article thumbnail

Happy 15th Anniversary, KrebsOnSecurity!

Krebs on Security

Much of my summer was spent reporting a story about how advertising and marketing firms have created a global free-for-all where anyone can track the daily movements and associations of hundreds of millions of mobile devices , thanks to the ubiquity of mobile location data that is broadly and cheaply available.

article thumbnail

Increased GDPR Enforcement Highlights the Need for Data Security

Security Affairs

government surveillance. Amazon: €746 Million ($781 Million), 2021 In 2021, Amazon received a hefty fine for failing to secure proper consent for advertising cookies. Privacy Shield in 2020, Meta continued transferring data under a framework that was deemed insufficient to protect European citizens from U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Legal Zero-Days: How Old Laws Became a Novel Loss Generator

SecureWorld News

Companies across industries are being sued for using widely available web technologies: session replay tools, analytics platforms, and advertising trackers. No advanced surveillance, no cutting-edge tech stackjust legacy laws being exploited in ways no one saw coming. None of this is new or particularly exotic.

article thumbnail

Why SMS two-factor authentication codes aren't safe and what to use instead

Zero Day

"The company and its founder have worked with government spy agencies and surveillance industry contractors to surveil mobile phones and track user location," Bloomberg reported. Privacy Policy | | Cookie Settings | Advertise | Terms of Use And Bloomberg used the term controversial to describe Fink for a reason.

article thumbnail

WAGO Device Manager Vulnerabilities Expose Critical Industrial Infrastructure to Remote Exploits

Penetration Testing

Search Our Websites Penetration Testing Tools The Daily Information Technology Daily CyberSecurity About SecurityOnline.info Advertise with us Announcement Contact Contributor Register Login About SecurityOnline.info Advertise on SecurityOnline.info Contact When you purchase through links on our site, we may earn an affiliate commission.

article thumbnail

From Stealer to Spy: AMOS Malware Evolves into Full-Fledged Backdoor Threat for macOS

Penetration Testing

A recent update embeds a persistent backdoor, turning what was once a hit-and-run data thief into a long-term intruder capable of remote command execution, system surveillance, and re-infection. Originally known for its data exfiltration from browser extensions and cold wallets, AMOS now goes beyond theft.

article thumbnail

Texas Passes Most Comprehensive AI Governance Bill

SecureWorld News

TRAIGA applies to anyone who d eploys or develops AI systems in Texas; p roduces AI-powered products/services used by Texans; or m arkets or advertises AI systems in Texas. Critics may argue this misses major commercial threats from AI used in surveillance, retail profiling, or hiring tools.) Who's covered by the provisions of HB 149?