Tag: privacy
-
NDSS 2025 A Key-Driven Framework For Identity-Preserving Face Anonymization
SESSION Session 3D: Al Safety ———– ———– Authors, Creators & Presenters: Miaomiao Wang (Shanghai University), Guang Hua (Singapore Institute of Technology), Sheng Li (Fudan University), Guorui Feng (Shanghai University) ———– PAPER A Key-Driven Framework for Identity-Preserving Face Anonymization Virtual faces are crucial content in the metaverse. Recently, attempts have been made to generate virtual faces…
-
Privacy group sues feds over talks with tech companies on ICE raid trackers
The lawsuit concerns the removal of apps like ICEBlock, Red Dot and DeICER from online playstores that provide real-time tracking of immigration raids. First seen on cyberscoop.com Jump to article: cyberscoop.com/eff-sues-government-app-removals-ice-tracking-free-speech/
-
Privacy group sues feds over talks with tech companies on ICE raid trackers
The lawsuit concerns the removal of apps like ICEBlock, Red Dot and DeICER from online playstores that provide real-time tracking of immigration raids. First seen on cyberscoop.com Jump to article: cyberscoop.com/eff-sues-government-app-removals-ice-tracking-free-speech/
-
Protecting User Data While Boosting Visibility: Secure SEO Strategies for Manufacturers
Learn how manufacturers can boost visibility while protecting user data with secure SEO, passwordless authentication, and privacy-first digital strategies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/protecting-user-data-while-boosting-visibility-secure-seo-strategies-for-manufacturers/
-
Protecting User Data While Boosting Visibility: Secure SEO Strategies for Manufacturers
Learn how manufacturers can boost visibility while protecting user data with secure SEO, passwordless authentication, and privacy-first digital strategies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/protecting-user-data-while-boosting-visibility-secure-seo-strategies-for-manufacturers/
-
Privacy oversight board finds FBI does not buy real-time location data
The report, which is based on an investigation begun by the Privacy and Civil Liberties Oversight Board (PCLOB) in 2017, provides an overview of what open-source information the FBI consults in such investigations. First seen on therecord.media Jump to article: therecord.media/pclob-finds-fbi-does-not-use-real-time-location-data
-
Education boards left gates wide open for PowerSchool mega-breach, say watchdogs
Privacy cops say attack wasn’t just bad luck but a result of sloppy homework First seen on theregister.com Jump to article: www.theregister.com/2025/11/20/powerschool_breach_reports/
-
Google Play Store’s privacy practices still confuse Android users
Privacy rules like GDPR and CCPA are meant to help app stores be clearer about how apps use your data. But in the Google Play Store, those privacy sections often leave people … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/20/google-play-store-privacy-practices/
-
WhatsApp flaw allowed discovery of the 3.5 billion mobile numbers registered to the platform
Tags: api, attack, bug-bounty, business, china, cloud, dark-web, data, data-breach, encryption, flaw, government, mobile, phishing, phone, privacy, spam, technology, vulnerability, windowsHey there You are using WhatsApp, marks this as one of the most embarrassing weaknesses yet in the world’s most widely-used communication app.The vulnerability was in WhatsApp’s contact discovery mechanism, the foundation of how this and many similar apps work. When WhatsApp is installed, it asks for permission to match mobile numbers in a user’s…
-
WhatsApp flaw allowed discovery of the 3.5 billion mobile numbers registered to the platform
Tags: api, attack, bug-bounty, business, china, cloud, dark-web, data, data-breach, encryption, flaw, government, mobile, phishing, phone, privacy, spam, technology, vulnerability, windowsHey there You are using WhatsApp, marks this as one of the most embarrassing weaknesses yet in the world’s most widely-used communication app.The vulnerability was in WhatsApp’s contact discovery mechanism, the foundation of how this and many similar apps work. When WhatsApp is installed, it asks for permission to match mobile numbers in a user’s…
-
WIRED Roundup: DHS’s Privacy Breach, AI Romantic Affairs, and Google Sues Text Scammers
In this episode of Uncanny Valley, we discuss our scoop about how the Department of Homeland Security illegally collected Chicago residents’ data for month, as well as the news of the week. First seen on wired.com Jump to article: www.wired.com/story/uncanny-valley-podcast-wired-roundup-dhs-privacy-breach-ai-romantic-affairs-google-sues-text-scammers/
-
Canadian privacy regulators say schools share blame for PowerSchool hack
The Ontario and Alberta information and privacy commissioners’ reports fault the school systems for several missteps, including not putting privacy and security related provisions in their contracts with the education software firm. First seen on therecord.media Jump to article: therecord.media/canadian-privacy-regulators-say-schools-share-blame-powerschool-hack
-
Everest Ransomware Alleges Major Data Breach Targeting Under Armour
The alleged Everest ransomware breach could expose millions of Under Armour customers to serious security and privacy risks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/everest-ransomware-alleges-major-data-breach-targeting-under-armour/
