Remove Data collection Remove Government Remove Surveillance
article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. These apps also frequently use Bluetooth data to gather location information and proximity to nearby devices.

article thumbnail

Privacy Roundup: Week 11 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Of course, personalized in this context means leveraging extensive amounts of data collected on people. More information on what sites this tool can pull from can be found on a Google Docs spreadsheet uploaded by 404media.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protect Your Privacy: Best Secure Messaging Apps in 2025

eSecurity Planet

Run by a nonprofit and funded by donations, there are no ads, trackers, or data collection in Signal. Key features E2EE on messages, calls, and media Minimal data collection. Briar Briar is built for when traditional networks fail, or surveillance is everywhere.

article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

When extramarital affairs website Ashley Madison experienced a  data breach in 2015 , some users were contacted by cybercriminals threatening to tell their partners, friends, and colleagues about their activities unless they were paid. What happens when an attacker is inside a network? Your MacBook is getting a big upgrade.

Passwords 101
article thumbnail

Protect Your Privacy: Best Secure Messaging Apps in 2025

eSecurity Planet

Run by a nonprofit and funded by donations, there are no ads, trackers, or data collection in Signal. Key features E2EE on messages, calls, and media Minimal data collection. Briar Briar is built for when traditional networks fail, or surveillance is everywhere.

article thumbnail

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Zero Day

When extramarital affairs website Ashley Madison experienced a  data breach in 2015 , some users were contacted by cybercriminals threatening to tell their partners, friends, and colleagues about their activities unless they were paid. What happens when an attacker is inside a network? Your MacBook is getting a big upgrade.

Passwords 106
article thumbnail

Security Affairs newsletter Round 513 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Spreads via Impersonation of Official Email to Target Users in Taiwan Belgian prosecutor probes alleged Chinese hacking of intelligence service Exclusive: Hegseth orders Cyber Command to stand down on Russia planning Cybersecurity Trump 2.0