Tag: privacy
-
Ireland proposes new law allowing police to use spyware
The Irish government announced that it wants to pass a law that would grant police more surveillance powers, such as using spyware to fight serious crime, while aiming to protect the privacy rights of its citizens. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/22/ireland-proposes-new-law-allowing-police-to-use-spyware/
-
Securing the Future: Practical Approaches to Digital Sovereignty in Google Workspace
Tags: access, attack, ciso, cloud, compliance, computing, container, control, data, defense, dora, email, encryption, GDPR, google, Hardware, healthcare, identity, infrastructure, law, malware, network, privacy, regulation, resilience, risk, service, software, strategy, zero-trustSecuring the Future: Practical Approaches to Digital Sovereignty in Google Workspace madhav Thu, 01/22/2026 – 04:35 In today’s rapidly evolving digital landscape, data privacy and sovereignty have become top priorities for organizations worldwide. With the proliferation of cloud services and the tightening of global data protection regulations, security professionals face mounting pressure to ensure their…
-
Surveillance and ICE Are Driving Patients Away From Medical Care, Report Warns
A new EPIC report says data brokers, ad-tech surveillance, and ICE enforcement are among the factors leading to a “health privacy crisis” that is eroding trust and deterring people from seeking care. First seen on wired.com Jump to article: www.wired.com/story/surveillance-and-ice-are-driving-patients-away-from-medical-care-report-warns/
-
Fight for the Future, EFF, Others Push Back Against Growing ICE Surveillance
The privacy rights group Fight for the Future was one of 44 organizations that sent a letter to lawmakers urging them to pull back on funding for ICE, noting the growing threats to U.S. citizens and others as the agency spends millions of dollars on its growing surveillance capabilities. First seen on securityboulevard.com Jump to…
-
Google Gemini Flaw Turns Calendar Invites Into Attack Vector
The indirect prompt injection vulnerability allows an attacker to weaponize calendar invites to circumvent Google’s privacy controls and access private data. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/google-gemini-flaw-calendar-invites-attack-vector
-
Privacy teams feel the strain as AI, breaches, and budgets collide
Privacy programs are under strain as organizations manage breach risk, new technology, and limited resources. A global study from ISACA shows that AI is gaining ground in … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/20/isaca-privacy-program-pressures/
-
Google Gemini Flaw Allows Access to Private Meeting Details Through Calendar Events
A harmless-looking Google Calendar invite has revealed a new frontier in the exploitation ofartificial intelligence (AI). Security researchers at Miggo discovered a vulnerability in Google Gemini’s integration with Google Calendar that allowed attackers to bypass privacy controls and exfiltrate sensitive meeting datawithout any user interaction. Gemini, Google’s AI assistant, interacts with Calendar to help users…
-
HHS Urges Health Sector to Harden Security of PHI, Devices
Feds Pushing HIPAA Regulated Entities to Bolster Security Risk Management. Federal regulators are advising regulated healthcare firms and their third-party vendors to harden systems, software and medical devices to better safeguard protected health information. Hardening is a necessary measure for protecting data privacy security – but also in protecting patient safety. First seen on govinfosecurity.com…
-
NDSS 2025 ASGARD
Session 9B: DNN Attack Surfaces Authors, Creators & Presenters: Myungsuk Moon (Yonsei University), Minhee Kim (Yonsei University), Joonkyo Jung (Yonsei University), Dokyung Song (Yonsei University) PAPER ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments On-device deep learning, increasingly popular for enhancing user privacy, now poses a serious risk to the privacy of…
-
Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
Tags: control, cybersecurity, data, data-breach, flaw, google, injection, malicious, privacy, vulnerabilityCybersecurity researchers have disclosed details of a security flaw that leverages indirect prompt injection targeting Google Gemini as a way to bypass authorization guardrails and use Google Calendar as a data extraction mechanism.The vulnerability, Miggo Security’s Head of Research, Liad Eliyahu, said, made it possible to circumvent Google Calendar’s privacy controls by hiding a dormant…
-
Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?
In this episode, we explore Amazon Ring’s newly introduced Familiar Faces feature that utilizes AI for facial recognition. We discuss the convenience of identifying familiar people at your doorstep, the privacy concerns it raises, and the legal implications surrounding biometric data. Learn about how this feature works, potential inaccuracies, and privacy laws in certain U.S….…
-
From arts degree to cybersecurity: Rona Michele Spiegel brings fresh perspective to cyber leadership
Tags: ai, awareness, business, cisco, ciso, cloud, compliance, computer, cyber, cybersecurity, data, governance, group, hacking, Hardware, intelligence, jobs, network, office, penetration-testing, privacy, psychology, risk, risk-management, skills, software, startup, strategy, supply-chain, technology, tool, vulnerabilityRona Michele Spiegel’s journey to cybersecurity might seem unconventional to some: She studied the arts. But as someone who grew up when computers first appeared and everyone wanted to experiment with them, she did a lot of multimedia work. She was always interested in technology and discussed with art colleagues about where the world was…
-
Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters
ICE protests surveillance yet uses tech to track citizens’ devices, possibly violating privacy laws and the Fourth Amendment, revealed through ICE’s data tools. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/whos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters/
-
Will 2026 See a ‘ChatGPT Moment’ for Microchip Implants?