-
Tenable Cloud Vulnerability Management: Reducing Vulnerability Risk in the Cloud Era
Tags: access, ai, api, attack, ciso, cloud, compliance, container, data, exploit, flaw, google, identity, infrastructure, intelligence, oracle, privacy, risk, risk-assessment, service, software, technology, threat, training, vulnerability, vulnerability-managementTenable has launched Tenable Cloud Vulnerability Management, a powerful new offering within Tenable One, to help vulnerability management leaders identify, prioritize, and remediate exposures across multi-cloud and hybrid environments. Key takeaways Agentless inventory and visibility: Achieve complete asset inventory and coverage across all existing virtual machines, virtual machine images and container images in AWS, Azure,…
-
Tenable Cloud Vulnerability Management: Reducing Vulnerability Risk in the Cloud Era
Tags: access, ai, api, attack, ciso, cloud, compliance, container, data, exploit, flaw, google, identity, infrastructure, intelligence, oracle, privacy, risk, risk-assessment, service, software, technology, threat, training, vulnerability, vulnerability-managementTenable has launched Tenable Cloud Vulnerability Management, a powerful new offering within Tenable One, to help vulnerability management leaders identify, prioritize, and remediate exposures across multi-cloud and hybrid environments. Key takeaways Agentless inventory and visibility: Achieve complete asset inventory and coverage across all existing virtual machines, virtual machine images and container images in AWS, Azure,…
-
The Data Privacy Risk Lurking in Paperless Government
The world is becoming increasingly paperless, and most organizations, including federal agencies, are following suit. Switching from paper-based processes to digital ones offers great benefits. However, the security and compliance challenges that come with this shift aren’t to be taken lightly. As the federal government goes paperless to cut costs and modernize operational processes, a..…
-
Understanding India’s Digital Personal Data Potection Act 2025: A Complete Overview
India’s Digital Personal Data Protection Act (DPDP), 2023, signaled the country’s commitment to building a modern and globally aligned privacy framework. But as with any legislation, the true operational impact becomes clear only when detailed rules are published. With the release of the Digital Personal Data Protection Rules (DPDP), 2025, organisations now have a clear,……
-
The privacy panic around machine learning is overblown
We often hear warnings about how machine learning (ML) models may expose sensitive information tied to their training data. The concern is understandable. If a model was … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/18/machine-learning-privacy-risk-training-data/
-
The privacy panic around machine learning is overblown
We often hear warnings about how machine learning (ML) models may expose sensitive information tied to their training data. The concern is understandable. If a model was … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/18/machine-learning-privacy-risk-training-data/
-
Pre-Installed Spyware Found on Samsung Galaxy Devices and Cannot Be Removed
Samsung users across West Asia and North Africa are raising serious privacy concerns over AppCloud. This pre-installed bloatware application collects sensitive personal data without consent. It cannot be easily removed from Galaxy A and M series smartphones. AppCloud, developed by ironSource, an Israeli-founded company now owned by American tech firm Unity, has been embedded into…
-
India’s new data privacy rules turn privacy compliance into an engineering challenge
Tags: ai, automation, backup, cloud, compliance, data, encryption, india, monitoring, nist, privacy, saas, toolArchitectural changes required: Analysts point out that meeting erasure deadlines and purpose-based storage limits will require deeper architectural changes.”Architectural changes include deploying encryption, masking, and tokenization for secure storage, implementing consent managers, and integrating erasure standards like NIST 800-88 or IEEE 2883 for IT asset sanitization,” Mahapatra said. “Cloud-native architectures with granular data classification and…
-
The rise of the chief trust officer: Where does the CISO fit?
Tags: ai, business, ceo, ciso, compliance, control, credentials, cybersecurity, data, governance, grc, jobs, marketplace, metric, office, privacy, risk, soc, strategy, technology, vulnerabilityCISO and CTrO: A model for a working partnership?: As customers, partners and regulators demand greater openness and assurance, those in the role say building trust, not just security, is the answer. Trust is touted as a differentiator for organizations looking to strengthen customer confidence and find a competitive advantage. Trust cuts across security, privacy,…
-
ISMG Editors: What Comes Next After US Government Shutdown?
Also: Insights From ISMG’s Global Events, Tenzai’s $75 Million Seed Round. In this week’s panel, ISMG editors broke down the mounting pressure on the Department of Health and Human Services and its privacy and security operations, the $75 million seed round for autonomous pen testing startup Tenzai and key themes from ISMG’s recent global summits…

