

Discover more from Cybersecurity Tips
🐦 Twitter data breach, another Google ban and how Google Authenticator works - Newsletter #4
Plus: a few interesting things I read last month.
As we’re right in the silly season, I decided to change the Newsletter format, making it lighter and easier to read. Think of it as a pocket-sized newsletter for people laying on the beach but can’t forget about Cybersecurity. I know you exist 🏖️.
What I read last month
Digital Services Package: Commission welcomes the adoption by the European Parliament of the EU's new rulebook for digital services (European Comission)
Facebook data privacy scandal: A cheat sheet (Tech Republic)
DNS Esoterica - Why you can't dig Switzerland (Terrence Eden’s Blog)
Your compliance obligations under the UK’s Online Safety Bill; or, welcome to hell (WebDevLaw)
‘Zero Trust’ security is a poor choice of words (Mendhak) - Agree with this one and I’ll talk about this soon
TeamViewer installs suspicious font only useful for web fingerprinting (Ctrl.blog)
Will new UK data laws put adequacy agreement with EU at risk? (Techmonitor.ai)
Twitter data breach exposes contact details for 5.4M accounts; on sale for $30k (9to5Mac)
Denmark bans Gmail and Co from schools due to privacy concerns. (Tutanota)
People should be a LOT more mad about data collection than they are (Reddit)
On Twitter
This is indeed accurate. Well, sort of: if your InfoSec maturity is that low, you can spend 50k on the pentest and 450k on corrections. Either way, according to Cybersecurity Dive, the average ransomware payment is now 812k, so we might need to reconsider the calculations.


Very interesting list for those who prefer a Video-like learning experience. Go check it out.


The old Vendor Risk Assessment subject. This time, an Open Source developer was asked to fill a form by a corporation worth $31.5 billion dollars so they can use the software.
It certainly makes sense for the company to assess the software they use, but for an Open Source software with no guarantees, it might be asking too much.


Very interesting visual explanation about how Google Authenticator works. If you, like me, use it everyday, this is useful to understand how the transaction is done.
At least someone has them 😂