#surveillance-via-apps

[ follow ]
#data-privacy
#privacy
Privacy professionals
fromArs Technica
1 day ago

Perplexity's "Incognito Mode" is a "sham," lawsuit says

Perplexity's AI allegedly shares sensitive user chats with Google and Meta without consent, raising significant privacy concerns.
fromTechdirt
2 weeks ago
Privacy professionals

The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do.

Privacy professionals
fromArs Technica
1 day ago

Perplexity's "Incognito Mode" is a "sham," lawsuit says

Perplexity's AI allegedly shares sensitive user chats with Google and Meta without consent, raising significant privacy concerns.
Privacy professionals
fromTechdirt
2 weeks ago

The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do.

Government agencies use online advertising data to track individuals without warrants, raising significant privacy concerns.
Law
fromABA Journal
2 days ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
#cybersecurity
fromTechCrunch
1 hour ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

fromTechCrunch
23 hours ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Information security
fromSecurityWeek
1 day ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
Information security
fromSecuritymagazine
1 day ago

Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset

Cybersecurity involves both technical measures and effective communication to maintain stakeholder trust during incidents.
Information security
fromThe Hacker News
5 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Information security
fromTechCrunch
1 hour ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
EU data protection
fromSecurityWeek
4 hours ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
EU data protection
fromTechCrunch
23 hours ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromSecurityWeek
1 day ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
Information security
fromSecuritymagazine
1 day ago

Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset

Cybersecurity involves both technical measures and effective communication to maintain stakeholder trust during incidents.
Information security
fromThe Hacker News
5 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Marketing tech
fromExchangewire
1 day ago

The Stack: AI Surges while Social Platforms Face Scrutiny

AI is growing rapidly, streaming models are evolving, and regulatory pressures on platforms are increasing globally.
Cryptocurrency
fromnews.bitcoin.com
3 hours ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#ai
fromFortune
16 hours ago
Digital life

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Digital life
fromFortune
16 hours ago

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

AI-generated child sexual abuse material is surging, fundamentally changing targeting methods and overwhelming investigators.
Roam Research
fromThe Verge
1 day ago

PSA: Anyone with a link can view your Granola notes by default

Granola's AI note-taking app makes user notes viewable by default, raising privacy concerns for sensitive information.
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Education
fromFox News
1 day ago

NYC schools track bathroom time with digital hall passes

SmartPass digital hall pass system in NYC schools tracks student movement and time outside class, aiming to improve safety and accountability.
Apple
fromMail Online
19 hours ago

Apple issues warning to iPhone users over stealthy attack: Act NOW

Apple has released critical iOS updates to protect against the DarkSword cyberattack method targeting vulnerable devices.
Remote teams
fromSouth China Morning Post
1 day ago

Indonesia and Malaysia require geo-tracking for civil servants working from home

Governments in Indonesia and Malaysia implement strict work-from-home policies for civil servants to reduce fuel consumption amid rising oil prices.
#social-media
Social media marketing
fromTechCrunch
16 hours ago

The anonymous social app that thinks it can work in Saudi Arabia | TechCrunch

Fizz is expanding globally, successfully launching in Saudi Arabia and aiming to become a generational social product beyond college campuses.
Digital life
fromExchangewire
4 days ago

Regulating Social Media: Where do we go from here?

Social media platforms are designed for addiction, prompting global legislative actions to restrict children's access.
Social media marketing
fromTechCrunch
16 hours ago

The anonymous social app that thinks it can work in Saudi Arabia | TechCrunch

Fizz is expanding globally, successfully launching in Saudi Arabia and aiming to become a generational social product beyond college campuses.
Digital life
fromExchangewire
4 days ago

Regulating Social Media: Where do we go from here?

Social media platforms are designed for addiction, prompting global legislative actions to restrict children's access.
Silicon Valley
fromFast Company
1 day ago

Baltimore is pushing back against AI's worst excesses. What happens next could reshape American tech

Baltimore is addressing the risks of AI, exemplified by a lawsuit against xAI for generating illegal content.
#openclaw
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
18 hours ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
18 hours ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
fromFuturism
1 day ago

Delivery Robot Companies in Trouble as Bot Become Targets for Vandalism

Out of the company's first 80,000 deliveries the bots finished on campus, about 1,600 involved incidents of vandalism. At a cost of $2,500 per Kiwibot, the damage adds up quick.
London startup
Photography
fromWIRED
6 days ago

