article thumbnail

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

Security Boulevard

In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices. The post The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets appeared first on Security Boulevard.

article thumbnail

On Surveillance in the Workplace

Schneier on Security

Gamification and algorithmic management of work activities through continuous data collection. In a blog post about this report, Cory Doctorow mentioned "the adoption curve for oppressive technology, which goes, 'refugee, immigrant, prisoner, mental patient, children, welfare recipient, blue collar worker, white collar worker.'"

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy issues in smart cities – Lessons learned from the Waterfront Toronto – Sidewalks project

Privacy and Cybersecurity Law

Risk #1: Surveillance both from the State and surveillance capitalism. Digital solutions generally create the risk of law enforcement access to the data they collect. Capitalist surveillance particularly arose around the Quayside project because of the link to Alphabet and Google. Risk # 5: Data Monetization.

article thumbnail

PRIVACY ISSUES IN SMART CITIES – LESSSONS LEARNED FROM THE WATERFRONT TORONTO – SIDEWALKS PROJECT

Privacy and Cybersecurity Law

Risk #1: Surveillance both from the State and surveillance capitalism. Digital solutions generally create the risk of law enforcement access to the data they collect. Capitalist surveillance particularly arose around the Quayside project because of the link to Alphabet and Google. Risk # 5: Data Monetization.

article thumbnail

MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

The Last Watchdog

Law enforcement, for instance, drew criticism for using a controversial facial recognition app — Clearview AI — to surveil citizens turning out to protest the George Floyd murder. However, as the data collected by Internet of Things systems gets deeper and richer , the algorithms running AI should get smarter and more accurate.

article thumbnail

A chink in the armor of China-based hacking group Nickel

Malwarebytes

As a result, Nickel achieved long-term access to several targets, allowing the group to conduct activities such as regularly scheduled exfiltration of data. Microsoft Threat Intelligence Center (MSTIC) observed Nickel perform frequent and scheduled data collection and exfiltration from victim networks. International cooperation.

Hacking 99
article thumbnail

Microsoft disrupts China-based hacking group Nickel

Malwarebytes

As a result, Nickel achieved long-term access to several targets, allowing the group to conduct activities such as regularly scheduled exfiltration of data. Microsoft Threat Intelligence Center (MSTIC) observed Nickel perform frequent and scheduled data collection and exfiltration from victim networks. International cooperation.

Hacking 77