Tag: Data Protection

  • Schneier on Security: NCSC Guidance on “Advanced Cryptography”

    Source URL: https://www.schneier.com/blog/archives/2025/05/ncsc-guidance-on-advanced-cryptography.html Source: Schneier on Security Title: NCSC Guidance on “Advanced Cryptography” Feedly Summary: The UK’s National Cyber Security Centre just released its white paper on “Advanced Cryptography,” which it defines as “cryptographic techniques for processing encrypted data, providing enhanced functionality over and above that provided by traditional cryptography.” It includes things like homomorphic…

  • The Register: Microsoft gets twitchy over talk of Europe’s tech independence

    Source URL: https://www.theregister.com/2025/04/30/microsoft_getting_nervous_about_europes/ Source: The Register Title: Microsoft gets twitchy over talk of Europe’s tech independence Feedly Summary: Brad Smith commits org to facing off with US govt in court to protect them Microsoft is responding to mounting “geopolitical and trade volatility" between the US administration and governments in Europe by pledging privacy safeguards for…

  • Slashdot: Reddit Issuing ‘Formal Legal Demands’ Against Researchers Who Conducted Secret AI Experiment on Users

    Source URL: https://slashdot.org/story/25/04/29/1556234/reddit-issuing-formal-legal-demands-against-researchers-who-conducted-secret-ai-experiment-on-users Source: Slashdot Title: Reddit Issuing ‘Formal Legal Demands’ Against Researchers Who Conducted Secret AI Experiment on Users Feedly Summary: AI Summary and Description: Yes Summary: The mentioned report highlights ethical concerns surrounding AI experimentation, focusing on a situation where researchers from the University of Zurich deployed AI chatbots in a Reddit forum…

  • Cisco Security Blog: Instant Attack Verification: Verification to Trust Automated Response

    Source URL: https://feedpress.me/link/23535/17018376/instant-attack-verification-verification-to-trust-automated-response Source: Cisco Security Blog Title: Instant Attack Verification: Verification to Trust Automated Response Feedly Summary: Discover how Cisco XDR’s Instant Attack Verification brings real-time threat validation for faster, smarter SOC response. AI Summary and Description: Yes Summary: Cisco XDR’s Instant Attack Verification feature enhances the capabilities of Security Operations Centers (SOC) by…

  • NCSC Feed: Advanced Cryptography: new approaches to data privacy

    Source URL: https://www.ncsc.gov.uk/blog-post/advanced-cryptography-new-approaches-to-data-privacy Source: NCSC Feed Title: Advanced Cryptography: new approaches to data privacy Feedly Summary: A new NCSC paper discusses the suitability of emerging Advanced Cryptography techniques. AI Summary and Description: Yes Summary: The new paper by the National Cyber Security Centre (NCSC) on Advanced Cryptography explores its potential applications and relevance in enhancing…

  • Slashdot: Perplexity CEO Says Its Browser Will Track Everything Users Do Online To Sell Ads

    Source URL: https://tech.slashdot.org/story/25/04/25/044215/perplexity-ceo-says-its-browser-will-track-everything-users-do-online-to-sell-ads Source: Slashdot Title: Perplexity CEO Says Its Browser Will Track Everything Users Do Online To Sell Ads Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Perplexity’s plans to develop its own browser named Comet, primarily for the purpose of collecting user data to enhance targeted advertising. This raises significant…

  • Wired: Behold the Social Security Administration’s AI Training Video

    Source URL: https://www.wired.com/story/social-security-ai-training-video/ Source: Wired Title: Behold the Social Security Administration’s AI Training Video Feedly Summary: Social Security workers are being asked to use an AI chatbot. An animated video on how to do so failed to mention that the chatbot can’t be trusted with personally identifiable information. AI Summary and Description: Yes Summary: The…

  • Slashdot: Employee Monitoring App Leaks 21 Million Screenshots In Real Time

    Source URL: https://yro.slashdot.org/story/25/04/24/2057241/employee-monitoring-app-leaks-21-million-screenshots-in-real-time?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Employee Monitoring App Leaks 21 Million Screenshots In Real Time Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant privacy breach involving WorkComposer, a workplace surveillance app that exposed sensitive employee data due to an unsecured Amazon S3 bucket. This incident highlights crucial considerations for…

  • Slashdot: South Korea Says DeepSeek Transferred User Data, Prompts Without Consent

    Source URL: https://slashdot.org/story/25/04/24/2021250/south-korea-says-deepseek-transferred-user-data-prompts-without-consent?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: South Korea Says DeepSeek Transferred User Data, Prompts Without Consent Feedly Summary: AI Summary and Description: Yes Summary: South Korea’s data protection authority has raised significant concerns regarding DeepSeek, a Chinese AI startup, for illegally transferring user information without consent. This incident highlights critical issues surrounding data privacy and…