Privacy technologies

[ follow ]
#nvidia
fromBusiness Insider
1 day ago
Privacy technologies

Nvidia warns that any GPU 'kill switch' or 'backdoor' into its AI chips would 'fracture trust in US technology'

fromBusiness Insider
1 day ago
Privacy technologies

Nvidia warns that any GPU 'kill switch' or 'backdoor' into its AI chips would 'fracture trust in US technology'

#meta
fromEngadget
3 months ago
Privacy technologies

Meta is reportedly working on facial recognition for its AI glasses

Meta is reviving facial recognition for smart glasses, raising privacy concerns about bystander scanning.
fromABC7 San Francisco
21 hours ago
Privacy technologies

Meta restores user accounts, admits they were in error after 7 On Your Side inquiry

Meta banned 600,000 accounts for predatory behavior; some users were mistakenly affected, leading to significant personal and business losses.
fromIT Pro
9 hours ago

LastPass just launched a tool to help security teams keep tabs on shadow IT risks

"Small and mid-sized businesses are facing a perfect storm of complexity: unknown risks living within unknown apps and AI services," said Don MacLennan, Chief Product Officer at LastPass.
Privacy technologies
fromExchangewire
14 hours ago

Covatic Launches Audience Retargeting Solution

Covatic launches Audience Retargeting, enhancing user re-engagement across digital platforms while prioritizing privacy and data protection.
fromIT Pro
11 hours ago

Microsoft patched a critical vulnerability in its NLWeb AI search tool - but there's no CVE (yet)

A critical flaw in NLWeb enables remote users to read sensitive files without authorization.
fromTheregister
5 hours ago

German researchers show 'Windows Hell No' flaw at Black Hat

A critical flaw in Windows Hello allows local admin access to inject insecure biometric information.
#cybersecurity
fromFuturism
11 hours ago
Privacy technologies

It's Staggeringly Easy for Hackers to Trick ChatGPT Into Leaking Your Most Personal Data

fromFuturism
11 hours ago
Privacy technologies

It's Staggeringly Easy for Hackers to Trick ChatGPT Into Leaking Your Most Personal Data

#ai-security
fromZDNET
6 hours ago
Privacy technologies

Researchers used Gemini to break into Google Home - here's how

fromWIRED
1 day ago
Privacy technologies

Hackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home

fromInfoQ
4 days ago
Privacy technologies

"A Security Nightmare": Docker Warns of Risks in MCP Toolchains

fromZDNET
6 hours ago
Privacy technologies

Researchers used Gemini to break into Google Home - here's how

fromWIRED
1 day ago
Privacy technologies

Hackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home

fromInfoQ
4 days ago
Privacy technologies

"A Security Nightmare": Docker Warns of Risks in MCP Toolchains

fromThe Hacker News
6 hours ago

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

SocGholish malware utilizes Traffic Distribution Systems to redirect users to malicious content and has a Malware-as-a-Service model for cybercriminal operations.
#data-breach
fromIT Pro
15 hours ago
Privacy technologies

Air France and KLM confirm customer data stolen in third-party breach

fromIT Pro
15 hours ago
Privacy technologies

Air France and KLM confirm customer data stolen in third-party breach

fromwww.levernews.com
6 hours ago

Airlines Are Using AI to Set Personalized, Jacked-Up Prices

Many airlines, led by Delta, are working with AI consulting companies that boast of their hyper-personalized price setting, laying the groundwork for economy-wide surveillance pricing.
Privacy technologies
fromZDNET
5 hours ago

Dashlane ends free subscriptions - you have one month to upgrade or switch

Dashlane is discontinuing its free plan effective September 16.
#ai
fromComputerworld
2 days ago
Privacy technologies

AI crawlers vs. web defenses: Cloudflare-Perplexity fight reveals cracks in internet trust

fromComputerworld
2 days ago
Privacy technologies

AI crawlers vs. web defenses: Cloudflare-Perplexity fight reveals cracks in internet trust

fromVulture
7 hours ago

Instagram Hops on the Surveillance-State Trend

Instagram is launching a new feature called Instagram Map that allows friends to share their real-time locations, enhancing user visibility and connection.
Privacy technologies
fromGSMArena.com
5 hours ago

Samsung adds Voice Phishing detection in the One UI 8 phone app

Voice phishing detection, now integrated into Samsung's One UI 8, listens for potential AI-generated voices during calls, providing real-time alerts if a scam is suspected.
Privacy technologies
fromArs Technica
14 hours ago

Here's how deepfake vishing attacks work, and why they can be hard to detect

AI voice cloning poses significant risks through fraudulent calls mimicking known individuals, increasing the efficiency of phishing schemes.
fromIT Pro
15 hours ago

