Showing only posts tagged privacy. Show all posts.

Fears for patient data after ransomware attack on NHS software supplier

Source

Attack being investigated for potential data theft as experts warn criminals could use stolen details as leverage A ransomware attack on an NHS software supplier last week is being investigated for potential theft of patient data, as experts warned that criminals could use personal information as leverage in negotiations …

Small businesses count cost of Apple’s privacy changes

Source

Enlarge (credit: Kentaroo Tryman | Getty Images ) Small businesses are cutting back marketing spending due to Apple’s sweeping privacy changes that have made it harder to target new customers online, in a growing trend that has led to billions of dollars in lost revenues for platforms like Facebook. Apple …

Ring Gives Videos to Police without a Warrant or User Consent

Source

Amazon has revealed that it gives police videos from its Ring doorbells without a warrant and without user consent. Ring recently revealed how often the answer to that question has been yes. The Amazon company responded to an inquiry from US Senator Ed Markey (D-Mass.), confirming that there have …

San Francisco Police Want Real-Time Access to Private Surveillance Cameras

Source

Surely no one could have predicted this : The new proposal—championed by Mayor London Breed after November’s wild weekend of orchestrated burglaries and theft in the San Francisco Bay Area—would authorize the police department to use non-city-owned security cameras and camera networks to live monitor “significant events …

New Browser De-anonymization Technique

Source

Researchers have a new way to de-anonymize browser users, by correlating their behavior on one account with their behavior on another: The findings, which NJIT researchers will present at the Usenix Security Symposium in Boston next month, show how an attacker who tricks someone into loading a malicious website …

Ubiquitous Surveillance by ICE

Source

Report by Georgetown’s Center on Privacy and Technology published a comprehensive report on the surprising amount of mass surveillance conducted by Immigration and Customs Enforcement (ICE). Our two-year investigation, including hundreds of Freedom of Information Act requests and a comprehensive review of ICE’s contracting and procurement records …

End-to-end encryption’s central role in modern self-defense

Source

Enlarge (credit: Getty Images ) A number of course-altering US Supreme Court decisions last month—including the reversal of a constitutional right to abortion and the overturning of a century-old limit on certain firearms permits—have activists and average Americans around the country anticipating the fallout for rights and privacy …

Google closes data loophole amid privacy fears over abortion ruling

Source

Enlarge (credit: Lari Bat | Getty Images ) Google is closing a loophole that has allowed thousands of companies to monitor and sell sensitive personal data from Android smartphones, an effort welcomed by privacy campaigners in the wake of the US Supreme Court’s decision to end women’s constitutional right …

Hacker claims to have obtained data on 1 billion Chinese citizens

Source

Personal information allegedly taken from Shanghai police database would be one of biggest data breaches in history A hacker has claimed to have stolen the personal information of 1 billion Chinese citizens from a Shanghai police database, in what would amount to one of the biggest data breaches in …

Tracking People via Bluetooth on Their Phones

Source

We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not enough. Computer scientists at the University of California San Diego proved in a …

A sneak peek at the data protection and privacy sessions for AWS re:Inforce 2022

Source

Register now with discount code SALUZwmdkJJ to get $150 off your full conference pass to AWS re:Inforce. For a limited time only and while supplies last. Today we want to tell you about some of the engaging data protection and privacy sessions planned for AWS re:Inforce. AWS …

Sheryl Sandberg’s influence reaches all of us. But it’s a troubling legacy | Stephanie Hare

Source

From epic data mining to shocking failures of content moderation, Meta’s COO passes on a vast clean-up job If you are reading this, odds are that you are one of the 2.87 billion daily users of the products offered by Meta, the parent company of Facebook, Instagram …

Websites that Collect Your Data as You Type

Source

A surprising number of websites include JavaScript keyloggers that collect everything you type as you type it, not just when you submit a form. Researchers from KU Leuven, Radboud University, and University of Lausanne crawled and analyzed the top 100,000 websites, looking at scenarios in which a user …

Surveillance by Driverless Car

Source

San Francisco police are using autonomous vehicles as mobile surveillance cameras. Privacy advocates say the revelation that police are actively using AV footage is cause for alarm. “This is very concerning,” Electronic Frontier Foundation (EFF) senior staff attorney Adam Schwartz told Motherboard. He said cars in general are troves …

« newer articles | page 7 | older articles »