article thumbnail

How threat actors can use generative artificial intelligence?

Security Affairs

From generating deepfakes to enhancing phishing campaigns, GAI is evolving into a tool for large-scale cyber offenses GAI has captured the attention of researchers and investors for its transformative potential across industries. Unfortunately, its misuse by malicious actors is altering the cyber threat landscape.

article thumbnail

GUEST ESSAY: How ‘DPIAs” — data privacy impact assessments — can lead SMBs to compliance

The Last Watchdog

A DPIA requires a thorough review of any personal data collected and stored, including who specifically controls the data and who has access at any given time. Data protection is an ongoing process. There are many kinds of tools and services that can help any SMB down this paths. DPIAs can get an SMB off to a good start.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canada bans WeChat and Kaspersky apps on government-issued mobile devices

Security Affairs

On a mobile device, the WeChat and Kaspersky applications data collection methods provide considerable access to the device’s contents.” We will continue to regularly monitor potential cyber threats and take immediate action when needed.” ” said Anita Anand, President of the Treasury Board.

Mobile 138
article thumbnail

DRM Report Q2 2023 – Ransomware threat landscape

Security Affairs

In an era where digitalization has woven its web into the very fabric of our lives, the dark underbelly of the digital realm continues to pose an ever-growing threat. Ransomware, a menace that has evolved into a formidable adversary, takes center stage in our examination of the cyber threat landscape during the second quarter of 2023.

article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

May also include threat actors abusing legitimate technology - which of itself may be irrespective of user privacy in general - to gather information or otherwise target users. Inside the Black Box of Predictive Travel Surveillance Wired Covers the use of powerful surveillance technology in predicting who might be a "threat."

article thumbnail

US Federal Judge Upholds Automakers' Right to Record Texts, Call Logs

SecureWorld News

The automakers argued that their practice was necessary to provide certain features and services, such as hands-free calling and texting, and that customers had consented to the data collection by agreeing to the terms of service when they purchased their vehicles.

article thumbnail

Half of Britons feel they are victims of ‘Sonic Snooping’

CyberSecurity Insiders

Keeping a tab on mobile applications and checking on what they are asking as permissions might resolve most of the troubles linked to this cyber threat. The users got these feelings as they noticed an advertisement for a product or a service as soon as they searched or spoke about it with their friend or family member over the phone.

Mobile 111