Remove Data collection Remove Phishing Remove Surveillance
article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

Specifically, stories and news items where public and/or private organizations have leveraged their capabilities to encroach on user privacy; for example, data brokers using underhanded means to harvest user location data without user knowledge or public organizations using technology without regard for user privacy.

article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. These apps also frequently use Bluetooth data to gather location information and proximity to nearby devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protect Your Privacy: Best Secure Messaging Apps in 2025

eSecurity Planet

EXTRA SAFE E2EE, no data retention, blockchain tech, no registration, browser-based ephemeral chats Web (native apps in development) No data available Messenger E2EE, AI assistant, spam/phishing detection Android, iOS, Web, Windows, macOS Over 1.04 Key features E2EE on messages, calls, and media Minimal data collection.

article thumbnail

Privacy Roundup: Week 11 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Of course, personalized in this context means leveraging extensive amounts of data collected on people.

article thumbnail

Protect Your Privacy: Best Secure Messaging Apps in 2025

eSecurity Planet

EXTRA SAFE E2EE, no data retention, blockchain tech, no registration, browser-based ephemeral chats Web (native apps in development) No data available Messenger E2EE, AI assistant, spam/phishing detection Android, iOS, Web, Windows, macOS Over 1.04 Key features E2EE on messages, calls, and media Minimal data collection.

article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

And while financial costs may be a factor, individual victims may face targeted phishing campaigns, social engineering schemes, identity theft, and damage to credit. They may also experience anxiety or fear over how their leaked data will be used now and in the future.   What happens when an attacker is inside a network?

Passwords 101
article thumbnail

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Zero Day

And while financial costs may be a factor, individual victims may face targeted phishing campaigns, social engineering schemes, identity theft, and damage to credit. They may also experience anxiety or fear over how their leaked data will be used now and in the future.   What happens when an attacker is inside a network?

Passwords 106