Tag: privacy
-
DHS privacy probe will focus on biometric tracking by ICE, OBIM
Tags: privacyAuditors told CyberScoop the probe could expand to other parts of DHS and will look at the agency’s increasing use of biometric markers in immigration enforcement. First seen on cyberscoop.com Jump to article: cyberscoop.com/dhs-ig-audit-ice-obim-biometric-data-privacy-facial-recognition/
-
‘Encrypt It Already’ Campaign Pushes Big Tech to Prioritize E2E Encryption
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption (E2E) by default across their services, as privacy concerns mount amid increased AI use. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/encrypt-it-already-pushes-big-tech-e2e-encryption
-
Encrypt It Already Campaign Pushes Big Tech to Prioritize E2E Encryption
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption by default across their services, as privacy concerns mount amid increased AI use. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/encrypt-it-already-pushes-big-tech-e2e-encryption
-
Who’s Liable When Embedded AI Goes Wrong?
Privacy Expert Chiara Rustici on Laws Governing Autonomous Robots, Embedded AI. As embedded AI moves from labs into real environments, organizations face growing liability risks. From border patrol robots to healthcare automation, leaders must understand how AI governance, product liability, data protection and security laws apply, said Chief Privacy Officer Chiara Rustici. First seen on…
-
Mobile privacy audits are getting harder
Mobile apps routinely collect and transmit personal data in ways that are difficult for users, developers, and regulators to verify. Permissions can reveal what an app can … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/06/mopri-mobile-app-privacy-analysis/
-
ICE and CBP’s Face-Recognition App Can’t Actually Verify Who People Are
ICE has used Mobile Fortify to identify immigrants and citizens alike over 100,000 times, by one estimate. It wasn’t built to work like that”, and only got approved after DHS abandoned its own privacy rules. First seen on wired.com Jump to article: www.wired.com/story/cbp-ice-dhs-mobile-fortify-face-recognition-verify-identity/
-
Proton Warns European Startups: No One Is Too Small to Be Targeted by Hackers
Tags: breach, business, cybercrime, cybersecurity, dark-web, data, hacker, monitoring, privacy, startupSwiss privacy company Proton is urging European startups to rethink their cybersecurity approach after new research based on dark-web breach monitoring found that early-stage companies are increasingly targeted by cybercriminals, with significant consequences for innovation, data protection, and business continuity. The push comes as Proton launches its new initiative, “Build in Private,” aimed at helping…
-
Smart glasses are back, privacy issues included
AI smart glasses are the latest addition to fashion, and they include a camera, a microphone, AI, and privacy risks. After Google Glass failed to gain traction more than a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/05/ai-smart-glasses-privacy-risk/
-
Questions Loom Ahead of Substance Abuse Privacy Rules Shift
As the compliance deadline quickly approaches for changes to align the federal rules for the confidentiality of substance use disorder records with HIPAA, entities that participate in so-called Part 2 programs still face critical unanswered questions, said attorney Aleksandra Vold of BakerHostetler. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/questions-loom-ahead-substance-abuse-privacy-rules-shift-i-5522
-
AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026
Author : Karunakar Goud RGDate Published : February, 04, 2026 AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026 Artificial intelligence is no longer experimental. By 2026, AI systems are embedded in customer support, security operations, decision-making, and product development. As AI adoption accelerates, AI governance has become a…The…
-
Police Raid Elon Musk’s X Paris Office in Criminal Probe
Social Media Network Faces Legal Barrage From France, United Kingdom and Spain. In the space of a few hours, French authorities raided X’s office in Paris, the British privacy regulator opened an investigation into X and xAI, and Spanish Prime Minister Pedro Sánchez announced legal proposals that would criminalize algorithmic manipulation and amplification of illegal…
-
UK privacy watchdog probes Grok over AI-generated sexual images
The United Kingdom’s data protection authority launched a formal investigation into X and its Irish subsidiary over reports that the Grok AI assistant was used to generate nonconsensual sexual images. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/uk-privacy-watchdog-probes-grok-over-ai-generated-sexual-images/
-
UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery
UK Data Protection Watchdog has “serious concerns” over data privacy on Elon Musk’s social platform First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ico-investigates-x-over-grok-ai/
-
How Data Brokers Can Fuel Violence Against Public Servants
A new report from the Public Service Alliance finds state privacy laws offer public servants few ways to protect their private data, even as threats against them are on the rise. First seen on wired.com Jump to article: www.wired.com/story/how-data-brokers-can-fuel-violence-against-public-servants/
-
Why Gen Z is Ditching Smartphones for Dumbphones
Tags: privacyYounger generations are increasingly ditching smartphones in favor of “dumbphones””, simpler devices with fewer apps, fewer distractions, and less tracking. But what happens when you step away from a device that now functions as your wallet, your memory, and your security key? In this episode, Tom and Scott explore the dumbphone movement through a privacy…