Your Photos Are Probably Giving Away Your Location. Here's How to Stop That

Photos contain metadata like EXIF data, including location, which can be useful but may compromise privacy when shared.
Wearables
fromMakeUseOf
4 days ago

Your phone's Bluetooth is broadcasting more than you think - here's how to limit it

Bluetooth remains active and broadcasts data even when not connected, potentially allowing for tracking without user consent.
US news
fromFuturism
6 days ago

Ominous Surveillance "Scarecrows" Appearing Across America

Police technology, including COWs, is rapidly growing, with the law enforcement equipment market projected to reach $11.7 billion by 2025.
fromTheregister
22 hours ago

NHS staff resist using Palantir software

One official reportedly described Palantir as 'ethically bankrupt' in justifying his refusal to use the software, and noted that he knows of coworkers who deliberately slow their work pace when forced to use the system.
EU data protection
#meta
Information security
fromWIRED
17 hours ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Law
fromTechCrunch
3 days ago

Meta was finally held accountable for harming teens. Now what? | TechCrunch

Meta has been held liable for endangering child safety and designing addictive apps, leading to significant legal consequences.
Information security
fromWIRED
17 hours ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Law
fromTechCrunch
3 days ago

Meta was finally held accountable for harming teens. Now what? | TechCrunch

Meta has been held liable for endangering child safety and designing addictive apps, leading to significant legal consequences.
#data-breach
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSecurityWeek
1 day ago

T-Mobile Sets the Record Straight on Latest Data Breach Filing

T-Mobile confirmed a data breach was caused by an insider incident affecting only one account with limited information exposed.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
1 day ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSecurityWeek
1 day ago

T-Mobile Sets the Record Straight on Latest Data Breach Filing

T-Mobile confirmed a data breach was caused by an insider incident affecting only one account with limited information exposed.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
1 day ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
#ai-ethics
Higher education
fromThe Nation
1 day ago

How Gaza Broke Big Tech's Campus Pipeline

Students are protesting the use of technology in military actions, particularly in relation to Israel's actions in Gaza.
Social media marketing
fromBGR
2 days ago

Instagram Finally Found A Premium Feature You Might Want - And It's A Little Creepy - BGR

Instagram is a major revenue source for Meta, generating $71 billion by 2025, and is testing a subscription service with new features.
Privacy professionals
fromTechCrunch
2 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
fromnews.bitcoin.com
7 hours ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Guy Zyskind emphasized that the whitepaper reframes the conversation around quantum threats, stating that the traditional 10-year migration window now seems dangerously optimistic given Google's findings.
Information security
Remote teams
fromCity AM
1 week ago

The Debate: Is employee tracking justified in the modern workplace?

Tracking junior employees' work hours ensures accountability and productivity, addressing issues of underreporting and resource allocation.
#government-surveillance
US politics
fromInvestigative Post
2 weeks ago

How the government can track your movements

Federal law enforcement agencies purchase location data from internet advertisers and data brokers to track individuals' phones without traditional warrants or oversight.
Privacy professionals
fromAV Club
1 month ago

Border Protection gathered location data from games and apps to track people's movements

U.S. Customs and Border Protection purchases location data from ad agencies through real-time bidding to track individuals' movements without warrants or consent.
US politics
fromInvestigative Post
2 weeks ago

How the government can track your movements

Federal law enforcement agencies purchase location data from internet advertisers and data brokers to track individuals' phones without traditional warrants or oversight.
Privacy professionals
fromAV Club
1 month ago

Border Protection gathered location data from games and apps to track people's movements

U.S. Customs and Border Protection purchases location data from ad agencies through real-time bidding to track individuals' movements without warrants or consent.
Digital life
fromDigiday
4 days ago

In graphic detail: The long road to accountability for social media platforms

Big tech giants are now held accountable for harming children, marking a significant shift in social media regulation.
Privacy professionals
fromZDNET
1 day ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
Privacy technologies
fromZDNET
4 days ago

The best way to protect your phone from a warrantless search in 2026

US authorities are increasingly aggressive in detaining and seizing devices, with biometrics remaining vulnerable.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
fromWIRED
1 day ago

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
Privacy professionals
fromComputerworld
19 hours ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Privacy professionals
fromSecurityWeek
3 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Digital life
fromGadget Review
2 weeks ago

Your Devices Spy Today, Tomorrow They Will Make Decisions Behind Your Back

Surveillance technology embedded in smart TVs, phones, and digital devices prioritizes advertiser profit and engagement metrics over user privacy and genuine preferences.
fromElectronic Frontier Foundation
1 week ago