Half of British companies want an end to hybrid working - but they're playing with fire if they expect employees to comply

Nearly half of British companies expect employees to be in the office every day in the coming year.
fromHackernoon
3 years ago

Stop Exposed Secrets from Breaching Your Code Today: 4 Urgent Steps to Protect Your Organization | HackerNoon

Proper secrets management is essential to prevent data breaches and unauthorized access.
fromTechCrunch
1 day ago

Qwant and Ecosia debut Staan, a European search index that aims to take on Big Tech | TechCrunch

"If you're using ChatGPT or any other AI chatbot, they all do knowledge grounding with web search [...] our index can power deep research and AI summary features. Google and Bing's solutions are also pricey, and our index can offer power search features at a tenth of the cost," Christian Kroll, CEO of Ecosia, told TechCrunch.
Privacy technologies
Privacy technologies
fromForbes
1 day ago

Your Face Could Cost You The Job: The Dangerous Rise Of Facial Recognition At Work

Employers are increasingly using facial recognition software for employee management, raising concerns about bias and surveillance culture.
#webcam-security
fromHackernoon
6 months ago
Privacy technologies

Distortion Patterns and Web Text Size Analysis in Webcam Peeking Attacks | HackerNoon

fromHackernoon
6 months ago
Privacy technologies

Distortion Patterns and Web Text Size Analysis in Webcam Peeking Attacks | HackerNoon

fromIT Pro
1 day ago

Perplexity hits back at Cloudflare amid claims of website 'stealth crawling' to dodge AI blocks

Cloudflare announced a new system to block AI companies from accessing websites without permission or compensation, following concerns over content scraping practices.
Privacy technologies
fromIT Pro
1 day ago

Millions of Dell laptops are are at risk thanks to a Broadcom chip vulnerability - and more than 100 device models are impacted

These findings highlight the importance of evaluating the security posture of all hardware components within your devices, not just the operating system or software.
Privacy technologies
fromThe Hacker News
1 day ago

Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams

VexTrio Viper develops malicious apps disguised as useful applications on official app stores.
fromNextgov.com
1 day ago

Three ways to close the governance gap in business-critical applications

The global enterprise application market is expected to grow to more than $471 billion by 2031, highlighting a significant increase from an estimated $300 billion today.
Privacy technologies
fromTechzine Global
1 day ago

Sophos and Rubrik bring security and backup together for Microsoft 365

The reality of today's threat landscape demands a holistic approach to cyber resilience, which requires organizations to do more than just prevent attacks.
Privacy technologies
fromPCMAG
1 day ago

The Global Scareware Scam You've Probably Clicked: Inside VexTrio's Global Ad Fraud

VexTrio operates a sophisticated traffic distribution system that disseminates malware, fake alerts, and prompts consumers to download counterfeit applications, utilizing organized crime tactics.
Privacy technologies
Privacy technologies
fromZDNET
1 day ago

Syncable vs. non-syncable passkeys: Are roaming authenticators the best of both worlds?

Passkeys cannot be guessed, reused, or shared with malicious actors, making them a robust replacement for passwords.
fromArs Technica
1 day ago

Researchers design "promptware" attack with Google Calendar to turn Gemini evil

Researchers from Tel Aviv University demonstrated that they could trick Gemini into manipulating Google smart home devices through a series of malicious calendar appointments, marking a notable AI-related attack.
Privacy technologies
Privacy technologies
fromWIRED
1 day ago

Tornado Cash Developer Roman Storm Guilty on One Count in Federal Crypto Case

Roman Storm was found guilty of operating an unlicensed money transmitting business, facing up to five years in prison.
#whatsapp
Privacy technologies
fromPCWorld
2 days ago

De-Google your life: These 17 privacy-obsessed apps will set you free

Users can achieve more privacy by replacing Google services with alternatives that prioritize data protection.
fromwww.dw.com
5 days ago

German police expands use of Palantir surveillance software DW 08/02/2025

Gotham surveillance software can profile individuals quickly, raising privacy concerns for innocent people.
fromZDNET
2 days ago

Knowing these 7 rules helped me optimize my home security camera for the best footage

Security cameras are becoming more popular and affordable, and their effectiveness can be enhanced by mindful placement, avoiding obstructions like trees or furniture.
Privacy technologies
fromTechzine Global
2 days ago

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
fromThe Cipher Brief
1 week ago

Deepfakes and the War on Trust

The Rubio incident is no longer a rarity. It is a warning shot... adversaries... are now using hyper-realistic deepfakes to reach targets in virtually every sector of society.
Privacy technologies
Privacy technologies
fromTechRadar
2 days ago

YouTube set to test AI-powered age checks in the US - will the UK be next?

