Tag: user consent
-
Hacker News: Is the use of reCAPTCHA GDPR-compliant?
Source URL: https://dg-datenschutz.de/ist_die_verwendung_von_recaptcha_dsgvo_konform/ Source: Hacker News Title: Is the use of reCAPTCHA GDPR-compliant? Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses the implications of Google’s reCAPTCHA technology concerning GDPR compliance, emphasizing the challenges it presents in balancing user privacy with security measures against bots. It highlights the lack of legal grounds…
-
The Register: Coordinates of millions of smartphones feared stolen, sparking yet another lawsuit against data broker
Source URL: https://www.theregister.com/2025/02/06/gravy_analytics_data_breach_suit/ Source: The Register Title: Coordinates of millions of smartphones feared stolen, sparking yet another lawsuit against data broker Feedly Summary: Fourth time’s the harm? Gravy Analytics has been sued yet again for allegedly failing to safeguard its vast stores of personal data, which are now feared stolen. And by personal data we…
-
Krebs on Security: Experts Flag Security, Privacy Risks in DeepSeek AI App
Source URL: https://krebsonsecurity.com/2025/02/experts-flag-security-privacy-risks-in-deepseek-ai-app/ Source: Krebs on Security Title: Experts Flag Security, Privacy Risks in DeepSeek AI App Feedly Summary: New mobile apps from the Chinese artificial intelligence (AI) company DeepSeek have remained among the top three “free" downloads for Apple and Google devices since their debut on Jan. 25, 2025. But experts caution that many…
-
Bulletins: Vulnerability Summary for the Week of January 27, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-034 Source: Bulletins Title: Vulnerability Summary for the Week of January 27, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 0xPolygonZero–plonky2 Plonky2 is a SNARK implementation based on techniques from PLONK and FRI. Lookup tables, whose length is not divisible by 26 = floor(num_routed_wires / 3) always…
-
Hacker News: Everyone knows your location: tracking myself down through in-app ads
Source URL: https://timsh.org/tracking-myself-down-through-in-app-ads/ Source: Hacker News Title: Everyone knows your location: tracking myself down through in-app ads Feedly Summary: Comments AI Summary and Description: Yes Summary: The text highlights a significant geolocation data leak involving over 2,000 apps that collect user data without consent, revealing privacy risks from intricate advertising networks. The author’s personal investigation…
-
The Register: Amazon sued for allegedly slurping sensitive data via advertising SDK
Source URL: https://www.theregister.com/2025/01/30/amazon_sued_for_snarfing_sensitive/ Source: The Register Title: Amazon sued for allegedly slurping sensitive data via advertising SDK Feedly Summary: Harvesting of location data and other personal info without user consent, lawsuit claims Amazon and its advertising subsidiary have been sued for allegedly collecting personal and location data from third-party mobile apps without obtaining users’ informed…
-
Bulletins: Vulnerability Summary for the Week of December 16, 2024
Source URL: https://www.cisa.gov/news-events/bulletins/sb24-358 Source: Bulletins Title: Vulnerability Summary for the Week of December 16, 2024 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Attendance Tracking Management System A vulnerability has been found in 1000 Projects Attendance Tracking Management System 1.0 and classified as critical. Affected by this vulnerability is…
-
Bulletins: Vulnerability Summary for the Week of January 20, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-026 Source: Bulletins Title: Vulnerability Summary for the Week of January 20, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info aEnrich Technology–a+HRD The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database…
-
Slashdot: Microsoft’s LinkedInn Sued For Disclosing Customer Information To Train AI Models
Source URL: https://yro.slashdot.org/story/25/01/22/236253/microsofts-linkedinn-sued-for-disclosing-customer-information-to-train-ai-models?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Microsoft’s LinkedInn Sued For Disclosing Customer Information To Train AI Models Feedly Summary: AI Summary and Description: Yes Summary: The text reports on a lawsuit against LinkedIn by its Premium customers, alleging unauthorized disclosure of private messages to third parties for training generative AI models, resulting in contract breach…
-
The Register: LinkedIn accused of training AI on private messages
Source URL: https://www.theregister.com/2025/01/22/linkedin_sued_for_allegedly_training/ Source: The Register Title: LinkedIn accused of training AI on private messages Feedly Summary: Microsoft’s IG-for-suits insists lawsuit’s claims are without merit Microsoft’s LinkedIn was this week accused of providing its third-party partners with access to Premium customers’ private InMail messages for AI model training.… AI Summary and Description: Yes Summary: The…