Tag: privacy
-
Kohler’s Smart Toilet Camera Not Truly EndEnd Encrypted
Kohler’s Dekota toilet camera, launched in October as a $600 health-monitoring device, is facing significant scrutiny over its privacy claims. The device promises to track gut health, hydration, and other wellness metrics by analyzing bowel contents. However, the investigation reveals the company’s assurances about data protection are misleading. Kohler prominently advertises >>end-to-end encryption
-
Sen. Mark Kelly: Investing in safe, secure AI is key to U.S. dominance
The Democratic senator from Arizona believes that global AI standards must include American values around civil rights, privacy and safety. First seen on cyberscoop.com Jump to article: cyberscoop.com/mark-kelly-ai-safety-guardrails-center-for-american-progress/
-
A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip Code
Privacy stalwart Nicholas Merrill spent a decade fighting an FBI surveillance order. Now he wants to sell you phone service”, without knowing almost anything about you. First seen on wired.com Jump to article: www.wired.com/story/new-anonymous-phone-carrier-sign-up-with-nothing-but-a-zip-code/
-
Protect Your Digital Life with a 5-Year iProVPN Plan for $20
Protect 10 devices with encrypted browsing, global server access, and long-term online privacy you control. The post Protect Your Digital Life with a 5-Year iProVPN Plan for $20 appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/iprovpn-5-year-subscription/
-
India plans to verify and record every smartphone in circulation
The Indian government has ordered smartphone makers to preinstall its Sanchar Saathi app on all devices, a move that is raising fresh privacy concerns. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/02/india-plans-to-verify-and-record-every-smartphone-in-circulation/
-
Proxyearth Tool Lets Anyone Trace Users in India with Just a Mobile Number
Proxyearth is a new site that shows names, Aadhaar numbers, and live locations of users in India using only mobile numbers, raising serious privacy and security concerns. First seen on hackread.com Jump to article: hackread.com/proxyearth-trace-users-india-mobile-number/
-
Proxyearth Tool Lets Anyone Trace Users in India with Just a Mobile Number
Proxyearth is a new site that shows names, Aadhaar numbers, and live locations of users in India using only mobile numbers, raising serious privacy and security concerns. First seen on hackread.com Jump to article: hackread.com/proxyearth-trace-users-india-mobile-number/
-
NoID Privacy-Tool zur Härtung von Windows 11 24H2 25H2
Wie lässt sich Windows 11 sicherheitstechnisch härten und in der Telemetrie begrenzen? Für Administratoren in Firmen gibt es Security-Empfehlungen von Microsoft samt Gruppenrichtlinien oder Intune zum Umsetzen. Für Windows 11 in nicht verwalteten Umgebungen (Home, Pro) lässt sich das Tool … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/12/02/noid-privacy-tool-zur-haertung-von-windows-11-25h2/
-
NoID Privacy-Tool zur Härtung von Windows 11 25H2
Wie lässt sich Windows 11 sicherheitstechnisch härten und in der Telemetrie begrenzen? Für Administratoren in Firmen gibt es Security-Empfehlungen von Microsoft samt Gruppenrichtlinien zum Umsetzen. Für Windows 11 in nicht verwalteten Umgebungen (Home, Pro) lässt sich das Tool NoID Privacy … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/12/02/noid-privacy-tool-zur-haertung-von-windows-11-25h2/
-
NoID Privacy-Tool zur Härtung von Windows 11 25H2
Wie lässt sich Windows 11 sicherheitstechnisch härten und in der Telemetrie begrenzen? Für Administratoren in Firmen gibt es Security-Empfehlungen von Microsoft samt Gruppenrichtlinien zum Umsetzen. Für Windows 11 in nicht verwalteten Umgebungen (Home, Pro) lässt sich das Tool NoID Privacy … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/12/02/noid-privacy-tool-zur-haertung-von-windows-11-25h2/
-
Texas Drops Challenge to 25-Year-Old HIPAA Privacy Rule
