Tag: privacy
-
Hundreds of Free VPN Apps Expose Android and iOS Users’ Personal Data
Virtual Private Networks (VPNs) are trusted by millions to protect privacy, secure communications, and enable remote access on their mobile devices. But what if the very apps designed to safeguard your data are riddled with dangerous security flaws that expose the exact information they promise to protect? A comprehensive security and privacy analysis by Zimperium…
-
New infosec products of the week: October 3, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Acronis, Legit Security, NowSecure, Siemens, and Telus. NowSecure Privacy helps … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/03/new-infosec-products-of-the-week-october-3-2025/
-
Humanoid Robots are Walking Trojan Horses, And They’re Already in the Workplace
A new study reveals severe security flaws in the Unitree G1 humanoid robot, exposing risks from Bluetooth backdoors to hidden data exfiltration. Researchers warn that humanoid robots could be exploited as surveillance devices and active cyberattack platforms, raising urgent concerns for robotics security and privacy compliance. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/humanoid-robots-are-walking-trojan-horses-and-theyre-already-in-the-workplace/
-
Free VPN Apps Found Riddled With Security Flaws
A new study by Zimperium has revealed serious risks in free VPN apps, exposing users to privacy threats and security flaws First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/free-vpn-apps-security-flaws/
-
Free VPN Apps Found Riddled With Security Flaws
A new study by Zimperium has revealed serious risks in free VPN apps, exposing users to privacy threats and security flaws First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/free-vpn-apps-security-flaws/
-
USENIX 2025: PEPR ’25 Network Structure And Privacy: The Re-Identification Risk In Graph Data
Creator, Author and Presenter: Daniele Romanini, Resolve Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-network-structure-and-privacy-the-re-identification-risk-in-graph-data/
-
Tonic.ai + Microsoft: Accelerating AI adoption with privacy-compliant synthetic data
Tonic.ai is thrilled to join the Microsoft for Startups Pegasus Program. We’re bringing our privacy-compliant synthetic data solutions to Microsoft Azure customers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/tonic-ai-microsoft-accelerating-ai-adoption-with-privacy-compliant-synthetic-data/
-
Tonic.ai + Microsoft: Accelerating AI adoption with privacy-compliant synthetic data
Tonic.ai is thrilled to join the Microsoft for Startups Pegasus Program. We’re bringing our privacy-compliant synthetic data solutions to Microsoft Azure customers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/tonic-ai-microsoft-accelerating-ai-adoption-with-privacy-compliant-synthetic-data/
-
Tile’s Privacy Failures Leave Trackers Wide Open to Stalking
Researchers have found that Tile trackers broadcast unencrypted data, leaving users vulnerable to stalking and raising significant privacy concerns. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/tile-tracker-flaws-stalking-risks/
-
USENIX 2025: PEPR ’25 Practical Considerations For Differential Privacy
Creator, Author and Presenter: Alex Kulesza Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-practical-considerations-for-differential-privacy/
-
CPPA fines Tractor Supply Company $1.4 million for privacy violations
Tractor Supply Company allegedly failed to publish a privacy policy, notify job applicants of their privacy rights and shared personal data with third parties without permission. First seen on therecord.media Jump to article: therecord.media/ccpa-tractor-supply-privacy-fine
-
FTC alleges messaging app violated child privacy law, duped users into subscriptions
A civil complaint filed by the federal government alleges that the Sendit app illegally collected data from users under 13 and tricked people into paying for subscriptions. First seen on therecord.media Jump to article: therecord.media/ftc-alleges-sendit-app-violated-children-privacy-rule
-
‘Trifecta’ of Google Gemini Flaws Turn AI into Attack Vehicle
Flaws in individual models of Google’s AI suite created significant security and privacy risks for users, demonstrating the need for heightened defenses. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/trifecta-google-gemini-flaws-ai-attack-vehicle
-
Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits
Tags: ai, attack, cloud, cybersecurity, data, data-breach, exploit, flaw, google, injection, intelligence, privacy, risk, vulnerabilityCybersecurity researchers have disclosed three now-patched security vulnerabilities impacting Google’s Gemini artificial intelligence (AI) assistant that, if successfully exploited, could have exposed users to major privacy risks and data theft.”They made Gemini vulnerable to search-injection attacks on its Search Personalization Model; log-to-prompt injection attacks against Gemini Cloud First seen on thehackernews.com Jump to article: thehackernews.com/2025/09/researchers-disclose-google-gemini-ai.html
-
Tonic Textual on Microsoft Fabric: Now in private preview
Tonic Textual is now available in private preview on Microsoft Fabric, enabling teams to de-identify sensitive text and documents directly in their Lakehouse. This integration empowers enterprises to unlock AI-ready datasets while ensuring compliance, privacy, and scalability. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/tonic-textual-on-microsoft-fabric-now-in-private-preview/
-
