Does security Ring a bell?

Amazon’s surveillance doorbell company Ring has reached a settlement with the U.S. Federal Trade Commission which will require the company to pay $5.8 million over its inability to keep private footage and audio collected from users’ homes. This action stems from a collection of privacy violations that occurred between 2017 and 2020. Ring customers brought … Read more

“Private ChatGPT Version” to businesses

Microsoft is testing a private alternative to its language model ChatGPT, which is designed to alleviate concerns about data privacy. The private version, called “Microsoft Private AI,” would be limited to a specific organization and its data would not leave the organization’s network. This move comes as companies are increasingly concerned about the security and … Read more

Security implications of ChatGPT

ChatGPT is an advanced tool that can generate meaningful results with minimal user expertise. The quality of ChatGPT’s output depends on factors such as specificity, clarity, and context. Users must understand ChatGPT’s capabilities and limitations and evaluate its output critically. Effective utilization of ChatGPT involves prompt engineering and adjusting the temperature parameter. Users must remain … Read more

The privacy loophole in your doorbell

Did you know that your Ring doorbell video footage could be part of police surveillance? Ring saw search warrants increase 33 percent in 2022 from the previous year. The lack of legal controls on what police can ask for, and judges failing to properly scrutinize these warrants, opens the door for even indoor home footage … Read more

5 Chrome Extensions with 14 million installs steal track users’ browsing activity

All five extensions discovered by McAfee behave with the web app manifest (“manifest.json” file), which dictates how the extension should behave on the system, loads a multifunctional script (B0.js) that sends the browsing data to a domain the attackers control (“langhort[.]com”).The data is delivered through via POST requests each time the user visits a new URL. The info reaching … Read more

EU Courts’ ruling requires to protect data that indirectly relates to sensitive information

Companies will be under increased pressure after Europe’s top court ruled they must apply special protections to data that firms previously didn’t consider sensitive such as health, religion, political views and sexual orientation. The European Court of Justice on Aug. 1 determined that public officials in Lithuania had their sensitive data revealed because their spouses’ … Read more

T-Mobile pays $4.43 per Data breach victim

Telecom provider T-Mobile has reached a settlement in the United States with the victims of a major data breach that occurred last year in which the personal data of 79 million current and former American customers was stolen. This included names, dates of birth, social security number and driver’s license information, as well as telephone … Read more

Email hacked senstive personal data exposed

The America’s leading not-for-profit health plans and health care provider Kaiser Permanente,, has recently disclosed a data breach that exposed the health information of more than 69,000 individuals. An attacker accessed an employee’s email account containing patients’ protected health information (PHI) which included the patients’ first and last names, medical record numbers, dates of service … Read more

Scanning of communication in order to combat child pornography

Providers of hosting services and providers of interpersonal communication services that have received a detection order shall execute it by installing and operating technologies to detect” CSAM upon request by the competent judicial authority or independent administrative authority, the draft regulation states. The obligation also requires tech platforms to conduct risk assessments and “reasonable mitigation … Read more

Vodafone Spain almost 4 million Euros GDPR fine for loss of confidentiality related to mobile phone sim card duplicate and a lack of accountability

“Various claims are filed as a result of the issuance of duplicate SIM cards to third parties other than subscribers. As a result of the above, the holders of the telephone line are not only left without service, but the third parties access their bank accounts.” “Spanish DPA carries out research actions to analyze the … Read more