#access-restrictions

[ follow ]
#data-privacy
EU data protection
fromFortune
14 hours ago

Microsoft Prez Proposes Data Sharing/Privacy Steps In Wake Of EU Action | Fortune

The EU court's ruling disrupts 15 years of data-sharing practices, necessitating a new trans-Atlantic agreement for data privacy and security.
fromAdExchanger
5 days ago
EU data protection

Data Privacy At The Kitchen Table | AdExchanger

Data privacy has become a significant concern for lawmakers and constituents, evolving into a key topic of discussion.
Privacy technologies
fromArs Technica
12 hours ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
EU data protection
fromFortune
14 hours ago

Microsoft Prez Proposes Data Sharing/Privacy Steps In Wake Of EU Action | Fortune

The EU court's ruling disrupts 15 years of data-sharing practices, necessitating a new trans-Atlantic agreement for data privacy and security.
#linkedin
Law
fromArs Technica
10 hours ago

LinkedIn scanning users' browser extensions sparks controversy and two lawsuits

LinkedIn faces lawsuits alleging lack of user consent for data collection practices.
Privacy professionals
fromComputerworld
5 hours ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Privacy technologies
fromTNW | Insights
3 days ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
Privacy technologies
fromTech Times
3 days ago

LinkedIn 'BrowserGate' Investigation Alleges Secret Browser Extension Scanning Within Platform

LinkedIn allegedly collects extensive user data through a hidden system called 'Spectroscopy' without explicit user consent.
Law
fromArs Technica
10 hours ago

LinkedIn scanning users' browser extensions sparks controversy and two lawsuits

LinkedIn faces lawsuits alleging lack of user consent for data collection practices.
Privacy professionals
fromComputerworld
5 hours ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Privacy technologies
fromTNW | Insights
3 days ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
Privacy technologies
fromTech Times
3 days ago

LinkedIn 'BrowserGate' Investigation Alleges Secret Browser Extension Scanning Within Platform

LinkedIn allegedly collects extensive user data through a hidden system called 'Spectroscopy' without explicit user consent.
#identity-management
fromThe Hacker News
19 hours ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 day ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
19 hours ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 day ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Parenting
fromComputerWeekly.com
1 day ago

Tech can't wait for regulation to protect children online | Computer Weekly

Harmful online content for children results from profit-driven algorithms, not parenting or education failures.
#data-breach
Privacy professionals
fromTechCrunch
15 hours ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromSilicon Canals
5 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromTechCrunch
15 hours ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromSilicon Canals
5 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Digital life
fromEarth911
20 hours ago

Guest Idea: Why Sustainable Home Tech Choices Also Need Cybersecurity Awareness

Sustainable technology adoption is rising, but security risks of connected devices are often overlooked, impacting both environmental and digital safety.
Healthcare
fromArs Technica
9 hours ago

Trump admin makes sweeping request for medical records of federal workers

The Trump administration plans to collect sensitive medical records from millions of federal workers and retirees, raising legal and health policy concerns.
UX design
fromEntrepreneur
1 day ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
Deliverability
fromZDNET
14 hours ago

How a burner email can protect your inbox - setting one up one is easy and free

A burner email address protects against spam and phishing by providing a temporary, disposable option for account creation.
Online Community Development
fromwww.dw.com
21 hours ago

India's digital census prompts fear of hidden agendas

India is conducting a fully digital census, focusing on housing conditions and demographic data collection, including a caste enumeration for the first time since 1931.
#ai
fromKqed
1 day ago
Mental health

Google Updates Suicide, Self-Harm Safeguards in Gemini as AI Lawsuits Mount | KQED

fromwww.theguardian.com
14 hours ago
Information security

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Privacy technologies
fromComputerWeekly.com
6 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Mental health
fromKqed
1 day ago

Google Updates Suicide, Self-Harm Safeguards in Gemini as AI Lawsuits Mount | KQED

Google's Gemini chatbot will direct users to a support hotline during potential crises related to suicide or self-harm.
Information security
fromwww.theguardian.com
14 hours ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Privacy technologies
fromComputerWeekly.com
6 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromTheregister
1 day ago