Tonic Textual on Microsoft Fabric: Now in private preview
Tonic Textual is now available in private preview on Microsoft Fabric, enabling teams to de-identify sensitive text and documents directly in their Lakehouse. This integration empowers enterprises to unlock AI-ready datasets while ensuring compliance, privacy, and scalability. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/tonic-textual-on-microsoft-fabric-now-in-private-preview/
-
USENIX 2025: PEPR ’25 Establishing Privacy Metrics For Genomic Data Analysis
Creator, Author and Presenter: Curtis Mitchell, xD, United States Census Bureau Additional Authors: Gary Howarth And Justin Wagner, NIST; Jess Stahl, Census; Christine Task And Karan Bhagat, Knexus; Amy Hilla And Rebecca Steinberg, MITRE Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First…
-
USENIX 2025: PEPR ’25 My $5MM Differential Privacy Visualizations
Creator, Author and Presenter: Marc-Antoine Paré Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-my-5mm-differential-privacy-visualizations/
-
Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt
Trend Micro reveals that RepairIt “contradicted its privacy policy by collecting, storing, and, due to weak Development, Security, and Operations practices, inadvertently leaking private user data.” The post Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/repairit-security-breach/
-
European AI company’s ‘reputation reports’ are inaccurate and illegal, watchdog claims
The digital privacy nonprofit noyb says a Lithuania-based data broker has a “very shady business model” that runs afoul of European data privacy laws. First seen on therecord.media Jump to article: therecord.media/reputation-reports-data-broker-noyb-complaint-lituania
-
Brave launches ‘Ask Brave’ feature to fuse AI with traditional search
Brave Software, the creator of the privacy-focused web browser and search engine, has introduced a new subsystem called Ask Brave that unifies search and AI chat into a single interface. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/artificial-intelligence/brave-launches-ask-brave-feature-to-fuse-ai-with-traditional-search/
-
Milestone Episode 400: Reflecting on 16 Years of Shared Security
Episode 400! In this special milestone edition of the Shared Security Podcast, we look back at 16 years of conversations on security, privacy, and technology. From our very first episodes in 2009 to today’s AI-driven threats, we cover the topics that defined each era, the surprises along the way, and the lessons that still matter….…
-
Milestone Episode 400: Reflecting on 16 Years of Shared Security
Episode 400! In this special milestone edition of the Shared Security Podcast, we look back at 16 years of conversations on security, privacy, and technology. From our very first episodes in 2009 to today’s AI-driven threats, we cover the topics that defined each era, the surprises along the way, and the lessons that still matter….…
-
USENIX 2025: PEPR ’25 Enterprise-Scale Privacy For AI: How Canva Scaled Customer Control Of Data For AI Training
Creator, Author and Presenter: Phillip Ward, Canva Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-enterprise-scale-privacy-for-ai-how-canva-scaled-customer-control-of-data-for-ai-training/
-
USENIX 2025: PEPR ’25 UsersFirst: A User-Centric Threat Modeling Framework For Privacy Notice And Choice
Creators, Authors and Presenters: Norman Sadeh And Lorrie Cranor, Carnegie Mellon University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-usersfirst-a-user-centric-threat-modeling-framework-for-privacy-notice-and-choice/
-
USENIX 2025: Using Privacy Infrastructure To Kickstart AI Governance: NIST AI Risk Management Case Studies
Creators, Authors and Presenters: Katharina Koerner, Trace3; Nandita Rao Narla, DoorDash Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-using-privacy-infrastructure-to-kickstart-ai-governance-nist-ai-risk-management-case-studies/
-
USENIX 2025: PEPR ’25 Observable…Yet Still Private? An Offensive Privacy Perspective On Observability
Creators, Authors and Presenters: Cat Easdon, Dynatrace Research; Patrick Berchtold, Dynatrace Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-observable-yet-still-private-an-offensive-privacy-perspective-on-observability/
-
Senate Bill Seeks Privacy Protection for Brain Wave Data
MIND Act Asks FTC to Study Exploitation Risks for Neural Data Collected by Devices. Are brain waves and similar neural data the next frontier in consumer privacy worries? A trio of U.S. senators have introduced federal legislation aiming to get ahead of risks that such brain-related data could be collected and misused by tech firms,…
-
China is Fueling Surveillance Technology Adoption in Latin America”, Who is in Charge of Data Privacy?
China’s Belt and Road Initiative (BRI) is well known for funding major infrastructure projects, including new highways, ports and energy plants across more than 150 countries. However, China has also gained a serious foothold when it comes to surveillance infrastructure. This less publicized development has taken off in Latin America in particular, where 35 cities..…
-
China is Fueling Surveillance Technology Adoption in Latin America”, Who is in Charge of Data Privacy?
China’s Belt and Road Initiative (BRI) is well known for funding major infrastructure projects, including new highways, ports and energy plants across more than 150 countries. However, China has also gained a serious foothold when it comes to surveillance infrastructure. This less publicized development has taken off in Latin America in particular, where 35 cities..…

