Remove tag transparency
article thumbnail

SBOMs: Securing the Software Supply Chain

eSecurity Planet

With a simple list of components that make up a software product, SBOMs enhance transparency between software buyers and sellers, provide the necessary visibility to identify vulnerabilities , and enable rapid incident response. Source: NTIA Multistakeholder Process on Software Component Transparency Framing Working Group.

Software 129
article thumbnail

Facebook sued for siphoning facial recognition data without consent

Malwarebytes

The suit contains arguments that Facebook’s now-defunct photo-tagging feature illegally collected data about Texan people’s faces, including those who are non-Facebook users but were tagged by someone who is, without asking for consent. Paxton filed the lawsuit on Monday in the state’s Harrison County District Court.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook is going to shut down Face Recognition system and data it collected

Security Affairs

Facebook is using the face recognition system to analyze photos taken of tagged users and associated users’ profile photos to automatically recognize them in photos and videos. Facebook announced it will stop using the Face Recognition system on its platform and will delete over 1 billion people’s facial recognition profiles.

article thumbnail

Tor Project’s Bug Smash Fund raises $86K in August

Security Affairs

The funding project aims to be transparent, any donors can track how that money is being used by the foundation, the Tor Project will tag any bug tickets that utilize the money of the fund with the “BugSmashFund” tag. “Want to keep up with the work we’re doing with this fund? ” concludes the announcement.

article thumbnail

TikTok faces $28m fine for failing to protect children's privacy

Malwarebytes

The ICO claims TikTok may have: Processed the data of children under the age of 13 without appropriate parental consent; Failed to provide proper information to its users in a concise, transparent and easily understood way; and. Processed special category data, without legal grounds to do so.

Media 98
article thumbnail

Surveillance vendor exploited Samsung phone zero-days

Security Affairs

The TAG team only obtained a partial exploit chain for Samsung phones that were likely in the testing phase. When in-the-wild 0-days are not transparently disclosed, we are not able to use that information to further protect users, using patch analysis and variant analysis, to gain an understanding of what attackers already know.”

article thumbnail

Open Source Security Index Lists Top Projects

eSecurity Planet

Also read: The Best Open-Source Vulnerability Scanners Ranking the Projects One of the more interesting parts of the ranking is the transparent methodology. There are also manual additions for projects that lack labels in the GitHub API (tags, topics).

InfoSec 114