Tag: privacy
-
macOS Flaw Enables Silent Bypass of Apple Privacy Controls
A macOS vulnerability (CVE-2025-43530) allows attackers to silently bypass TCC privacy controls and access sensitive user data. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/macos-flaw-enables-silent-bypass-of-apple-privacy-controls/
-
Product showcase: Blokada for Android gives users control over network traffic
Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to reduce ads, block trackers, and limit unwanted … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/06/product-showcase-blokada-android-control-network-traffic/
-
The nation’s strictest privacy law just took effect, to data brokers’ chagrin
Californians can now submit demands requiring 500 brokers to delete their data. First seen on arstechnica.com Jump to article: arstechnica.com/tech-policy/2026/01/data-broker-hoarding-is-rampant-new-law-lets-consumers-fight-back/
-
California’s DROP Program Changes Everything: How B2C Companies Can Eliminate Authentication Liabilities and Meet Global Privacy Compliance with MojoAuth
California’s DROP Program Changes Everything First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/californias-drop-program-changes-everything-how-b2c-companies-can-eliminate-authentication-liabilities-and-meet-global-privacy-compliance-with-mojoauth/
-
California’s DROP Program Changes Everything: How B2C Companies Can Eliminate Authentication Liabilities and Meet Global Privacy Compliance with MojoAuth
California’s DROP Program Changes Everything First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/californias-drop-program-changes-everything-how-b2c-companies-can-eliminate-authentication-liabilities-and-meet-global-privacy-compliance-with-mojoauth/
-
Disney Fined $10M for Violating Children’s Privacy Laws on YouTube
Disney agrees to a $10M settlement with the DOJ and FTC over YouTube privacy violations. Learn how the COPPA ruling affects kids’ data and Disney’s new rules. First seen on hackread.com Jump to article: hackread.com/disney-fine-violating-children-privacy-laws-youtube/
-
NDSS 2025 A New PPML Paradigm For Quantized Models
Session 7D: ML Security Authors, Creators & Presenters: Tianpei Lu (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Bingsheng Zhang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Xiaoyuan Zhang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Kui Ren (The State Key Laboratory of Blockchain…
-
8 WhatsApp Features to Boost Your Security and Privacy
Tags: privacyMeta’s end-to-end encrypted messaging app is used by billions of people. Here’s how to make sure you’re one of the most locked-down ones out there. First seen on wired.com Jump to article: www.wired.com/story/5-features-that-boost-security-and-privacy-on-whatsapp/
-
Data Privacy vs Cybersecurity Solutions: Key Differences
The post <b>Data Privacy vs Cybersecurity Solutions: Key Differences</b> appeared first on Sovy. First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/01/data-privacy-vs-cybersecurity-solutions-key-differences/
-
NDSS 2025 “¢ Decentralized Infrastructure For Sharing Trusted Encrypted Facts And Nothing More
Session 7C: Secure Protocols Authors, Creators & Presenters: Sofia Celi (Brave Software), Alex Davidson (NOVA LINCS & Universidade NOVA de Lisboa), Hamed Haddadi (Imperial College London & Brave Software), Gonçalo Pestana (Hashmatter), Joe Rowell (Information Security Group, Royal Holloway, University of London) PAPER DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More We…
-
NDSS 2025 Impact Tracing: Identifying The Culprit Of Misinformation In Encrypted Messaging Systems
Session 7C: Secure Protocols Authors, Creators & Presenters: Zhongming Wang (Chongqing University), Tao Xiang (Chongqing University), Xiaoguo Li (Chongqing University), Biwen Chen (Chongqing University), Guomin Yang (Singapore Management University), Chuan Ma (Chongqing University), Robert H. Deng (Singapore Management University) PAPER Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems Encrypted messaging systems obstruct…
-
Disney will pay $10 million to settle children’s data privacy lawsuit
Disney has agreed to pay a $10 million civil penalty to settle claims that it violated the Children’s Online Privacy Protection Act by mislabeling videos and allowing data collection for targeted advertising. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/disney-will-pay-10m-to-settle-claims-of-childrens-privacy-violations-on-youtube/
-
Top 10 surveillance, journalism and encryption stories of 2025
A transatlantic row between the UK and the Trump administration erupted after the UK attempted to force Apple to break its advanced encryption. That was just one of a series of stories reporting on the tension between state surveillance and privacy this year First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366636284/Top-10-surveillance-journalism-and-encryption-stories-of-2025
-
The New Surveillance State Is You
Tags: privacyPrivacy may be dead, but civilians are turning conventional wisdom on its head by surveilling the cops as much as the cops surveil them. First seen on wired.com Jump to article: www.wired.com/story/expired-tired-wired-surveillance-state/
-
TDL 012 – The Architect of the Internet on the Future of Trust
Summary In this episode of The Defenders Log, Paul Mockapetris, the architect of DNS, discusses the evolving role of the Domain Name System from a simple directory to a sophisticated security tool. He posits that modern networking requires “making sure DNS doesn’t work when you don’t want it to,” comparing DNS filtering to essential services…
-
Reducing Cyber, Privacy Risks in Healthcare Sector M&As
Healthcare sector mergers and acquisitions dramatically amplify cybersecurity and data privacy exposure for potential buyers and sellers, said attorney Jonian Rafti of law firm Proskauer. But there are critical steps entities can take to reduce those risks, he said. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/reducing-cyber-privacy-risks-in-healthcare-sector-mas-i-5513
-
NDSS 2025 LAMP: Lightweight Approaches For Latency Minimization In Mixnets With Practical Deployment Considerations
