Remove Data breaches Remove Firmware Remove Surveillance
article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

Specifically, stories and news items where public and/or private organizations have leveraged their capabilities to encroach on user privacy; for example, data brokers using underhanded means to harvest user location data without user knowledge or public organizations using technology without regard for user privacy.

article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Vulnerabilities and Malware Primarily includes severe and exploited vulnerabilities in devices or software used by end users (ex: a major router firmware flaw). They also have appeared to partner with Proton.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The many ways your supply chain is exposing your company to a cyber attack

The Last Watchdog

You and your cybersecurity team do everything correctly to safeguard your infrastructure, yet the frightening alert still arrives that you’ve suffered a data breach. The TCU deploys AI-based runtime threat-detection surveillance and remediation for enhanced tamper •. Related: Third-party audits can hold valuable intel.

article thumbnail

Privacy Roundup: Week 11 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Vulnerabilities and Malware Primarily includes severe and exploited vulnerabilities in devices or software used by end users (ex: a major router firmware flaw). Malware campaigns covered generally target/affect the end user.

article thumbnail

Privacy Roundup: Week 13 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Vulnerabilities and Malware Primarily includes severe and exploited vulnerabilities in devices or software used by end users (ex: a major router firmware flaw). Malware campaigns covered generally target/affect the end user.

VPN 59
article thumbnail

Privacy Roundup: Week 9 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. The surveillance tech waiting for workers as they return to the office ArsTechnica RTO continues to pick up steam. In pursuit of "more productivity," some employers are leaning heavily into surveillance tech.

article thumbnail

Privacy Roundup: Week 7 of Year 2025

Security Boulevard

The more accounts you have, the bigger your attack surface and potential exposure to data breaches. Surveillance Tech in the News This section covers surveillance technology and methods in the news. Tips for finding old accounts. Malware campaigns covered generally target/affect the end user.