As Hollywood imagines our future, are brain and human microchip implants nearing a “ChatGPT moment” in 2026? Medical progress collides with privacy fears and state bans. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/will-2026-see-a-chatgpt-moment-for-microchip-implants/
-
NDSS 2025 ScopeVerif: Analyzing The Security Of Android’s Scoped Storage Via Differential Analysis
Session 9A: Android Security 2 Authors, Creators & Presenters: Zeyu Lei (Purdue University), Güliz Seray Tuncay (Google), Beatrice Carissa Williem (Purdue University), Z. Berkay Celik (Purdue University), Antonio Bianchi (Purdue University) PAPER ScopeVerif: Analyzing the Security of Android’s Scoped Storage via Differential Analysi Storage on Android has evolved significantly over the years, with each new…
-
CCPA: Understanding how synthetic data can help achieve compliance
You’ve probably felt the pain of trying to move fast while navigating a growing maze of privacy rules. Learn how synthetic data helps your organization comply with CCPA. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/ccpa-understanding-how-synthetic-data-can-help-achieve-compliance/
-
Breach Roundup: Software Update Caused Verizon Outage
Also, Venezuela Cyberattack, Endesa Confirms Breach and Telegram IP Leak. This week, a software flaw caused the Verizon outage. U.S. cyberattack in Venezuela. ICE identities published online. BreachForums users leaked. Spanish energy provider Endesa data breach. Telegram privacy risk. A MuddyWater upgrade. Dutch man sentenced for hacking a maritime port. A ServiceNow patch. First seen…
-
NDSS 2025 PolicyPulse:Precision Semantic Role Extraction For Enhanced Privacy Policy Comprehension
Session 8D: Usability Meets Privacy Authors, Creators & Presenters: Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), Rinku Dewri (University of Denver) PAPER PolicyPulse: Precision Semantic Role Extraction For Enhanced Privacy Policy Comprehension The effectiveness of natural language privacy policies continues to be clouded by concerns surrounding their readability, ambiguity, and accessibility. Despite…
-
AI in Manufacturing: The Growing Risk and Reward Dilemma Escalating Data Security
Explore the challenges and strategies for securing AI integration in manufacturing, focusing on governance, data privacy, and the role of connected worker platforms. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/ai-in-manufacturing-the-growing-risk-and-reward-dilemma-escalating-data-security/
-
Proton expands Lumo AI assistant with encrypted, project-based workspaces
Lumo is Proton’s AI assistant, built with a focus on privacy and user control. It runs on Proton’s infrastructure and is designed so conversations are not used to train models … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/14/proton-lumo-1-3-projects/
-
Dark Patterns, Children’s Data and Corporate Fiduciary Risk
How UX Decisions Are Becoming Regulatory Liabilities for CISOs Children’s data is entering a new regulatory era where dark patterns, defaults and monetization choices can signal breached fiduciary duty. As privacy, safety and consumer laws converge globally, CISOs must treat manipulative UX, consent flows and retention practices as core security and governance risks. First seen…
-
Telegram to Add Warning for Proxy Links After IP Leak Concerns
Telegram will add a warning for proxy links after reports showed they can expose user IP addresses with a single click, bypassing VPN or privacy settings. First seen on hackread.com Jump to article: hackread.com/telegram-add-warning-proxy-links-ip-leak/
-
California Fines, Bans Data Broker in Privacy Crackdown
Regulators Cite Sales of Sensitive Health, Demographic Data. California state regulators fined a Texas company that buys and sells data for targeted marketing, including lists pertaining to health conditions of older adults, as part of a crackdown on data brokers. The firm is now banned from selling all Californians’ personal information. First seen on govinfosecurity.com…
-
Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult
No matter what new laws or regulations make the cut for 2026, it’s clear that compliance challenges will persist and federal legislation will be limited. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/navigating-privacy-and-cybersecurity-laws-in-2026-will-prove-difficult
-
Apple confirms Google Gemini will power Siri, says privacy remains a priority
Apple and Google have confirmed that the next version of Siri will use Gemini and Google Cloud in a multi-year collaboration between the two tech giants. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/apple/apple-confirms-google-gemini-will-power-siri-says-privacy-remains-a-priority/
-
California Shuts Down Health Data Resales By Unregistered Brokers
California privacy regulator, the CPPA, is cracking down on data brokers trading personal data without authorization First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/california-shuts-health-data/
-
California bans data broker reselling health data of millions
The California Privacy Protection Agency (CalPrivacy) has taken action against the Datamasters marketing firm that sold the health and personal data of millions of users without being registered as a data broker. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/legal/california-bans-data-broker-reselling-health-data-of-millions/
-
NDSS 2025 EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel
Session 8B: Electromagnetic Attacks Authors, Creators & Presenters: Wenhao Li (Shandong University), Jiahao Wang (Shandong University), Guoming Zhang (Shandong University), Yanni Yang (Shandong University), Riccardo Spolaor (Shandong University), Xiuzhen Cheng (Shandong University), Pengfei Hu (Shandong University) PAPER EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel Iris recognition is one of the most secure biometric…