Session 7A: Network Security 2 Authors, Creators & Presenters: Mahdi Rahimi (KU Leuven), Piyush Kumar Sharma (University of Michigan), Claudia Diaz (KU Leuven) PAPER LAMP: Lightweight Approaches For Latency Minimization In Mixnets With Practical Deployment Considerations Mixnets are a type of anonymous communication system designed to provide network privacy to users. They route client messages…
-
Italy Fines Apple Euro98.6 Million Over ATT Rules Limiting App Store Competition
Apple has been fined Euro98.6 million ($116 million) by Italy’s antitrust authority after finding that the company’s App Tracking Transparency (ATT) privacy framework restricted App Store competition.The Italian Competition Authority (Autorità Garante della Concorrenza e del Mercato, or AGCM) said the company’s “absolute dominant position” in app distribution allowed it to “unilaterally impose” First seen…
-
The Global Data Residency Crisis: How Enterprises Can Navigate Geolocation, Storage, and Privacy Compliance Without Sacrificing Performance
A Comprehensive Technical Guide for CTOs, CISOs, and Identity Architects First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/the-global-data-residency-crisis-how-enterprises-can-navigate-geolocation-storage-and-privacy-compliance-without-sacrificing-performance/
-
How to sanitize production data for use in testing
Explore data sanitization techniques and discover how proper sanitization improves test accuracy, protects privacy, and supports secure software development. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/how-to-sanitize-production-data-for-use-in-testing/
-
Italy fines Apple $116 million over App Store privacy policy issues
Italy’s competition authority (AGCM) has fined Apple Euro98.6 million ($116 million) for using the App Tracking Transparency (ATT) privacy framework to abuse its dominant market position in mobile app advertising. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/
-
Italy fines Apple $116 million over App Store privacy policy issues
Italy’s competition authority (AGCM) has fined Apple Euro98.6 million ($116 million) for using the App Tracking Transparency (ATT) privacy framework to abuse its dominant market position in mobile app advertising. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/
-
Italy fines Apple $116 million over App Store privacy policy issues
Italy’s competition authority (AGCM) has fined Apple Euro98.6 million ($116 million) for using the App Tracking Transparency (ATT) privacy framework to abuse its dominant market position in mobile app advertising. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/
-
2025 Year in Review at Cloud Security Podcast by Google
Tags: 2fa, ai, automation, breach, cloud, compliance, computing, control, cybersecurity, data, defense, detection, edr, finance, google, hacking, incident response, infrastructure, linux, mandiant, metric, mitigation, offense, phone, privacy, risk, security-incident, siem, soc, technology, threat, vulnerability, vulnerability-management, zero-trust(written jointly with Tim Peacock) Five years. It’s enough time to fully launch a cloud migration, deploy a new SIEM, or”Š”, “Šif you’re a very large enterprise”Š”, “Šjust start thinking about doing the first two. It’s also how long Tim and I have been subjecting the world to our thoughts on Cloud Security Podcast by Google. We…
-
Browser agents don’t always respect your privacy choices
Browser agents promise to handle online tasks without constant user input. They can shop, book reservations, and manage accounts by driving a web browser through an AI model. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/22/browser-agents-privacy-risks-study/
-
Why Smart Glasses in Hospitals Are Not a Bright Idea
Smart eyewear such as Meta-AI Ray Ban glasses – which sport microphones, cameras and can connect to artificial intelligence – pose emerging patient privacy and other risks especially when worn in healthcare settings, said Garrett Zickgraf of consulting firm LBMC. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/smart-glasses-in-hospitals-are-bright-idea-i-5509
-
The innovative CISO’s bucket list: Human-led transformation at the core
Tags: ai, application-security, breach, business, ciso, cloud, compliance, control, data, defense, GDPR, governance, group, privacy, regulation, resilience, risk, risk-management, threat, toolBuilding a unified, integrated defense: The second major bucket list theme is breaking down the silos that perpetually plague security organizations. Application security (AppSec), cloud security (CloudSec) and governance, risk and compliance (GRC) groups all work from different spreadsheets and tools and often with different objectives. This model is inefficient, expensive and leaves massive gaps…
-
The innovative CISO’s bucket list: Human-led transformation at the core
Tags: ai, application-security, breach, business, ciso, cloud, compliance, control, data, defense, GDPR, governance, group, privacy, regulation, resilience, risk, risk-management, threat, toolBuilding a unified, integrated defense: The second major bucket list theme is breaking down the silos that perpetually plague security organizations. Application security (AppSec), cloud security (CloudSec) and governance, risk and compliance (GRC) groups all work from different spreadsheets and tools and often with different objectives. This model is inefficient, expensive and leaves massive gaps…
-
The innovative CISO’s bucket list: Human-led transformation at the core
Tags: ai, application-security, breach, business, ciso, cloud, compliance, control, data, defense, GDPR, governance, group, privacy, regulation, resilience, risk, risk-management, threat, toolBuilding a unified, integrated defense: The second major bucket list theme is breaking down the silos that perpetually plague security organizations. Application security (AppSec), cloud security (CloudSec) and governance, risk and compliance (GRC) groups all work from different spreadsheets and tools and often with different objectives. This model is inefficient, expensive and leaves massive gaps…

