Who owns your data, and what privacy laws govern it? Well, that depends on where you live. If you own it, you should have control over it. If you don’t own it, how secure is it? Recent data breaches that affected the majority of Americans have begun a national dialogue around the security of personal data. In fact, the high… Read more

November 25, 2016 - Guest Blogger Lars Birkeland, Marketing Director of Promon
Tesla cars can be stolen by hacking the app

Our researchers have demonstrated that because of lack of security in the Tesla smartphone app, cyber criminals could take control of the company’s vehicles, to the point where they can track and locate the car in real-time, and unlock and drive the car away unhindered. Such a hack gives criminals total control of the vehicle, providing additional functionality to that… Read more

Top 5 Security Stories in 2015

2015 was a remarkable year in the IT security area. There was never a dull moment with novel attack methods, new enemies, massive breaches of healthcare organizations and the OPM, Hacking Team’s embarrassing takedown, and cars and toys becoming targets. Hard to imagine it all fit into just 365 days and it doesn’t look like it will slow down one… Read more

October 14, 2015 - Jan Valcke
system hacked

The lyrics, “Get your motor running, head out on the highway” may bring a lot more adventure in the future. Two security researchers wirelessly hacked a Jeep while it was being driven. They were able to take car hacking to the next level. They moved beyond dashboard functions and were able to compromise critical control mechanisms such as steering, transmission… Read more

Privacy under siege

Earlier this year VASCO organized its third Trusted Digital Identity Symposium in Brussels, Belgium. The event enables C-level executives to gain a better understanding of the applications, business challenges and opportunities related to digital identity. Leading speakers from the public sector, financial industry and other market sectors, share their vision on how new trends, such as: mobile applications and the… Read more

How much is your customer’s privacy worth?

At the Trusted Digital Identity Symposium in Brussels, Steven Ackx spoke about privacy as a new currency. The director of PwC Advisory Services stated that we are already willing to give our contact details in exchange for access to certain websites and information. Would we give our email address to be able to read an interesting article? The audience nodded… Read more


A recent study around the Value of Our Digital Identity by the Boston Consulting Group, shows that on average 76% of the people worldwide agree with the fact that they have to be cautious when sharing personal information online. Surprisingly, only 10% of the respondents indicated that they have taken more than 6 common privacy-protection measures, such as: update their… Read more