Privacy

LinkedIn now uses your data for AI by default, opt out now!

LinkedIn now uses your data for AI by default, opt out now! 2025-09-18 at 16:00 By Sinisa Markovic LinkedIn is making major changes to its User Agreement and Privacy Policy, effective November 3, 2025. Among the most notable updates, the company will now use member data by default to improve its generative AI models, unless […]

React to this headline:

Loading spinner

LinkedIn now uses your data for AI by default, opt out now! Read More »

Rayhunter: EFF releases open-source tool to detect cellular spying

Rayhunter: EFF releases open-source tool to detect cellular spying 2025-09-17 at 08:12 By Anamarija Pogorelec The Electronic Frontier Foundation (EFF) has released Rayhunter, a new open-source tool designed to detect cell site simulators (CSS). These devices, also known as IMSI catchers or Stingrays, mimic cell towers to trick phones into connecting so they can collect

React to this headline:

Loading spinner

Rayhunter: EFF releases open-source tool to detect cellular spying Read More »

Google introduces VaultGemma, a differentially private LLM built for secure data handling

Google introduces VaultGemma, a differentially private LLM built for secure data handling 2025-09-16 at 09:31 By Sinisa Markovic Google has released VaultGemma, a large language model designed to keep sensitive data private during training. The model uses differential privacy techniques to prevent individual data points from being exposed, which makes it safer for handling confidential

React to this headline:

Loading spinner

Google introduces VaultGemma, a differentially private LLM built for secure data handling Read More »

Product showcase: Clean Links exposes what’s hiding behind a QR code

Product showcase: Clean Links exposes what’s hiding behind a QR code 2025-09-16 at 08:40 By Anamarija Pogorelec Clean Links is a handy app that shows you exactly where a link will take you before you click it. It strips out trackers, expands shortened URLs, and helps you avoid scams while saving you time and frustration.

React to this headline:

Loading spinner

Product showcase: Clean Links exposes what’s hiding behind a QR code Read More »

AI video surveillance could end privacy as we know it

AI video surveillance could end privacy as we know it 2025-09-16 at 08:40 By Sinisa Markovic AI-powered video surveillance brings up big questions about privacy. On one hand, it can make us feel safer, but on the other, it can easily cross the line into intrusion. The more we let technology watch and track our

React to this headline:

Loading spinner

AI video surveillance could end privacy as we know it Read More »

Google Launched Behind-the-Scenes Campaign Against California Privacy Legislation; It Passed Anyway

Google Launched Behind-the-Scenes Campaign Against California Privacy Legislation; It Passed Anyway 2025-09-15 at 14:30 By Associated Press In April, Rhode Island resident Navah Hopkins received a plea for her help to defeat legislation thousands of miles away in California. The ask came from Google, maker of the world’s most used web browser, Chrome. The tech

React to this headline:

Loading spinner

Google Launched Behind-the-Scenes Campaign Against California Privacy Legislation; It Passed Anyway Read More »

Your heartbeat could reveal your identity, even in anonymized datasets

Your heartbeat could reveal your identity, even in anonymized datasets 2025-09-12 at 09:12 By Mirko Zorz A new study has found that electrocardiogram (ECG) signals, often shared publicly for medical research, can be linked back to individuals. Researchers were able to re-identify people in anonymous datasets with surprising accuracy, raising questions about how health data

React to this headline:

Loading spinner

Your heartbeat could reveal your identity, even in anonymized datasets Read More »

When typing becomes tracking: Study reveals widespread silent keystroke interception

When typing becomes tracking: Study reveals widespread silent keystroke interception 2025-09-11 at 09:17 By Mirko Zorz You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis,

React to this headline:

Loading spinner

When typing becomes tracking: Study reveals widespread silent keystroke interception Read More »

Signal adds secure backup option for chat history

Signal adds secure backup option for chat history 2025-09-09 at 10:52 By Anamarija Pogorelec Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The problem with lost chats Signal has long avoided cloud backups because

React to this headline:

