Google illegally spied on workers before firing them, US labor board alleges

Google illegally spied on workers before firing them, US labor board alleges

Google violated US labor laws by spying on workers who were organizing employee protests, then firing two of them, according to a complaint filed by the National Labor Relations Board (NLRB) today.

George Soros Decries Palantir Stake

George Soros Decries Palantir Stake

Soros Fund Management (SFM), the asset management firm founded by the famed investor and businessman George Soros, has said that it plans to sell its stake in Palantir, which just went public in September, over disagreement with the company's practices.

Amazon's Software Is Malware

Amazon's Software Is Malware

Amazon Alexa collects a lot more information from users than is necessary for correct functioning (time, location, recordings made without a legitimate prompt), and sends it to Amazon's servers, which store it indefinitely.

H&M Fined €35.2 Mn for Violating Employees’ Privacy

H&M Fined €35.2 Mn for Violating Employees’ Privacy

& Co KG (H&M) was fined €35.2 (US$41.1 million) by the Hamburg Commissioner for Data Protection and Freedom of Information (HmbBfDI) for violating the General Data Protection Regulation (GDPR).The amount of the fine imposed is therefore adequate and effective to deter companies from violating the privacy of their employees.

Before you buy that managed Netgear switch, be aware you may need to create a cloud account to use its full UI

Before you buy that managed Netgear switch, be aware you may need to create a cloud account to use its full UI

“I would not have bought the switches if I had knew I needed to register them to Netgear Cloud to have access to the full functionality specified in the data sheet.”.

Key questions raised about algorithmic transparency by new GDPR case brought against Uber by its drivers

Key questions raised about algorithmic transparency by new GDPR case brought against Uber by its drivers

But assuming the court rules that algorithmic management must follow the GDPR, with specific privacy safeguards, then many other companies in the EU that use or are considering using office surveillance systems may find that they can do so only in circumscribed ways.

Following security breach, report says Twitter contractors have been caught spying on accounts in the past

Following security breach, report says Twitter contractors have been caught spying on accounts in the past

In this recent attack in which 130 accounts were hacked, Twitter was able to confirm that the hackers got help from employees with access to an internal control panel.

Everbridge CEO: We Can Play Critical Role in Covid-19 Contact Tracing

Everbridge CEO: We Can Play Critical Role in Covid-19 Contact Tracing

Everbridge's products are used by governments and companies to assess risks such as terrorism and cyber-attacks and determine which they need to worry about; locate assets, customers and others that could be harmed; provide automated "standard operating procedures" to manage and respond to problems; and analyze how past threats were handled to create a better response for the next ones that come along, according to the CEO.In response to Covid-19, Everbridge launched a coronavirus data feed, said Meredith.

Twitter CEO Jack Dorsey Tells Employees They Can Work From Home ‘Forever’—Before You Celebrate, There’s A Catch

Twitter CEO Jack Dorsey Tells Employees They Can Work From Home ‘Forever’—Before You Celebrate, There’s A Catch

Given the time frame of reopening, coupled with the opportunity to remain working from home, this new program means that it's highly conceivable that the vast majority of Twitter employees will work remotely for the foreseeable future—or forever.

Do we really need employee monitoring?

Do we really need employee monitoring?

Employee monitoring software can be useful, but it can also very easily be a crutch that poisons our working relationships, leading to lower productivity and worse health for businesses and people.

Internet governance body RIPE opposes Chinese proposal to change core internet protocols

Internet governance body RIPE opposes Chinese proposal to change core internet protocols

'New IP' proposal is said to theoretically offers more proficient and well-organised network management and addressing capabilities than the current TCP/IP standard, but it also seems to have features that could allow authoritarian regimes, such as China, to censor their residents.

This is where workplace surveillance leads: towards algorithmic, automated management

This is where workplace surveillance leads: towards algorithmic, automated management

The experience of Angela, who worked in an insurance call center, points to what is likely to become an increasingly serious issue with the algorithmic management of jobs that require inter-personal skills.

NIST Releases Version 1.0 of Privacy Framework

NIST Releases Version 1.0 of Privacy Framework

“The strong support the Privacy Framework’s development has already received demonstrates the critical need for tools to help organizations build products and services providing real value, while protecting people’s privacy.”.

LogMeIn (LastPass) to be acquired by Private Equity Firms

LogMeIn (LastPass) to be acquired by Private Equity Firms

LogMeIn announced yesterday that it will be acquired by Private Equity Firm for approximately $4.3 billion in an all-cash transaction.LogMeIn announced yesterday that it will be acquired by Private Equity Firm for approximately $4.3 billion in an all-cash transaction.

Facebook admits to another data leak, saying that up to 100 developers accessed people's data from Groups

Facebook admits to another data leak, saying that up to 100 developers accessed people's data from Groups

In April 2018 Facebook implemented new rules restricting the amount of personal data third-parties could access following the Cambridge Analytica scandal.Roughly 100 app developers retained access to group members' personal data, although Papamiltiadis said Facebook has now cut them off.

