Tag: surveillance

  • Slashdot: More Than a Dozen VPN Apps Have Undisclosed Ties To China

    Source URL: https://yro.slashdot.org/story/25/06/12/1731258/more-than-a-dozen-vpn-apps-have-undisclosed-ties-to-china?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: More Than a Dozen VPN Apps Have Undisclosed Ties To China Feedly Summary: AI Summary and Description: Yes Summary: The text highlights concerns regarding the risk to user privacy and security posed by virtual private network (VPN) apps tied to Chinese companies available on Apple and Google’s app stores.…

  • Slashdot: Airlines Don’t Want You to Know They Sold Your Flight Data to DHS

    Source URL: https://news.slashdot.org/story/25/06/11/1825215/airlines-dont-want-you-to-know-they-sold-your-flight-data-to-dhs?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Airlines Don’t Want You to Know They Sold Your Flight Data to DHS Feedly Summary: AI Summary and Description: Yes Summary: The report highlights a troubling partnership between major U.S. airlines and a data broker that has sold sensitive flight information to Customs and Border Protection (CBP). This raises…

  • Slashdot: 40,000 IoT Cameras Worldwide Stream Secrets To Anyone With a Browser

    Source URL: https://tech.slashdot.org/story/25/06/10/2039202/40000-iot-cameras-worldwide-stream-secrets-to-anyone-with-a-browser?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: 40,000 IoT Cameras Worldwide Stream Secrets To Anyone With a Browser Feedly Summary: AI Summary and Description: Yes Summary: The report highlights a significant vulnerability in internet-connected cameras, with researchers accessing 40,000 live feeds, particularly emphasizing the risk posed to national security and personal privacy. It underscores the necessity…

  • The Register: Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser

    Source URL: https://www.theregister.com/2025/06/10/40000_iot_cameras_exposed/ Source: The Register Title: Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser Feedly Summary: Majority of exposures located in the US, including datacenters, healthcare facilities, factories, and more Security researchers managed to access the live feeds of 40,000 internet-connected cameras worldwide and they may have only scratched…

  • Slashdot: ‘Welcome to Campus. Here’s Your ChatGPT.’

    Source URL: https://news.slashdot.org/story/25/06/08/0239237/welcome-to-campus-heres-your-chatgpt?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: ‘Welcome to Campus. Here’s Your ChatGPT.’ Feedly Summary: AI Summary and Description: Yes Summary: California State University is pioneering the integration of ChatGPT across its campuses in an effort to prepare students for an AI-driven economy, marking a significant step toward what OpenAI calls “A.I.-native universities.” This initiative highlights…

  • Slashdot: Help Wanted To Build an Open Source ‘Advanced Data Protection’ For Everyone

    Source URL: https://it.slashdot.org/story/25/05/31/1859206/help-wanted-to-build-an-open-source-advanced-data-protection-for-everyone?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Help Wanted To Build an Open Source ‘Advanced Data Protection’ For Everyone Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the removal of Apple’s iCloud encryption feature in the U.K. due to government pressure, prompting a Google engineer to propose the development of an open-source alternative…

  • Wired: A Starter Guide to Protecting Your Data From Hackers and Corporations

    Source URL: https://www.wired.com/story/guide-protect-data-from-hackers-corporations/ Source: Wired Title: A Starter Guide to Protecting Your Data From Hackers and Corporations Feedly Summary: Hackers. AI data scrapes. Government surveillance. Thinking about where to start when it comes to protecting your online privacy can be overwhelming. Here’s a simple guide for you—and anyone who claims they have nothing to hide.…

  • Cloud Blog: How Confidential Computing lays the foundation for trusted AI

    Source URL: https://cloud.google.com/blog/products/identity-security/how-confidential-computing-lays-the-foundation-for-trusted-ai/ Source: Cloud Blog Title: How Confidential Computing lays the foundation for trusted AI Feedly Summary: Confidential Computing has redefined how organizations can securely process their sensitive workloads in the cloud. The growth in our hardware ecosystem is fueling a new wave of adoption, enabling customers to use Confidential Computing to support cutting-edge…

  • Slashdot: Montana Becomes First State To Close the Law Enforcement Data Broker Loophole

    Source URL: https://news.slashdot.org/story/25/05/16/0711214/montana-becomes-first-state-to-close-the-law-enforcement-data-broker-loophole?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Montana Becomes First State To Close the Law Enforcement Data Broker Loophole Feedly Summary: AI Summary and Description: Yes Summary: Montana’s SB 282 introduces significant privacy protections by prohibiting law enforcement from acquiring personal data without a warrant, addressing concerns over data broker practices. This legislation is crucial for…

  • CSA: SaaS Security Lessons from Recent Attacks

    Source URL: https://cloudsecurityalliance.org/articles/cloud-and-saas-security-in-critical-infrastructure-lessons-from-recent-attacks Source: CSA Title: SaaS Security Lessons from Recent Attacks Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses the increasing threat of cyberattacks on critical infrastructure, particularly in utility sectors like water and energy. It emphasizes the vulnerabilities that arise from adopting cloud-based solutions and proposes advanced security measures, including…