increasingly…
Technology is changing cyber security and the world of work
San Jose It’s hundreds of yellow lines chasing back and forth on the spinning globe. Each represents a cyber attack that is currently being detected. The animation is intended to…
Why there are no digital identities yet
Berlin It came as a shock to health insurance companies and all patients who trusted that their health data was securely stored in an electronic file. The Chaos Computer Club…
Privacy Scandal in the iOS Version of Instagram and Facebook!
It turned out that the iOS version of Instagram and Facebook violated user privacy. According to a study by a software developer, the internet browser embedded in the applications monitors…
Video Ident: Experts hack online identification
vulnerabilities Computer experts have tricked the identification measures of the health insurance companies. Many banks also use the systems. (Photo: obs) Berlin, Dusseldorf, Frankfurt Martin Tschirsich stands next to a…