This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Chris Clements, VP of Solutions Architecture at CISO Global “Hey Alexa, are you stealing my company’s data?” In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the datacollection and privacy invasion that are often baked into these devices.
The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. Our enemies do it.
Specifically, stories and news items where public and/or private organizations have leveraged their capabilities to encroach on user privacy; for example, data brokers using underhanded means to harvest user location data without user knowledge or public organizations using technology without regard for user privacy.
Australia’s Defense Department announced that they will remove surveillance cameras made by Chinese firms linked to the government of Beijing. Australia’s Defense Department is going to replace surveillance cameras made by Chinese firms Hikvision and Dahua, who are linked to the government of Beijing.
A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., granting them access to live and archived video feeds across multiple organizations, including manufacturing facilities, hospitals, schools, police departments and prisons. When surveillance leads to spying.
Where possible, favor openness and transparency over aggressive datacollection or restrictions which erode civil liberties. Surveillance creep risks violating autonomy. Privacy Rights – Pervasive monitoring and datacollection erode privacy rights and dignity. Security theater manufactures consent.
Surveillance Tech in the News This section covers surveillance technology and methods in the news. Of course, personalized in this context means leveraging extensive amounts of datacollected on people. In theory, these could be abused for malicious actions.
The automakers argued that their practice was necessary to provide certain features and services, such as hands-free calling and texting, and that customers had consented to the datacollection by agreeing to the terms of service when they purchased their vehicles. For the auto manufacturers involved, this is a significant victory.
Texas Attorney General Ken Paxton has sued General Motors (GM) for the unlawful collection and sale of over 1.5 million Texans’ private driving data to insurance companies without their knowledge or consent. The driving datacollected and sold by GM included trip details like speed, seatbelt status, and driven distance.
The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues need to be top of mind, tech experts warn.
Shoshana Zuboff lays out how and why control of online privacy has become a linchpin to the current state of wealth distribution in her 2019 New York Times Book of the Year, The Age of Surveillance Capitalism: The Fight for A Human Future At the New Frontier of Power. It’s critical that they openly discuss these fundamental consumer rights.”.
Surveillance and monitoring risks: The integration of AI into everyday computing could lead to increased surveillance capabilities. This constant monitoring can be perceived as intrusive, especially if users are not fully aware or have not consented to such surveillance.
Industrial control systems (ICS) are the backbone of critical infrastructure, powering essential operations in the energy, manufacturing, water treatment, and transportation sectors. These systems are integral to the smooth operation of industries such as manufacturing, power generation, oil and gas, water management, and more.
The White House's proposal acknowledges several key cybersecurity risks associated with connected vehicles: DataCollection and Exploitation: Connected vehicles gather vast amounts of sensitive data, including location information, driving habits, and potentially personal conversations.
The Florida Privacy Act attempts to give consumers the right to opt out of sharing their data for targeted online ads, which are often collected and sold by companies to advertisers. Florida is now reigning in on the big tech world with a newly enshrined “Florida Digital Bill of Rights.” Two Strikes and… In!
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content