Two-factor authentication hacked

Two-factor authentication hacked

Two-factor authentication (also known as 2FA) is used for additional security when logging in, which is otherwise usually only secured with a password and user name. In some cases, multi-factor authentication (MFA) is also used for this purpose. With some of these...
Photo transfer and data protection

Photo transfer and data protection

More and more banks are offering the so-called photo transfer service. Here, the account holder can take a photo of a bill he wants to pay with his smartphone. This bill is then paid immediately via the corresponding banking app. Quickly...
EDSA on the right of access according to Art. 15 DSGVO

EDSA on the right of access according to Art. 15 DSGVO

The right to information under Article 15 of the GDPR is one of the rights of the data subject under the GDPR. How far this right should ultimately extend in practice is legally considered controversial. Now, the European Data Protection Committee (EDSA; also "European Data Protection...
The 5 most common corporate data breaches

The 5 most common corporate data breaches

A wide variety of companies regularly report data privacy violations to the data protection authorities. For the companies concerned, this usually means high financial and reputational consequences. That is why they attach great importance to precautionary measures. Besides...
Log4j vulnerability - What to do?

Log4j vulnerability - What to do?

It has recently become known that the software library called Log4j has a security vulnerability. This can be exploited very easily to take over entire IT systems or to tap data. Many cybercriminals are now exploiting this, while IT professionals...
DSB buchen
en_USEnglish