Traffic Violation! License Plate Reader Mission Creep Is Already Here

In December 2025, Georgia State Patrol ticketed a motorcyclist for holding a cell phone in his hand, captured on Flock Camera, raising concerns about ALPR misuse.
Privacy technologies
Privacy professionals
fromSilicon Canals
1 day ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
Privacy technologies
fromZDNET
1 week ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
Information security
fromSecuritymagazine
3 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromTheregister
3 days ago

Claude Code's source reveals extent of system access

Claude Code has significant control over devices, raising concerns about data retention and potential misuse in sensitive environments.
Privacy professionals
fromThe Verge
1 day ago

Pinterest said he violated laid-off colleagues' privacy. Now he's going public

A former Pinterest engineer claims he was unjustly fired for sharing a tool that revealed employee layoffs.
Information security
fromSecurityWeek
3 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
#online-privacy
fromZDNET
2 weeks ago
Privacy technologies

You're being tracked online - 9 easy ways to stop the surveillance

Privacy professionals
fromSlashGear
1 week ago

Apps That Track You: 17 Of The Worst Offenders In Privacy Invasion - SlashGear

Online privacy is compromised by data collection from apps, with Meta's platforms being significant offenders.
Privacy technologies
fromZDNET
2 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy professionals
fromSlashGear
1 week ago

Apps That Track You: 17 Of The Worst Offenders In Privacy Invasion - SlashGear

Online privacy is compromised by data collection from apps, with Meta's platforms being significant offenders.
Privacy professionals
fromHer Campus
4 days ago

Who's Watching The Watchers? AI, Age Verification, And Online Privacy

Parents are increasingly concerned about children's exposure to harmful online content despite regulations like CIPA and platforms like YouTube Kids.
Privacy technologies
fromSecuritymagazine
2 weeks ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
#surveillance
Privacy professionals
fromSilicon Canals
5 days ago

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

The infrastructure for mass surveillance already exists, relying on pre-existing technology and data rather than new AI advancements.
Privacy professionals
fromSilicon Canals
5 days ago

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

The infrastructure for mass surveillance already exists, relying on pre-existing technology and data rather than new AI advancements.
Privacy technologies
fromMedium
2 weeks ago

Your phone isn't eavesdropping. The reality is stranger.

Most people believe phones listen to conversations for targeted ads, but research suggests the actual explanation is more complex and potentially more troubling than simple audio eavesdropping.
Privacy technologies
fromTech Times
3 weeks ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
#ring
fromFuturism
1 month ago
Privacy technologies

All These Ring Cameras Are Creating a "Surveillance Nightmare," Critics Say

fromFuturism
1 month ago
Privacy technologies

All These Ring Cameras Are Creating a "Surveillance Nightmare," Critics Say

#fbi
Privacy professionals
fromEngadget
2 weeks ago

Don't be surprised that the FBI is buying your location data

The FBI purchases location data from advertising companies to track US citizens, circumventing Fourth Amendment protections established in Carpenter v. United States.
fromMedium
1 month ago

Surveillance by default, consent by assumption

When presence becomes participation Ring's Search Party feature queries nearby cameras when a missing pet is reported. As Senator Ed Markey observed, this closely resembles neighbourhood-scale surveillance infrastructure. Crucially, Search Party does not operate in isolation. Ring's Familiar Faces feature applies facial recognition to anyone passing within camera range, continuously scanning and categorising faces without their explicit knowledge or agreement.
Privacy technologies
Privacy professionals
fromwww.theguardian.com
4 weeks ago

Who is responsible for our creeping surveillance age? Chances are, it's you | Tatum Hunter

Surveillance culture, once driven by governments and corporations, now involves civilians monitoring friends, family, and strangers, reflecting widespread desensitization to invasive data collection practices.
#smartphone-privacy
fromSlashGear
1 month ago

Changing 5 Phone Settings Can Limit The Amount Of Data Apps Collect About You - SlashGear

Only about a year old at that point, the App Store was changing people's relationship with software. Users were growing accustomed to the idea that the smartphone was a digital Swiss Army Knife, its glossy touchscreen waiting to be fitted with the right tool for any job. But what the public had not anticipated as we swiped and scrolled was that our phones might begin to watch us back.
Privacy technologies
Privacy technologies
fromZDNET
2 months ago

Heading out to protest? Disable your phone's biometrics, and 6 more ways to protect your privacy

Smartphones empower protesters to communicate and document events but can also threaten privacy; passcodes can offer more protection than biometrics against unauthorized access.
[ Load more ]