OpenInfra General Manager on sovereignty and kill switches

Carrez calls this 'the survival problem,' and it forms part of his definition of sovereignty - digital, data, AI, and so on. He says, 'A lot of people are just talking about digital sovereignty as like a catchphrase for a bunch of things.'
DevOps
NYC parents
fromwww.amny.com
2 days ago

Op-Ed | Albany's online safety' bill incentivizes surveillance, chills free expression | amNewYork

New York's budget process risks limiting input on a proposal that threatens privacy, youth safety, and free expression.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#surveillance
Privacy technologies
fromFast Company
3 days ago

Why AI-powered city cameras are sounding new privacy alarms

Automatic license plate readers are expanding in the U.S., raising concerns about surveillance and targeting of specific communities.
Privacy professionals
fromSilicon Canals
1 week ago

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

The infrastructure for mass surveillance already exists, relying on pre-existing technology and data rather than new AI advancements.
Privacy technologies
fromFast Company
3 days ago

Why AI-powered city cameras are sounding new privacy alarms

Automatic license plate readers are expanding in the U.S., raising concerns about surveillance and targeting of specific communities.
Privacy professionals
fromSilicon Canals
1 week ago

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

The infrastructure for mass surveillance already exists, relying on pre-existing technology and data rather than new AI advancements.
#greece
EU data protection
fromFast Company
17 hours ago

The list of countries banning young teens from social media keeps getting bigger. Here's the latest

Greece plans to ban social media use for under-15s starting January 1, 2027, citing concerns over mental health and addiction.
Digital life
fromwww.bbc.com
15 hours ago

Greece to ban social media for under-15s from next year

Greece plans to ban social media access for under-15s to address youth anxiety and sleep issues, effective January next year.
EU data protection
fromFast Company
17 hours ago

The list of countries banning young teens from social media keeps getting bigger. Here's the latest

Greece plans to ban social media use for under-15s starting January 1, 2027, citing concerns over mental health and addiction.
Digital life
fromwww.bbc.com
15 hours ago

Greece to ban social media for under-15s from next year

Greece plans to ban social media access for under-15s to address youth anxiety and sleep issues, effective January next year.
#cybersecurity
Information security
fromThe Hacker News
15 hours ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

A Russian threat actor is conducting a spear-phishing campaign targeting Ukraine using a new malware suite called PRISMEX, exploiting zero-day vulnerabilities.
Information security
fromArs Technica
20 hours ago

Thousands of consumer routers hacked by Russia's military

Russian military hackers are exploiting consumer routers to harvest passwords and credentials for espionage, affecting thousands of devices globally.
Healthcare
fromSecuritymagazine
2 days ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Information security
fromArs Technica
17 hours ago

Anthropic limits access to Mythos, its new cybersecurity AI model

Mythos has identified critical zero-day vulnerabilities, while Anthropic's AI model has shown both capabilities and risks in cybersecurity applications.
Information security
fromSecurityWeek
6 hours ago

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Cyberattacks by Iranian-backed hackers will continue despite a ceasefire, targeting Israel and potentially the U.S. when deemed appropriate.
Information security
fromThe Hacker News
15 hours ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

A Russian threat actor is conducting a spear-phishing campaign targeting Ukraine using a new malware suite called PRISMEX, exploiting zero-day vulnerabilities.
Information security
fromArs Technica
20 hours ago

Thousands of consumer routers hacked by Russia's military

Russian military hackers are exploiting consumer routers to harvest passwords and credentials for espionage, affecting thousands of devices globally.
fromTechCrunch
14 hours ago

These are the countries moving to ban social media for children | TechCrunch

Australia became the world's first country to ban social media for children under 16 in December 2025. The ban blocks children from using Facebook, Instagram, Snapchat, Threads, TikTok, X, YouTube, Reddit, Twitch, and Kick, while WhatsApp and YouTube Kids are excluded.
EU data protection
fromThe Verge
1 day ago

The case for banning cookie banners

Cookie banners have become bloated and useless, creating a new kind of interaction that means trouble all over the web. The only solution is to get rid of them, and do it now.
Digital life
Privacy technologies
fromTechCrunch
9 hours ago

