Tag: privacy
-
Japan relaxes privacy laws to make itself the ‘easiest country to develop AI’
Opting out of personal data use won’t be an option because Minister says that’s a ‘very big obstacle’ to AI adoption First seen on theregister.com Jump to article: www.theregister.com/2026/04/08/japan_privacy_law_changes_ai/
-
What we learned about TEE security from auditing WhatsApp’s Private Inference
WhatsApp’s new “Private Inference” feature represents one of the most ambitious attempts to combine end-to-end encryption with AI-powered capabilities, such as message summarization. To make this possible, Meta built a system that processes encrypted user messages inside trusted execution environments (TEEs), secure hardware enclaves designed so that not even Meta can access the plaintext. Our…
-
GPUBreach Attack Could Lead to Full System Takeover and Root Shell Access
A newly discovered vulnerability dubbed >>GPUBreach<< demonstrates that GPU-based Rowhammer attacks can now achieve complete system compromise. Scheduled for presentation at the IEEE Symposium on Security & Privacy in 2026, University of Toronto researchers revealed how manipulating GPU memory can lead to a full CPU root shell. Most alarmingly, this exploit successfully bypasses standard hardware…
-
Big tech vows to continue CSAM scanning in Europe despite expiration of law allowing it
Microsoft, Google, Meta and Snapchat released a statement on Friday saying they “reaffirm their continued commitment to protecting children and preserving privacy, and will continue to take voluntary action” to complete the scans. First seen on therecord.media Jump to article: therecord.media/big-tech-vows-to-continue-csam-scanning
-
Authentication is broken: Here’s how security leaders can actually fix it
Tags: access, attack, authentication, backup, business, communications, control, credentials, cryptography, data, exploit, fido, firmware, Hardware, healthcare, identity, login, mfa, microsoft, okta, passkey, privacy, resilience, risk, soc, technology, update, windowsSector snapshots: Where it breaks (and why that matters): Healthcare. Clinicians need tap and go speed with zero tolerance for downtime. One large hospital attempted to pair advanced HID SEOS credentials, which use privacy-preserving randomized IDs, with a clinical SSO platform that expects static IDs for user recognition. This architectural mismatch forced a choice between…
-
Meta YouTube Found Negligent: A Turning Point for Big Tech?
Tags: privacyA landmark jury verdict has found Meta and YouTube negligent in a social media addiction case, raising major questions about platform accountability and legal protections under Section 230. This episode covers the details of the case, why the ruling is significant, and what it could mean for the future of social media, privacy, and cybersecurity….…
-
BrowserGate: LinkedIn Tracks 6,000+ Browser Extensions on Users’ PCs
LinkedIn is accused in the BrowserGate report of tracking 6,000+ browser extensions on users’ PCs, raising concerns over privacy and data collection practices. First seen on hackread.com Jump to article: hackread.com/browsergate-linkedin-track-browser-extensions-user-pc/
-
Inconsistent Privacy Labels Don’t Tell Users What They Are Getting
Data privacy labels are a great idea for mobile apps, but the current versions just aren’t good enough. First seen on darkreading.com Jump to article: www.darkreading.com/data-privacy/inconsistent-privacy-labels-not-enough
-
prompted 2026 Evaluating Threats Automating Defense At Google
Author, Creator & Presenter: Heather Adkins, VP of Security Engineering, Google & Four Flynn, VP Security and Privacy, Google Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’) YouTube Channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/unprompted-2026-evaluating-threats-automating-defense-at-google/
-
Malwarebytes Privacy VPN receives full third-party audit
We commissioned a third-party audit for the infrastructure behind our VPNs. Here are the results. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/malwarebytes-privacy-vpn-receives-full-third-party-audit/
-
Zero-Knowledge Proofs: How to Prove You Know a Secret Without Revealing the Secret
The most powerful cryptographic primitive you’ve never heard of. Zero-knowledge proofs prove you know something without revealing what you know, and they’re quietly revolutionizing privacy, authentication, and blockchain technology. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/zero-knowledge-proofs-how-to-prove-you-know-a-secret-without-revealing-the-secret/
-
Zero-Knowledge Proofs: How to Prove You Know a Secret Without Revealing the Secret
The most powerful cryptographic primitive you’ve never heard of. Zero-knowledge proofs prove you know something without revealing what you know, and they’re quietly revolutionizing privacy, authentication, and blockchain technology. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/zero-knowledge-proofs-how-to-prove-you-know-a-secret-without-revealing-the-secret/
-
Microsoft Teams to Improve Privacy With EXIF Data Removal Feature
Microsoft is rolling out a wave of privacy and security updates for Microsoft Teams, headlining with a critical new feature that automatically removes EXIF metadata from shared images. These upcoming changes are designed to protect user privacy by default, streamline biometric data management, and enforce modern browser security standards across the platform. For cybersecurity professionals…
