Remove Data collection Remove Presentation Remove Surveillance
article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

However, as the app collects a range of highly sensitive medical information, it is unclear with whom or which organization(s) it shares this information. MY2022 includes features that allow users to report “politically sensitive” content.

article thumbnail

Judging Facebook's Privacy Shift

Schneier on Security

And if you read his 3,000-word post carefully, Zuckerberg says nothing about changing Facebook's surveillance capitalism business model. It even collects what it calls " shadow profiles " -- data about you even if you're not a Facebook user. Better use of Facebook data to prevent violence.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

The Last Watchdog

Law enforcement, for instance, drew criticism for using a controversial facial recognition app — Clearview AI — to surveil citizens turning out to protest the George Floyd murder. However, as the data collected by Internet of Things systems gets deeper and richer , the algorithms running AI should get smarter and more accurate.

article thumbnail

“We will hold them accountable”: General Motors sued for selling customer driving data to third parties

Malwarebytes

It reasons that when consumers buy a vehicle, they want a mode of transportation to get them from one point to another, but with GM (and its subsidiary OnStar) they unwittingly opt-in to an all-seeing surveillance system. The driving data collected and sold by GM included trip details like speed, seatbelt status, and driven distance.

Insurance 125
article thumbnail

NationalPublicData.com Hack Exposes a Nation’s Data

Krebs on Security

Americans currently have very few rights to opt out of the personal and financial surveillance, data collection and sale that is pervasive in today’s tech-based economy. The breach at National Public Data may not be the worst data breach ever.

Hacking 352
article thumbnail

Over 100 flaws in management and access control systems expose buildings to hack

Security Affairs

The extent of the flaw is wide, according to data collected by Krstic during the study, the vulnerabilities could impact up to 10 million people and 30,000 doors at 200 facilities. Krstic presented the findings of his study at SecurityWeek’s ICS Cyber Security Conference held in Singapore.

Hacking 111
article thumbnail

The Greatest Asset Becomes the Biggest Risk

CyberSecurity Insiders

It also empowers business owners to easily see, understand and act on contextual intelligence using scoring frameworks proven to stop insider threats, prevent data loss, maximize software investments and protect the workforce, wherever they may be. Data minimization is a critical prerequisite to privacy. Managing access and perception.

Risk 134