Remove 2020 Remove Data collection Remove Surveillance
article thumbnail

De-anonymization Story

Schneier on Security

But it did say how it de-anonymized aggregated data to correlate Grindr app usage with a device that appears to be Burrill’s phone. The publication zeroed in on addresses where Burrill was known to frequent and singled out a device identifier that appeared at those locations.

Mobile 363
article thumbnail

Baidu Android apps removed from Play Store because caught collecting user details

Security Affairs

The code found in both apps allowed to gather device data, including model, MAC address, carrier information, and IMSI (International Mobile Subscriber Identity) number. The data collection code was found in the Baidu Push SDK, used to show real-time notifications inside both apps.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Federal Judge Upholds Automakers' Right to Record Texts, Call Logs

SecureWorld News

The lawsuit, filed in 2020, alleged that the automakers' practice of collecting and storing this sensitive data without customers' knowledge or consent constituted a violation of the Washington Privacy Act (WPA). states specific to a private right of action that allows class actions.

article thumbnail

Stalkerware activity drops as glaring spying problem is revealed

Malwarebytes

It’s spying when governments do it through opaque, mass surveillance regimes, it’s spying when companies do it through shadowy data broker networks that braid together disparate streams of information, and it’s spying when private individuals do it through unseen behavior on personal devices. The good news?

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Isovalent Cloud security 2020 Private Illumio Cloud security 2015 Private SignalFx Monitoring 2015 Acquired: Splunk CipherCloud Cloud security 2012 Acquired: Lookout Lookout Mobile security 2011 Private. a16z Investments. ForgePoint Investments. Insight Investments. Kleiner Perkins Investments. LVP Investments.

article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

billion devices will be connected to the Internet by 2020 2. They all must have unique identifiers and the ability to collect and transfer data over networks to enable monitoring, surveillance, and execution of decisions based on the collected data with little or no human intervention.

IoT 72
article thumbnail

Confronting the ethics of security and privacy during the pandemic

SC Magazine

The date was March 10th, 2020. On the flip side, their employees had to grapple with the reality that their corporate devices could surveil their activities in their own homes. At a minimum, examine the software’s capabilities to manage and secure devices, and the precise data the company’s tools can obtain.