Move Comes After Ruling in Separate Case Discarded HIPAA Reproductive PHI Changes. The state of Texas has dropped a federal lawsuit filed against the U.S. Department of Health and Human Services that sought to vacate the 25-year-old HIPAA privacy rule, as well as 2024 rule changes under the Biden administration that prohibit the disclosure of…
-
GrapheneOS bails on OVHcloud over France’s privacy stance
Project cites fears of state access as cloud sovereignty row deepens First seen on theregister.com Jump to article: www.theregister.com/2025/11/28/grapheneos_ovhcloud/
-
California law regulating web browsers could have national data privacy impact, experts say
Tech companies may universally offer an opt-out capability required by California law as a way to avoid having multiple versions of browsers and ask questions about residency. First seen on therecord.media Jump to article: therecord.media/california-web-browser-law-national-implications
-
New observational auditing framework takes aim at machine learning privacy leaks
Machine learning (ML) privacy concerns continue to surface, as audits show that models can reveal parts of the labels (the user’s choice, expressed preference, or the result … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/28/machine-learning-privacy-audit-checks/
-
Why Cyber Defenses Continue to Lag at Rural Hospitals
Rural and small community hospitals are continuing to face growing cyber challenges driven by limited and shrinking resources, staffing shortages, and increasingly sophisticated cyber threats, said Jackie Mattingly, senior director at privacy and security consulting firm Clearwater. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/cyber-defenses-continue-to-lag-at-rural-hospitals-i-5503
-
NordVPN Black Friday Deal: Unlock 77% off VPN plans in 2025
The NordVPN Black Friday Deal is now live, and you can get the best discount available: 77% off that applies automatically when you follow our link. If you’ve been waiting for the right moment to upgrade your online security, privacy, and streaming freedom, this is the one VPN deals this Black Friday. First seen on bleepingcomputer.com…
-
GrapheneOS verlässt OVH: Frankreich ist kein sicheres Land für Privacy-Projekte
Französische Medienberichte versetzen die GrapheneOS-Entwickler in Aufruhr. Die Infrastruktur des Projekts wird in andere Länder verlegt. First seen on golem.de Jump to article: www.golem.de/news/grapheneos-verlaesst-ovh-frankreich-ist-kein-sicheres-land-fuer-privacy-projekte-2511-202570.html
-
7 signs your cybersecurity framework needs rebuilding
Tags: ai, awareness, best-practice, breach, business, ceo, ciso, cloud, compliance, cyberattack, cybersecurity, data, detection, endpoint, finance, firmware, framework, Hardware, healthcare, incident response, mobile, network, nist, privacy, risk, risk-management, service, software, strategy, supply-chain, threat, tool, training2. Experiencing a successful cyberattack, of any size: Nothing highlights a weak cybersecurity framework better than a breach, says Steven Bucher, CSO at Mastercard. “I’ve seen firsthand how even a minor incident can reveal outdated protocols or gaps in employee training,” he states. “If your framework hasn’t kept pace with evolving threats or business needs,…
-
NDSS 2025 Deanonymizing Device Identities Via Side-Channel Attacks In Exclusive-Use IoTs
Tags: attack, authentication, conference, data, data-breach, exploit, flaw, identity, Internet, iot, leak, mitigation, network, privacy, side-channel, strategy, threat, vulnerability, wifiSession4A: IoT Security Authors, Creators & Presenters: Christopher Ellis (The Ohio State University), Yue Zhang (Drexel University), Mohit Kumar Jangid (The Ohio State University), Shixuan Zhao (The Ohio State University), Zhiqiang Lin (The Ohio State University) PAPER Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation Wireless technologies like Bluetooth Low Energy (BLE)…
-
UK privacy regulator has seen ‘collapse in enforcement activity,’ rights coalition says
More than 70 civil liberties advocacy groups, academics and legal experts are calling for an investigation into a “collapse in enforcement activity” by the United Kingdom’s principal data protection regulator. First seen on therecord.media Jump to article: therecord.media/privacy-regulator-ico-collapse
