article thumbnail

Apple slaps hard against ‘mercenary’ surveillance-as-a-service industry

CSO Magazine

The company is introducing Lockdown Mode to protect high-risk individuals against corrosive surveillance and attacks, and investing millions to improve protection on its devices.

article thumbnail

White House seeks information on tools used for automated employee surveillance

CSO Magazine

The White House Office of Science and Technology Policy (OSTP) would soon be releasing a public request for information (RFI) to learn more about the automated tools employers use to surveil, monitor, evaluate, and manage workers, OSTP announced on Monday.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Oracle sued over ‘worldwide surveillance machine’ by privacy rights activists

CSO Magazine

A class action lawsuit filed last week in the Northern District of California accused Oracle of running a “worldwide surveillance machine” and violating the fundamental privacy rights of hundreds of millions of people.

article thumbnail

FTC begins sweeping commercial surveillance and lax data security rulemaking process

CSO Magazine

Data breaches exposing consumers’ sensitive information continue unabated even as organizations amass and sell vast sets of consumers’ personal, financial, and location data to a thriving data broker industry.

article thumbnail

What CISOs need to know about the renewal of FISA Section 702

CSO Magazine

Those who do business within the United States will want to keep their eye on the status of Section 702 of the Foreign Intelligence Surveillance Act (FISA), which sets out procedures for physical and electronic surveillance and collection of foreign intelligence.

article thumbnail

How long-term hybrid work is changing security strategies

CSO Magazine

She wants to know exactly where they are, too, because such surveillance is one of the strategies Nigro has to keep her company safe. Pam Nigro wants to know if workers at her company are working odd hours. To read this article in full, please click here (Insider Story)

article thumbnail

Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem

CSO Magazine

Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments with the technical expertise to develop and operationalize exploits." To read this article in full, please click here

Spyware 117