article thumbnail

Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source

Security Affairs

Over 4 billion user records were found exposed online in a massive breach, possibly linked to the surveillance of Chinese citizens. ” They suggest the scale and variety of the information point to a centralized system, possibly used for surveillance, profiling, or enriching existing data. ” reads the post.

article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

Specifically, stories and news items where public and/or private organizations have leveraged their capabilities to encroach on user privacy; for example, data brokers using underhanded means to harvest user location data without user knowledge or public organizations using technology without regard for user privacy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Solid Protocol Restores Digital Agency

Schneier on Security

platforms like Facebook, which require massive back-end systems to store, process, and monetize user data, Solid applications can be lightweight and focused solely on functionality. Developers no longer need to build and maintain extensive data storage systems, surveillance infrastructure, or analytics pipelines. Unlike Web 2.0

article thumbnail

Synthetic Sabotage: How AI Tools Are Fueling Tailored Phishing Campaigns at Scale

SecureWorld News

RELATED: Hong Kong Clerk Defrauded of $25 Million in Sophisticated Deepfake Scam ] Weaponizing data breach with AI Data breaches have always been a valuable resource for attackers, but AI magnifies their impact and can even use cloud automation tricks to better store, segment, and safeguard data.

article thumbnail

Legal Zero-Days: How Old Laws Became a Novel Loss Generator

SecureWorld News

The latest wave of privacy litigation doesn't involve data breaches, AI models, or spyware. No advanced surveillance, no cutting-edge tech stackjust legacy laws being exploited in ways no one saw coming. It involves tracking pixelsand legal theories pulled from a time when Blockbuster Video was still a thing.

article thumbnail

Increased GDPR Enforcement Highlights the Need for Data Security

Security Affairs

These penalties apply to all aspects of GDPR compliance, including inadequate data security, improper consent, and data breach failures. Privacy Shield in 2020, Meta continued transferring data under a framework that was deemed insufficient to protect European citizens from U.S. government surveillance.

article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

Close Home Tech Security 16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself Wondering if your information is posted online from a data breach? PT Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one.