WireGuard VPN developer can't ship software updates after Microsoft locks account | TechCrunch

WireGuard is locked out of its Microsoft developer account, preventing critical software updates for Windows users.
#fbi
Privacy professionals
fromSecuritymagazine
3 days ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
EU data protection
fromWIRED
2 days ago

Europe Gets Serious About Age Verification Online

Five EU countries are testing a digital wallet for age verification, but progress varies significantly among them.
Information security
fromThe Hacker News
1 day ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromTechRepublic
13 hours ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Privacy professionals
fromWIRED
1 day ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
EU data protection
fromTheregister
1 day ago

Japan relaxes privacy laws to make AI development easy

Japan will simplify AI app development by removing consent requirements for certain personal data under new legal amendments.
Information security
fromSecuritymagazine
1 day ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
#meta
Privacy professionals
fromwww.theguardian.com
1 day ago

Meta employee in London accused of downloading 30,000 private Facebook images

A former Meta employee is under investigation for downloading 30,000 private Facebook images using a program to bypass security checks.
fromEngadget
1 day ago
EU data protection

UK Meta employee reportedly downloaded 30,000 private photos from Facebook users

Privacy professionals
fromwww.theguardian.com
1 day ago

Meta employee in London accused of downloading 30,000 private Facebook images

A former Meta employee is under investigation for downloading 30,000 private Facebook images using a program to bypass security checks.
EU data protection
fromEngadget
1 day ago

UK Meta employee reportedly downloaded 30,000 private photos from Facebook users

A former Meta employee is under investigation for illicitly downloading 30,000 private photos from Facebook using software to bypass security.
#privacy
fromFortune
3 days ago
Privacy technologies

Your neighbor just got a home security system, but should you be worried? 'It's inherently a little creepy' says surveillance expert | Fortune

Privacy technologies
fromFortune
3 days ago

Your neighbor just got a home security system, but should you be worried? 'It's inherently a little creepy' says surveillance expert | Fortune

Consumers are increasingly concerned about privacy and data control regarding home surveillance technology.
Privacy professionals
fromAdExchanger
2 days ago

What Regulators Talk About When They Talk About Ad Tech | AdExchanger

Privacy regulators emphasize protecting children, honoring opt-outs, and ensuring companies are transparent about data collection practices.
Privacy professionals
fromFuturism
3 days ago

China Cracking Down on the Types of AI That Are Tearing America Apart

China is implementing strict regulations on AI personalities to protect children and prevent addiction.
Privacy professionals
fromwww.theguardian.com
2 days ago

Creepy surveillance': why some cities are shutting down Flock cameras amid privacy concerns

Residents of Dunwoody, Georgia, are protesting the city's contract with Flock Safety over privacy concerns and data ownership issues.
Privacy technologies
fromZDNET
1 week ago

The best way to protect your phone from a warrantless search in 2026

US authorities are increasingly aggressive in detaining and seizing devices, with biometrics remaining vulnerable.
fromSecuritymagazine
6 days ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Information security
#ai-regulation
Privacy professionals
fromZDNET
6 days ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
Information security
fromArs Technica
5 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
Privacy professionals
fromSilicon Canals
5 days ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
Information security
fromSecurityWeek
1 week ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
#vpn
Privacy professionals
fromWIRED
1 week ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Privacy professionals
fromWIRED
1 week ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Privacy technologies
fromZDNET
2 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy technologies
fromSecuritymagazine
3 weeks ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Privacy technologies
fromTech Times
3 weeks ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Privacy professionals
fromTheregister
3 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
fromEntrepreneur
1 month ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
fromThe Hacker News
2 months ago

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024. Government sector malicious activity spiked from 2% to 12.9%, while 1 in 7 Education sites show active compromise. Specific offenders: Google Tag Manager (8% of violations), Shopify (5%), Facebook Pixel (4%).
Information security
Privacy technologies
fromFox News
2 months ago

5 tech terms that shape your online privacy

Limit app permissions, especially location, microphone, and photo access, and regularly adjust device privacy settings to prevent background data collection.
fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
[ Load more ]