Remove Data collection Remove Software Remove Surveillance
article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

Specifically, stories and news items where public and/or private organizations have leveraged their capabilities to encroach on user privacy; for example, data brokers using underhanded means to harvest user location data without user knowledge or public organizations using technology without regard for user privacy.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

While the vendor did not respond to our security disclosure, we find that the app’s security deficits may not only violate Google’s Unwanted Software Policy and Apple’s App Store guidelines but also China’s own laws and national standards pertaining to privacy protection, providing potential avenues for future redress.

article thumbnail

5G Security

Schneier on Security

Because the companies that make the equipment are subservient to the Chinese government, they could be forced to include backdoors in the hardware or software to give Beijing remote access. Neither is banning Chinese microchips, software, or programmers. Chinese, Iranians, North Koreans, and Russians have been breaking into U.S.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. These apps also frequently use Bluetooth data to gather location information and proximity to nearby devices. They also have appeared to partner with Proton. Malware campaigns covered generally target/affect the end user.

article thumbnail

Privacy Roundup: Week 11 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Of course, personalized in this context means leveraging extensive amounts of data collected on people. Malware campaigns covered generally target/affect the end user.