-
New Apple privacy feature limits location tracking on iPhones, iPads
Apple is introducing a new privacy feature that lets users limit the precision of location data shared with cellular networks on some iPhone and iPad models. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/apple/new-apple-privacy-feature-limits-location-tracking-on-iphones-ipads/
-
Apple Adds New iPhone Privacy Setting to Blur Location Data Shared With Carriers
Apple’s new iPhone privacy setting blurs location data shared with wireless carriers, limiting precise tracking while preserving emergency services. The post Apple Adds New iPhone Privacy Setting to Blur Location Data Shared With Carriers appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-apple-iphone-limit-precise-location-carriers/
-
Apple’s new privacy feature limits how precisely carriers track your location
Apple users are already accustomed to managing app-level location permissions, and a new privacy feature in iOS 26.3 extends that control to cellular networks. Called Limit … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/30/apple-limit-precise-location-ios/
-
Wearable tech adoption continues as privacy worries grow
Over 1 billion users wear devices for tracking steps, sleep, heart rate, and other personal metrics. These devices collect a continuous stream of sensitive data, often tied to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/30/wearable-data-privacy-tech/
-
NDSS 2025 Recurrent Private Set Intersection For Unbalanced Databases With Cuckoo Hashing
Session 10C: Privacy Preservation Authors, Creators & Presenters: Eduardo Chielle (New York University Abu Dhabi), Michail Maniatakos (New York University Abu Dhabi) PAPER Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE A Private Set Intersection (PSI) protocol is a cryptographic method allowing two parties, each with a private set, to…
-
Aligning Substance Use Privacy Regs With HIPAA Isn’t Simple
Revisions to 42 CFR Part 2 that go into effect soon to better align federal regulations for the confidentiality of substance use disorder records with HIPAA require entities to adjust their compliance programs. But the changes aren’t easy, said attorney David Holtzman, founder of HITprivacy LLC. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/aligning-substance-use-privacy-regs-hipaa-isnt-simple-i-5519
-
$95M Payout: Apple Begins Compensating Users in Siri Eavesdropping Case
Apple has started issuing Siri privacy settlement payouts, with claimants seeing deposits as low as $8 per device from a $95 million fund. The post $95M Payout: Apple Begins Compensating Users in Siri Eavesdropping Case appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-apple-siri-eavesdropping-settlement-payouts/
-
WhatsApp Adds One-Tap Security Settings for Added Privacy
Tags: privacyWhatsApp rolled out Strict Account Settings, a lockdown-style mode that blocks unknown attachments, disables link previews, and silences unknown callers. The post WhatsApp Adds One-Tap Security Settings for Added Privacy appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-whatsapp-strict-account-settings-lockdown-security-mode/
-
NDSS 2025 Iris: Dynamic Privacy Preserving Search In Authenticated Chord PeerPeer Networks
Session 10C: Privacy Preservation Authors, Creators & Presenters: Angeliki Aktypi (University of Oxford), Kasper Rasmussen (University of Oxford) PAPER Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks In structured peer-to-peer networks, like Chord, users find data by asking a number of intermediate nodes in the network. Each node provides the identity of the…
-
Data Privacy Day and Change Your Password Day
Data Privacy Day and Change Your Password Day arrive at a time when privacy concerns have shifted from niche technical debates to everyday business and personal risk. As digital services expand and data becomes increasingly distributed, the threat to privacy grows. Identity compromise, human behaviour and loss of data control now sit at the heart…
-
Der Schutz personenbezogener Daten ist die Grundlage für Vertrauen in einer KI-gesteuerten Welt
Am <> sollten Organisationen weltweit innehalten und darüber nachdenken, wie personenbezogene Daten erfasst, gespeichert und geschützt werden. In der heutigen digitalen Wirtschaft, die von Cloud-Computing, Remote-Arbeit und künstlicher Intelligenz geprägt ist, ist Datenschutz jedoch nicht mehr nur eine Frage der Compliance. Er ist die Grundlage für digitales Vertrauen und ein entscheidender Maßstab […] First seen…
-
World Data Privacy Day: Datenschutz als Schlüssel für Vertrauen im KI-Zeitalter
Auch wenn sie oft getrennt betrachtet werden, sind Datenschutz und Datensicherheit zwei Seiten derselben Medaille. Sicherheit schützt Daten vor unbefugtem Zugriff, Datenschutz regelt ihren verantwortungsvollen und rechtmäßigen Einsatz. Schwächen in einem der beiden Bereiche untergraben zwangsläufig das Vertrauen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/world-data-privacy-day-datenschutz-als-schluessel-fuer-vertrauen-im-ki-zeitalter/a43485/
-
WhatsApp rolls out new security feature to protect users from sophisticated attacks
To add an extra layer of protection to its end-to-end encryption, WhatsApp has begun rolling out a new privacy and security feature called Strict Account Settings. It is … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/28/whatsapp-strict-account-settings/
-
Grammarly and QuillBot are among widely used Chrome extensions facing serious privacy questions
A new study shows that some of the most widely used AI-powered browser extensions are a privacy risk. They collect lots of data and require a high level of browser access. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/28/incogni-chrome-extensions-privacy-risks-report/

