Remove Accountability Remove Data collection Remove Risk Remove Surveillance
article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude’s reply: Here’s a brief summary of the key themes and arguments made in security expert Bruce Schneier’s book Beyond Fear: Thinking Sensibly About Security in an Uncertain World : Central Themes: Effective security requires realistic risk assessment, not fear-driven responses. Focus only on proportional responses.

article thumbnail

FTC finds social media and video streaming services engaged in vast surveillance of consumers

Malwarebytes

The conclusions seemed to upset the FTC, but we weren’t even mildly surprised: “The amount of data collected by large tech companies is simply staggering. Predicting, shaping, and monetizing human behavior through commercial surveillance is extremely profitable.” How they measure, promote, and research user engagement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

Senators Urge FTC to Probe ID.me Over Selfie Data

Krebs on Security

for “deceptive statements” the company and its founder allegedly made over how they handle facial recognition data collected on behalf of the Internal Revenue Service , which until recently required anyone seeking a new IRS account online to provide a live video selfie to ID.me. ” But several days after a Jan.

article thumbnail

The Greatest Asset Becomes the Biggest Risk

CyberSecurity Insiders

It’s never been more important to protect employees from cyber-attacks while also mitigating the risk they pose as trusted insiders. Dtex’s Workforce Cyber Intelligence Platform enables organizations better understand their workforce, protect their data and make human-centric operational investments.

Risk 134
article thumbnail

“We will hold them accountable”: General Motors sued for selling customer driving data to third parties

Malwarebytes

We will hold them accountable.” It reasons that when consumers buy a vehicle, they want a mode of transportation to get them from one point to another, but with GM (and its subsidiary OnStar) they unwittingly opt-in to an all-seeing surveillance system. On top of that, GM gathered data through other products like its mobile apps.

Insurance 108
article thumbnail

What To Know About Privacy Data

Identity IQ

These are generally not considered privacy data, but when coupled with an element like your identity document, it becomes private. Other types of data that you should consider private include: Your bank account number and card details. Login information for online accounts you have. Why Is Data Privacy Important?