EXCLUSIVE: This Is How the U.S. Military’s Massive Facial Recognition System Works

EXCLUSIVE: This Is How the U.S. Military’s Massive Facial Recognition System Works

These contracts, combined with revelations surrounding the military’s massive biometric database initiatives, paint an alarming picture: A large and quickly growing network of surveillance systems operated by the U.S. military and present anywhere the U.S. has deployed troops, vacuuming up biometric data on millions of unsuspecting individuals.

Google Warns LastPass Users Were Exposed To ‘Last Password’ Credential Leak

Google Warns LastPass Users Were Exposed To ‘Last Password’ Credential Leak

Project Zero has just disclosed that a security vulnerability left some of those 16 million users exposed to the risk of credential compromise as, in an ironic twist, LastPass could leak the last password used to any website visited.

Senator Wyden to AT&T and T-Mobile: You Don’t Need to Store So Much Customer Data

Senator Wyden to AT&T and T-Mobile: You Don’t Need to Store So Much Customer Data

"I write to ask that you protect your customers’ privacy—and U.S. national security—from foreign hackers and spies by limiting the time you keep records about your customers’ communications, web browsing, app usage and movements," Wyden's letter addressed to the CEOs of each teleco reads.

Facebook hit with new questions over Cambridge Analytica

Facebook hit with new questions over Cambridge Analytica

Facebook is facing new questions over its handling of the Cambridge Analytica debacle even after a record settlement with the FTC ended a year-long investigation by regulators into the matter.

Confirmed: 2 Billion Records Exposed In Massive Smart Home Device Breach

Confirmed: 2 Billion Records Exposed In Massive Smart Home Device Breach

The researchers in question, Noam Rotem and Ran Locar from vpnMentor, found that a user database belonging to a Chinese company called Orvibo, which runs an Internet of Things (IoT) management platform, had been left exposed to the Internet without any password to protect it.

MongoDB 4.2 Introduces End-to-End Field Level Encryption for Databases

MongoDB 4.2 Introduces End-to-End Field Level Encryption for Databases

The newly introduced Field Level Encryption (FLE), which will be available in the upcoming MongoDB 4.2 release, is an end-to-end encryption feature that encrypts and decrypts sensitive users' data on the client-side, preventing hackers from accessing plaintext data even if the database instance left exposed online or the server itself gets compromised.

Apple is making corporate ‘BYOD’ programs less invasive to user privacy

Apple is making corporate ‘BYOD’ programs less invasive to user privacy

This new MDM (mobile device management) enrollment option is meant to better balance the needs of IT to protect sensitive corporate data and manage the software and settings available to users, while at the same time allowing users’ private personal data to remain separate from IT oversight.

US judge orders Facebook to turn over data privacy records

US judge orders Facebook to turn over data privacy records

An investor is seeking company records to probe potential mismanagement by directors at the social media giant. The ruling in the state of Delaware involves an investor lawsuit seeking company records to investigate potential wrongdoing and mismanagement by Facebook directors regarding data privacy breaches.

Empowering User Privacy and Decentralizing IoT with Mozilla WebThings

Empowering User Privacy and Decentralizing IoT with Mozilla WebThings

Before we look at the design of Mozilla WebThings, let’s talk briefly about how people think about their privacy when they use smart home devices and why we think it’s essential that we empower people to take charge. From our user research, we’ve learned that people are concerned about the privacy of their smart home data.

Facebook Wants To Combat Fake News With ID Checks

Facebook Wants To Combat Fake News With ID Checks

I wanted to test how quickly Facebook’s algorithm could sniff out a fake profile, so I opened one under an assumed Arabic name, set my location in the Middle East and started indiscriminately sharing secular political posts.

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft's crypto, identity and authentication team group manager, Yogesh Mehta, has made an announcement that he says puts "the 800 million people who use Windows 10 one step closer to a world without passwords."

What are the Components of Customers Data that Have to be Secured?

What are the Components of Customers Data that Have to be Secured?

Analytics Artificial Intelligence Content Marketing Conversation Management Conversational Experience Customer Engagement Customer Experience Customer Service Customer Success Demand Generation Digital Marketing Digital Transformation Jobs Lead Generation Machine Learning Sales Uncategorized. The Secret Sauce for a Successful Digital Marketing Strategy 4 Terribly Executed Customer Strategies that People Use.

Apple CEO Tim Cook says digital privacy 'has become a crisis'

Apple CEO Tim Cook says digital privacy 'has become a crisis'

Apple CEO Tim Cook called online privacy a "crisis" in an interview with ABC News, reaffirming the company's stance on privacy as companies like Facebook and Google have come under increased scrutiny regarding their handling of consumer data.

Brooklyn Apartment Tenants Rise Up Against Landlord’s Plans to Install Facial Recognition Technology

Brooklyn Apartment Tenants Rise Up Against Landlord’s Plans to Install Facial Recognition Technology

The landlord, Nelson Management Group, filed an application to install the tech with New York State Homes & Community Renewal (NYSHCR)—which can approve or deny the request. This is the first time a property manager filed an application for facial recognition technology with NYSHCR according to The Brooklyn Eagle.

What Is MINIX? Is The World's Most Popular OS A Threat?

What Is MINIX? Is The World's Most Popular OS A Threat?

A closed source version of MINIX (which itself is an open source OS) exists on its own CPU (Intel Management Engine) that we don’t have access to, but it has complete access to the system memory, hard drive, TCP/IP stack.