Loading spinner

Signal adds secure backup option for chat history Read More »

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal 2025-09-09 at 10:22 By Mirko Zorz Nearly 500 scientists and researchers have signed an open letter warning that the latest version of the EU’s Chat Control Proposal would weaken digital security while failing to deliver meaningful protection for children. The signatories represent 34 countries

React to this headline:

Loading spinner

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal Read More »

How to reclaim control over your online shopping data

How to reclaim control over your online shopping data 2025-09-05 at 09:33 By Sinisa Markovic Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to think about what happens to the data we leave behind, or the risks that might come with it? Where shopping

React to this headline:

Loading spinner

How to reclaim control over your online shopping data Read More »

LinkedIn expands company verification, mandates workplace checks for certain roles

LinkedIn expands company verification, mandates workplace checks for certain roles 2025-09-04 at 16:00 By Mirko Zorz LinkedIn is rolling out new verification rules to make it easier to confirm that people and companies are who they claim to be. The company will now require workplace verification when someone adds or updates a leadership or recruiter

React to this headline:

Loading spinner

LinkedIn expands company verification, mandates workplace checks for certain roles Read More »

Five habits of highly secure development teams

Five habits of highly secure development teams 2025-09-03 at 07:46 By Help Net Security In this Help Net Security video, Brendon Collins, Principal Consultant at Optiv, explores how organizations can embed security and privacy into the software development lifecycle (SDLC) from the very start. He outlines five proactive principles, including default-deny architecture, privacy in the

React to this headline:

Loading spinner

Five habits of highly secure development teams Read More »

Social media apps that aggressively harvest user data

Social media apps that aggressively harvest user data 2025-08-27 at 07:10 By Sinisa Markovic Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some apps leverage data for marketing and advertising purposes, feeding algorithms to calculate optimal prices based on consumer behavior, often leading to

React to this headline:

Loading spinner

Social media apps that aggressively harvest user data Read More »

iOS security features you should use to protect your privacy

iOS security features you should use to protect your privacy 2025-08-20 at 07:11 By Sinisa Markovic iOS 18 comes with several privacy and security features that many iPhone users overlook. Knowing how to use them can help you protect your personal information and control which apps can access your data. USB Accessories Lock iOS 18

React to this headline:

Loading spinner

iOS security features you should use to protect your privacy Read More »

Android VPN apps used by millions are covertly connected AND insecure

Android VPN apps used by millions are covertly connected AND insecure 2025-08-19 at 17:07 By Zeljka Zorz Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State University and Citizen Lab. Finding the secret links Virtual private networks (VPNs)

React to this headline:

Loading spinner

Android VPN apps used by millions are covertly connected AND insecure Read More »

New Research Links VPN Apps, Highlights Security Deficiencies

New Research Links VPN Apps, Highlights Security Deficiencies 2025-08-19 at 12:17 By Ionut Arghire Citizen Lab has identified links between multiple VPN providers, and multiple security weaknesses in their mobile applications. The post New Research Links VPN Apps, Highlights Security Deficiencies appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

New Research Links VPN Apps, Highlights Security Deficiencies Read More »

APT groups are getting personal, and CISOs should be concerned

APT groups are getting personal, and CISOs should be concerned 2025-08-12 at 14:42 By Mirko Zorz Instead of focusing only on corporate systems, some APT groups are now going after executives in their personal lives. Home networks, private devices, and even family members have become targets. This approach works because executives often work remotely, store

React to this headline:

Loading spinner

APT groups are getting personal, and CISOs should be concerned Read More »

Security gaps still haunt shared mobile device use in healthcare

Security gaps still haunt shared mobile device use in healthcare 2025-08-01 at 07:33 By Sinisa Markovic Shared mobile devices are becoming the standard in hospitals and health systems. While they offer cost savings and workflow improvements, many organizations are still struggling to manage the security risks that come with them, according to Imprivata’s 2025 State

React to this headline:

Loading spinner

Security gaps still haunt shared mobile device use in healthcare Read More »

Scroll to Top