-
UK privacy regulator has seen ‘collapse in enforcement activity,’ rights coalition says
More than 70 civil liberties advocacy groups, academics and legal experts are calling for an investigation into a “collapse in enforcement activity” by the United Kingdom’s principal data protection regulator. First seen on therecord.media Jump to article: therecord.media/privacy-regulator-ico-collapse
-
The CISO’s greatest risk? Department leaders quitting
What CISOs can and should be doing: The situation isn’t hopeless; there are steps CISOs can and should take to help avoid defections. It’s a matter of making staff a priority. PayNearMe’s Hobson says CISOs need to ask themselves whether functional security leaders are wearing too many hats with too few opportunities to advance, and…
-
The privacy tension driving the medical data shift nobody wants to talk about
Most people assume their medical data sits in quiet storage, protected by familiar rules. That belief gives a sense of safety, but new research argues that the world around … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/24/medical-data-stewardship-privacy/
-
NDSS 2025 GAP-Diff: Protecting JPEG-Compressed Images From Diffusion-Based Facial Customization
SESSION Session 3D: AI Safety ———– ———– Authors, Creators & Presenters: Haotian Zhu (Nanjing University of Science and Technology), Shuchao Pang (Nanjing University of Science and Technology), Zhigang Lu (Western Sydney University), Yongbin Zhou (Nanjing University of Science and Technology), Minhui Xue (CSIRO’s Data61) ———– PAPER GAP-Diff: Protecting JPEG-Compressed Images From Diffusion-Based Facial Customization Text-to-image…
-
NDSS 2025 A Key-Driven Framework For Identity-Preserving Face Anonymization
SESSION Session 3D: Al Safety ———– ———– Authors, Creators & Presenters: Miaomiao Wang (Shanghai University), Guang Hua (Singapore Institute of Technology), Sheng Li (Fudan University), Guorui Feng (Shanghai University) ———– PAPER A Key-Driven Framework for Identity-Preserving Face Anonymization Virtual faces are crucial content in the metaverse. Recently, attempts have been made to generate virtual faces…
-
Privacy group sues feds over talks with tech companies on ICE raid trackers
The lawsuit concerns the removal of apps like ICEBlock, Red Dot and DeICER from online playstores that provide real-time tracking of immigration raids. First seen on cyberscoop.com Jump to article: cyberscoop.com/eff-sues-government-app-removals-ice-tracking-free-speech/
-
Privacy group sues feds over talks with tech companies on ICE raid trackers
The lawsuit concerns the removal of apps like ICEBlock, Red Dot and DeICER from online playstores that provide real-time tracking of immigration raids. First seen on cyberscoop.com Jump to article: cyberscoop.com/eff-sues-government-app-removals-ice-tracking-free-speech/
-
Protecting User Data While Boosting Visibility: Secure SEO Strategies for Manufacturers
Learn how manufacturers can boost visibility while protecting user data with secure SEO, passwordless authentication, and privacy-first digital strategies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/protecting-user-data-while-boosting-visibility-secure-seo-strategies-for-manufacturers/
-
Protecting User Data While Boosting Visibility: Secure SEO Strategies for Manufacturers
Learn how manufacturers can boost visibility while protecting user data with secure SEO, passwordless authentication, and privacy-first digital strategies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/protecting-user-data-while-boosting-visibility-secure-seo-strategies-for-manufacturers/
-
Privacy oversight board finds FBI does not buy real-time location data
The report, which is based on an investigation begun by the Privacy and Civil Liberties Oversight Board (PCLOB) in 2017, provides an overview of what open-source information the FBI consults in such investigations. First seen on therecord.media Jump to article: therecord.media/pclob-finds-fbi-does-not-use-real-time-location-data

