Apple’s scanning iCloud photos for child abuse images

Credit to Author: Lisa Vaas| Date: Thu, 09 Jan 2020 12:22:36 +0000

It isn’t new, all the tech giants do it, and your privacy’s intact – unless you’re dealing in illegal imagery with telltale hashing.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Z3fh0bRjivU” height=”1″ width=”1″ alt=””/>

Read more

Google voice Assistant gets new privacy ‘undo’ commands

Credit to Author: John E Dunn| Date: Thu, 09 Jan 2020 12:02:58 +0000

Google’s controversial voice Assistant is getting a series of new commands designed to work like privacy-centric ‘undo’ buttons.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/suVe_eSbeHg” height=”1″ width=”1″ alt=””/>

Read more

FBI asks Apple to help it unlock iPhones of naval base shooter

Credit to Author: Lisa Vaas| Date: Thu, 09 Jan 2020 11:41:31 +0000

This could signal a renewed war between Apple and law enforcement over breaking encryption.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/TYQ-v0iT5FM” height=”1″ width=”1″ alt=””/>

Read more

YouTube to treat all kid-aimed videos like they’re COPPA-liable

Credit to Author: Lisa Vaas| Date: Wed, 08 Jan 2020 12:29:40 +0000

The FTC can fine content creators up to $42,530 per violation – even though they don’t collect, receive, nor have access to kids’ data.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/_7NLfWyE57Q” height=”1″ width=”1″ alt=””/>

Read more

The Everyday Cyber Threat Landscape: Trends from 2019 to 2020

Credit to Author: Trend Micro| Date: Mon, 06 Jan 2020 13:15:04 +0000

The past 12 months have been another bumper year for cybercrime affecting everyday users of digital technology. Trend Micro blocked more than 26.8 billion of these threats in the first half of 2019 alone. The bad news is that there are many more out there waiting to steal your personal data for identity fraud, access…

The post The Everyday Cyber Threat Landscape: Trends from 2019 to 2020 appeared first on .

Read more

Amid privacy and security failures, digital IDs advance

Credit to Author: Lucas Mearian| Date: Mon, 06 Jan 2020 03:00:00 -0800

Frustration over a growing number of privacy and security failuresin recent years is driving the creation of digital identities controlled only by those whose information they contain.

Known as “self-sovereign identities,” the digital IDs will be used by consumers, businesses, their workers and governments over the next few years to verify everything from credit worthiness and college diplomas to licenses and business-to-business credentials.

“We are slowly graduating from crawling to walking. It takes one to two years ’til we have reliable capabilities to spark meaningful decentralized identity adoption,” said Homan Farahmand, a senior research director at Gartner. “A major non-technical hurdle is for organizations to learn the concept and take the necessary steps to appropriately adapt their business processes to decentralized identity ecosystems.”

To read this article in full, please click here

Read more

Online privacy in 2019: a legislative review

Credit to Author: David Ruiz| Date: Mon, 23 Dec 2019 17:41:31 +0000

Americans enjoy no federal rights to access their data, correct their data, easily move their data from one company to another, or individually sue a company that invades their private lives online. Several US Senators want to change that.

Categories:

Tags:

(Read more…)

The post Online privacy in 2019: a legislative review appeared first on Malwarebytes Labs.

Read more

Smartphone location data can be used to identify and track anyone

Credit to Author: John E Dunn| Date: Mon, 23 Dec 2019 13:29:18 +0000

In today’s smartphone economy, hiding your location has become a major challenge.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/wo6BHh–3_s” height=”1″ width=”1″ alt=””/>

Read more