Internet

Legitimate Interests Assessments as a Science

Legitimate Interests Assessments as a Science

When I started, my experience was initially characterized by having absolutely zero understanding of the concept. Today, I act as DPO for multiple corporations. One such corporation is entirely US-facing and HIPAA-compliant and the other corporation is globally-facing, making compliance an even more in-depth study for me personally. The journey from then until now has […]

Legitimate Interests Assessments as a Science Read More »

Ongoing Phishing Attack Targets Facebook 'Meta Business Administrators'

Ongoing Phishing Attack Targets Facebook ‘Meta Business Administrators’

There is currently an ongoing phishing campaign targeting Meta Business Admins, that uses Facebook Acceptable Use and Community Policies in a sophisticated social engineering plot to trick the administrator into submitting sensitive credentials or potentially even to gain control of the Admin’s remote device. …What’s worse: the mechanism of delivery for this attack? Messenger, Meta’s

Ongoing Phishing Attack Targets Facebook ‘Meta Business Administrators’ Read More »

Characteristics of Phishing Email Scams – What to Watch For

Characteristics of Phishing Email Scams – What to Watch For

Understanding typical characteristics of phishing email scams is the best way to prevent falling victim to fraud. As the incidence of phishing attacks continues to rise, familiarizing oneself with phishing common denominators might be a valuable use of time. What is Phishing? Phishing is a cyber attack in which victims are tricked into providing sensitive

Characteristics of Phishing Email Scams – What to Watch For Read More »