-
FBI warns against using Chinese mobile apps due to privacy risks
The U.S. Federal Bureau of Investigation (FBI) warned Americans against using foreign-developed mobile applications, particularly those created by Chinese developers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-warns-against-using-chinese-mobile-apps-over-to-data-security-risks/
-
Free VPNs leak your data while claiming privacy
Most free Android VPNs track users, request dangerous permissions, and connect to risky servers, privacy comes at a hidden cost. Free VPN apps are some of the most popular downloads on Android, promising privacy at no cost. But the reality is far from what they advertise. Most users tap “install” without a second thought, unaware…
-
Proton launches new “Meet” privacy-focused conferencing platform
Proton has announced a new video conferencing service named Meet and positioned it as a privacy-focused alternative to mainstream services like Google Meet, Zoom, and Microsoft Teams. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/proton-launches-new-meet-privacy-focused-conferencing-platform/
-
Proton Launches Encrypted Video Conferencing and Unified Workspace to Take On Google and Microsoft
Swiss privacy company Proton has today announced the simultaneous launch of Proton Workspace and Proton Meet, its most significant expansion yet into the enterprise productivity market and a direct challenge to the dominance of Google Workspace and Microsoft 365. The double launch marks a strategic pivot for the Geneva-based firm, which has built a user…
-
California Gets Serious About Regulation (Again)
California’s privacy regime has evolved. As of January 1, 2026, the CCPA/CPRA now mandates risk assessments, automated decision-making (AI) oversight, and independent cybersecurity audits. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/california-gets-serious-about-regulation-again/
-
Apple will hide your email address from apps and websites, but not cops
Demands for Apple customer records by federal agents in recent months underscore the privacy limitations of email. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/30/apple-will-hide-your-email-address-from-apps-and-websites-but-not-cops/
-
New CCPA Rules Turn Your Privacy Policy into a Liability
California’s revised CCPA rules took effect on January 1, 2026, and they expose a gap that most compliance teams have been ignoring. After you’ve updated… First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/new-ccpa-rules-turn-your-privacy-policy-into-a-liability/
-
Android 17 tweaks location privacy with one-time access
Google introduced a suite of location privacy features in Android 17 Beta 3 to give users more control and provide developers with tools for data minimization and product … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/30/android-location-privacy-features-control/
-
The Hidden Tracking Risk Inside Your Tires
In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can create privacy risks because the sensors broadcast unencrypted, uniquely identifying wireless signals that could be used to track vehicles. They reference a 10-week study by researchers at IMDEA in Madrid that collected about 6 million signals……
-
How to ensure confident data privacy with NHIs?
Are Non-Human Identities the Overlooked Guardians of Data Privacy? Where data breaches are as frequent as the morning sun, ensuring data privacy is paramount. Where businesses increasingly rely on cloud environments, new security paradigms have emerged, with Non-Human Identities (NHIs) at the forefront. But what exactly are NHIs, and how do they ensure data privacy?……
-
Apple’s Email Privacy Tool Tested in FBI Threat Case, Exposing Limits of Anonymity
Apple’s Hide My Email feature, long promoted as a privacy safeguard for consumers, has come under scrutiny following a federal investigation that revealed how easily anonymized identities can be uncovered through legal channels. Newly disclosed court records show that Apple provided authorities with account information tied to an anonymous email address used to send a..…
-
The CISO’s guide to responding to shadow AI
Tags: ai, breach, business, ciso, cybersecurity, data, governance, guide, mitigation, privacy, risk, strategy, technology, tool, training, updateUnderstand why AI is being used: If CISOs want to manage shadow AI effectively, they need to understand why it keeps popping up. The immediate reaction may be to shut down the use of shadow AI, but there must be more to the response than that.”Our focus is understanding why they’re using it, educating them…
-
4 Best Free VPNs in 2026
Looking for the best free VPNs? Check out our guide to find the most reliable and secure options for protecting your online privacy that won’t break the bank. The post 4 Best Free VPNs in 2026 appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/best-free-vpns/
-
Sen. Wyden Warns of Another Section 702 Abuse
Sen. Ron Wyden is warning us of an abuse of Section 702: Wyden took to the Senate floor to deliver a lengthy speech, ostensibly about the since approved (with support of many Democrats) nomination of Joshua Rudd to lead the NSA. Wyden was protesting that nomination, but in the context of Rudd being unwilling to…

