Remove Consumer Protection Remove Government Remove Surveillance
article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

Unfortunately, many organizations will still prioritize secrecy over consumer protection in a bid to hush up incidents and protect their reputations. The attacker may conduct surveillance first, mapping a network to find the most valuable resources or to discover potential pathways to jump into other systems.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

These challenges include bias and discrimination embedded in algorithms, privacy violations due to enhanced surveillance capabilities, and the difficulty of assigning accountability for decisions made by AI systems. Ethics The ethical challenges posed by advancing AI technologies will demand urgent attention in 2025.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Zero Day

Unfortunately, many organizations will still prioritize secrecy over consumer protection in a bid to hush up incidents and protect their reputations. The attacker may conduct surveillance first, mapping a network to find the most valuable resources or to discover potential pathways to jump into other systems.

article thumbnail

Security Affairs newsletter Round 513 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Spreads via Impersonation of Official Email to Target Users in Taiwan Belgian prosecutor probes alleged Chinese hacking of intelligence service Exclusive: Hegseth orders Cyber Command to stand down on Russia planning Cybersecurity Trump 2.0

article thumbnail

New IoT Security Regulations

Schneier on Security

It falls upon lawmakers to create laws that protect consumers. While the US government is largely absent in this area of consumer protection, the state of California has recently stepped in and started regulating the Internet of Things, or "IoT" devices sold in the state­and the effects will soon be felt worldwide.

IoT
article thumbnail

The Need for Trustworthy AI

Schneier on Security

This is surveillance capitalism , and AI is shaping up to be part of it. For example, researchers uncovered the secret rules that govern the Microsoft Bing chatbot’s behavior. And, as with the rest of the internet, that somehow is likely to include surveillance and manipulation. Phone apps collect and sell your data.

article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

This week civil liberties groups in Europe won the right to challenge the UK’s bulk surveillance activities in the The Grand Chamber of the European Court of Human Rights. Related: Snowden on unrestrained surveillance. Ubiquitous surveillance. It’s a healthy thing that a captain of industry can see this. Advanced use cases.