Remove Data collection Remove Media Remove Surveillance Remove Technology
article thumbnail

Security pros struggle to balance monitoring of remote workforces with privacy expectations

SC Magazine

And as employee monitoring tools and technology proliferate, it’s important for businesses to recognize that “you… don’t have to be so draconian and invasive, that you are completely ruining anybody’s personal privacy.”. One potential solution, said Daly, is pseudoanonymizing the data collected from workers’ computers.

article thumbnail

MY TAKE: Apple users show strong support for Tim Cook’s privacy war against Mark Zuckerberger

The Last Watchdog

This colorful chapter in the history of technology and society isn’t just breezing by unnoticed. The largest players in the tech industry need to demonstrate that they can self-regulate, or else lawmakers will take over a core asset of their business – consumer data – as demonstrated by California’s consumer privacy act.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Confronting the ethics of security and privacy during the pandemic

SC Magazine

On the flip side, their employees had to grapple with the reality that their corporate devices could surveil their activities in their own homes. They have capitulated many of their customers’ surveillance-based demands to capitalize on the increased demand for device surveillance and management software.

article thumbnail

The State of Stalkerware in 2023–2024

SecureList

Stalkerware requires physical access to be installed, but our report also looks at a range of remote technology that can be used for nefarious purposes. Not only can the intruder violate their victim’s privacy by monitoring their activities, but they can also use the software to access huge volumes of personal data.

Mobile 78
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

Singapore Contact Tracing Wearables Spark Pushback, Petition

SecureWorld News

According to media reports, the non-successful adoption of the Trace Together app can be superceded by the next step that state-sanctioned technological advancements can offer: and this is it.". The petition expresses concern over this device's ability to transform Singapore into a "surveillance state.".

article thumbnail

Stalkerware activity drops as glaring spying problem is revealed

Malwarebytes

It’s spying when governments do it through opaque, mass surveillance regimes, it’s spying when companies do it through shadowy data broker networks that braid together disparate streams of information, and it’s spying when private individuals do it through unseen behavior on personal devices.