YouTube will implement AI-based age checks in the US to filter inappropriate content based on user interactions.
fromComputerWeekly.com
2 days ago

Attacker could defeat Dell firmware flaws with a vegetable | Computer Weekly

The vulnerabilities on ControlVault USHs were potentially highly dangerous. These laptop models are widely-used in the cybersecurity industry, government settings and challenging environments in their rugged version.
Privacy technologies
Privacy technologies
fromTechCrunch
6 days ago

Sex toy maker Lovense threatens legal action after fixing security flaws that exposed users' data | TechCrunch

Lovense fixed security vulnerabilities that exposed emails and allowed account takeovers but is considering legal action over reported disclosures.
fromTechCrunch
2 days ago

Some people are defending Perplexity after Cloudflare 'named and shamed' it | TechCrunch

The controversy surrounding Perplexity's web scraping actions raises questions about the classification of AI agents compared to human web access.
fromTheregister
2 days ago

Is this app legit or malware? Not all users are stupid

Users are effective at identifying malware when suspicious but struggle with obscure legitimate software.
#data-security
Privacy technologies
fromZDNET
2 days ago

This favorite ad blocker finally comes to Safari - be sure you download the right one

uBlock Origin Lite ad blocker is now available for Safari, offering superior ad blocking capabilities.
fromThe Hacker News
2 days ago

Google's August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild

The vulnerabilities include CVE-2025-21479 (CVSS score: 8.6) and CVE-2025-27038 (CVSS score: 7.5), both of which were disclosed alongside CVE-2025-21480 (CVSS score: 8.6) by the chipmaker back in June 2025.
Privacy technologies
Privacy technologies
fromwww.theverge.com
2 days ago

Grok's spicy' video setting instantly made me Taylor Swift nude deepfakes

Grok Imagine's spicy mode creates uncensored NSFW content, including celebrity deepfakes, without appropriate safeguards, raising significant legal concerns.
Privacy technologies
fromArs Technica
2 days ago

Grok generates fake Taylor Swift nudes without being asked

X Safety is actively removing inappropriate images and monitoring accounts for violations.
Grok's design can produce flawed outputs of partially nude celebrities, indicating a need for fine-tuning.
'Spicy' mode doesn't consistently generate offensive content, but it can default to inappropriate outputs for celebrities.
Legal obligations from the Take It Down Act might expose xAI to consequences if improper outputs persist.
fromGSMArena.com
2 days ago

WhatsApp is testing a new guest chats feature

WhatsApp is testing a guest chats feature allowing communication with non-users via a chat link.
fromTheregister
2 days ago

How to set up Windows 11 with a local account

Windows 11 installation primarily encourages Microsoft account login, complicating local account setup for privacy-conscious users.
Privacy technologies
fromTechzine Global
3 days ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
fromZDNET
3 days ago

LastPass can now warn or block logins to shadow SaaS apps - here's how

The SaaS Identity and Access Management (SaaS IAM) capabilities will prevent users from accessing unapproved SaaS applications, enhancing monitoring and control for administrators.
Privacy technologies
fromTheregister
3 days ago

Microsoft cut off Indian company's cloud due to EU sanctions

Nayara Energy protested the sanctions in a strongly-worded statement that asserts "This unilateral move by the European Union is founded on baseless assertions, representing an undue extension of authority that ignores both international law and the sovereignty of India."
Privacy technologies
Privacy technologies
fromHackernoon
3 months ago

How to Accurately Evaluate IP Geolocation Data Beyond Provider Consensus | HackerNoon

Evaluating IP geolocation requires assessing data accuracy beyond simply comparing provider outputs, as discrepancies can indicate true locations.
Privacy technologies
from9to5Mac
5 days ago

PSA: Make sure you have these privacy features enabled on your iPhone - 9to5Mac

Apple's privacy features on iPhones protect against invasive tracking and data mining.
fromwww.npr.org
5 days ago

Tea encouraged its users to spill. Then the app's data got leaked

The Tea app, branded as "the safest place to spill tea", allows users to check backgrounds, communicate anonymously, but faced a severe data breach compromising sensitive user data.
Privacy technologies
Privacy technologies
fromwww.bbc.com
5 days ago

Minister must apologise over Savile claim, says Farage

Nigel Farage condemned Technology Secretary Peter Kyle's comments linking opposition to the online safety law with supporting sex offenders.
fromwww.theguardian.com
5 days ago

Airbnb guest says images were altered in false 12,000 damage claim

Airbnb has apologised to a woman after an apartment host falsely claimed she had caused thousands of pounds' worth of damage and used images she says were digitally manipulated to back up his allegations.
Privacy technologies
[ Load more ]