Privacy

Your heartbeat could reveal your identity, even in anonymized datasets

Your heartbeat could reveal your identity, even in anonymized datasets 2025-09-12 at 09:12 By Mirko Zorz A new study has found that electrocardiogram (ECG) signals, often shared publicly for medical research, can be linked back to individuals. Researchers were able to re-identify people in anonymous datasets with surprising accuracy, raising questions about how health data […]

React to this headline:

Loading spinner

Your heartbeat could reveal your identity, even in anonymized datasets Read More »

When typing becomes tracking: Study reveals widespread silent keystroke interception

When typing becomes tracking: Study reveals widespread silent keystroke interception 2025-09-11 at 09:17 By Mirko Zorz You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis,

React to this headline:

Loading spinner

When typing becomes tracking: Study reveals widespread silent keystroke interception Read More »

Signal adds secure backup option for chat history

Signal adds secure backup option for chat history 2025-09-09 at 10:52 By Anamarija Pogorelec Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The problem with lost chats Signal has long avoided cloud backups because

React to this headline:

Loading spinner

Signal adds secure backup option for chat history Read More »

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal 2025-09-09 at 10:22 By Mirko Zorz Nearly 500 scientists and researchers have signed an open letter warning that the latest version of the EU’s Chat Control Proposal would weaken digital security while failing to deliver meaningful protection for children. The signatories represent 34 countries

React to this headline:

Loading spinner

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal Read More »

How to reclaim control over your online shopping data

How to reclaim control over your online shopping data 2025-09-05 at 09:33 By Sinisa Markovic Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to think about what happens to the data we leave behind, or the risks that might come with it? Where shopping

React to this headline:

Loading spinner

How to reclaim control over your online shopping data Read More »

LinkedIn expands company verification, mandates workplace checks for certain roles

LinkedIn expands company verification, mandates workplace checks for certain roles 2025-09-04 at 16:00 By Mirko Zorz LinkedIn is rolling out new verification rules to make it easier to confirm that people and companies are who they claim to be. The company will now require workplace verification when someone adds or updates a leadership or recruiter

React to this headline:

Loading spinner

LinkedIn expands company verification, mandates workplace checks for certain roles Read More »

Five habits of highly secure development teams

Five habits of highly secure development teams 2025-09-03 at 07:46 By Help Net Security In this Help Net Security video, Brendon Collins, Principal Consultant at Optiv, explores how organizations can embed security and privacy into the software development lifecycle (SDLC) from the very start. He outlines five proactive principles, including default-deny architecture, privacy in the

React to this headline:

Loading spinner

Five habits of highly secure development teams Read More »

Social media apps that aggressively harvest user data

Social media apps that aggressively harvest user data 2025-08-27 at 07:10 By Sinisa Markovic Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some apps leverage data for marketing and advertising purposes, feeding algorithms to calculate optimal prices based on consumer behavior, often leading to

React to this headline:

Loading spinner

Social media apps that aggressively harvest user data Read More »

iOS security features you should use to protect your privacy

iOS security features you should use to protect your privacy 2025-08-20 at 07:11 By Sinisa Markovic iOS 18 comes with several privacy and security features that many iPhone users overlook. Knowing how to use them can help you protect your personal information and control which apps can access your data. USB Accessories Lock iOS 18

React to this headline:

Loading spinner

iOS security features you should use to protect your privacy Read More »

Android VPN apps used by millions are covertly connected AND insecure

Android VPN apps used by millions are covertly connected AND insecure 2025-08-19 at 17:07 By Zeljka Zorz Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State University and Citizen Lab. Finding the secret links Virtual private networks (VPNs)

React to this headline:

Loading spinner

Android VPN apps used by millions are covertly connected AND insecure Read More »

New Research Links VPN Apps, Highlights Security Deficiencies

New Research Links VPN Apps, Highlights Security Deficiencies 2025-08-19 at 12:17 By Ionut Arghire Citizen Lab has identified links between multiple VPN providers, and multiple security weaknesses in their mobile applications. The post New Research Links VPN Apps, Highlights Security Deficiencies appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

New Research Links VPN Apps, Highlights Security Deficiencies Read More »

APT groups are getting personal, and CISOs should be concerned

APT groups are getting personal, and CISOs should be concerned 2025-08-12 at 14:42 By Mirko Zorz Instead of focusing only on corporate systems, some APT groups are now going after executives in their personal lives. Home networks, private devices, and even family members have become targets. This approach works because executives often work remotely, store

React to this headline:

Loading spinner

APT groups are getting personal, and CISOs should be concerned Read More »

Security gaps still haunt shared mobile device use in healthcare

Security gaps still haunt shared mobile device use in healthcare 2025-08-01 at 07:33 By Sinisa Markovic Shared mobile devices are becoming the standard in hospitals and health systems. While they offer cost savings and workflow improvements, many organizations are still struggling to manage the security risks that come with them, according to Imprivata’s 2025 State

React to this headline:

Loading spinner

Security gaps still haunt shared mobile device use in healthcare Read More »

Buy Now, Pay Later… with your data

Buy Now, Pay Later… with your data 2025-07-18 at 09:35 By Anamarija Pogorelec Buy Now, Pay Later (BNPL) apps are everywhere these days. Whether you’re buying sneakers or groceries, chances are you’ve seen the option to split your payments over time. It’s quick and easy. But behind the convenience is a growing privacy concern that

React to this headline:

Loading spinner

Buy Now, Pay Later… with your data Read More »

Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations

Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations 2025-07-17 at 13:43 By Associated Press An $8 billion class action investors’ lawsuit against Meta stemming from the 2018 privacy scandal involving the Cambridge Analytica political consulting firm. The post Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over

React to this headline:

Loading spinner

Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations Read More »

What is a seed phrase, and why is it important?

What is a seed phrase, and why is it important? 2025-07-17 at 12:32 By Cointelegraph by Onkar Singh It’s crucial to securely back up and store your seed phrase in multiple safe places, ensuring that you’re the only one who can access it when needed. This article is an excerpt from Cointelegraph.com News View Original

React to this headline:

Loading spinner

What is a seed phrase, and why is it important? Read More »

Machine unlearning gets a practical privacy upgrade

Machine unlearning gets a practical privacy upgrade 2025-07-17 at 09:08 By Mirko Zorz Machine learning models are everywhere now, from chatbots to credit scoring tools, and they carry traces of the data they were trained on. When someone asks to have their personal data erased under laws like the GDPR, their data also needs to

React to this headline:

Loading spinner

Machine unlearning gets a practical privacy upgrade Read More »

TikTok Faces Fresh European Privacy Investigation Over China Data Transfers

TikTok Faces Fresh European Privacy Investigation Over China Data Transfers 2025-07-11 at 12:04 By Associated Press The Irish Data Privacy Commission announced that TikTok is facing a new European Union privacy investigation into user data sent to China. The post TikTok Faces Fresh European Privacy Investigation Over China Data Transfers appeared first on SecurityWeek. This

React to this headline:

Loading spinner

TikTok Faces Fresh European Privacy Investigation Over China Data Transfers Read More »

Google open-sources privacy tech for age verification

Google open-sources privacy tech for age verification 2025-07-03 at 18:47 By Sinisa Markovic Age verification is becoming more common across websites and online services. But many current methods require users to share personal data, like a full ID or birthdate, which raises privacy and security concerns. In response, Google has open-sourced a cryptographic solution that

React to this headline:

Loading spinner

Google open-sources privacy tech for age verification Read More »

Scroll to Top