Subject: LinkedIn Halts AI Data Processing in UK Amid Privacy Concerns Raised by ICO
Source: The Hacker News
https://thehackernews.com/2024/09/linkedin-halts-ai-data-processing-in-uk.html
The U.K. Information Commissioner’s Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended processing users’ data in the country to train its artificial intelligence (AI) models. “We are pleased that LinkedIn has reflected on the concerns we raised about its approach to training generative AI models with information relating to its U.K. users,” Stephen Almond, executive director of regulatory risk, said.
“We welcome LinkedIn’s confirmation that it has suspended such model training pending further engagement with the ICO.”
Almond also said the ICO intends to closely keep an eye on companies that offer generative AI capabilities, including Microsoft and LinkedIn, to ensure that they have adequate safeguards in place and take steps to protect the information rights of U.K. users.
“The companies collected and could indefinitely retain troves of data, including information from data brokers, and about both users and non-users of their platforms,” the FTC said, adding their data collection, minimization, and retention practices were “woefully inadequate.”
“Many companies engaged in broad data sharing that raises serious concerns regarding the adequacy of the companies’ data handling controls and oversight. Some companies did not delete all user data in response to user deletion requests.”
Source: VentureBeat
https://venturebeat.com/security/harvest-now-decrypt-later-why-hackers-are-waiting-for-quantum-computing/
[I wonder how many hacker orgs are willing to play the long game? esp. if it is decades? maybe it’s time for the whitehats to encrypt the blackhats’ data? /pmw1]
Hackers are waiting for the moment quantum computing breaks cryptography and enables the mass decryption of years of stolen information. In preparation, they are harvesting even more encrypted data than usual. Here is what businesses can do in response.Why are hackers harvesting encrypted data?
Most modern organizations encrypt multiple critical aspects of their operations. In fact, about eight in 10 businesses extensively or partially use enterprise-level encryption for databases, archives, internal networks and internet communications. After all, it is a cybersecurity best practice.
Alarmingly, cybersecurity experts are growing increasingly concerned that cybercriminals are stealing encrypted data and waiting for the right time to strike. Their worries are not unfounded — more than 70% of ransomware attacks now exfiltrate information before encryption.
The “harvest now, decrypt later” phenomenon in cyberattacks — where attackers steal encrypted information in the hopes they will eventually be able to decrypt it — is becoming common. As quantum computing technology develops, it will only grow more prevalent.
- How ‘harvest now, decrypt later’ works…
- The consequences of qubits cracking encryption…
- Why prepare if quantum isn’t here yet?…
- What can enterprises do to protect themselves?…
There are a few steps business leaders should take in preparation for quantum computing cracking cryptography.
Source: Android Headlines
https://www.androidheadlines.com/2024/09/verizon-faces-lawsuit-over-allegedly-illegal-collection-of-voiceprints.html
Verizon will be dealing with a couple of lawsuits from disgruntled customers. The company has been particularly busy lately, handling 5,000 worker layoffs and moving forward with the acquisition of Frontier. Now, Verizon must contend with a lawsuit pertaining to the use of voiceprints and another concerning website accessibility.Verizon does not ask for consent to collect voiceprints, lawsuit says
Thelton George Parker Jr. and Steven Doyle filed the first lawsuit. They allege that the mobile carrier is violating Illinois data protection laws with its Voice ID feature. Voice ID is a biometric identification system that allows customers to access their Verizon accounts when they call. The system uses the customer’s voiceprint instead of a numeric password, making it more secure. However, the plaintiffs claim that the carrier does not correctly request prior authorization to capture and use voiceprints.
The Biometric Information Privacy Act (BIPA) in Illinois mandates the use of additional layers of protection for voiceprints due to their potential for individual identification. State law mandates that companies provide customers with specific information about the handling of their data, including its use and duration of storage. The law also requires companies to request consent from customers. According to the plaintiffs, Verizon should have sent them a written request to consent to the recording and use of their voiceprints.
…
Source: AndroidHeadlines
https://www.androidheadlines.com/2024/09/the-us-could-ban-all-chinese-tech-for-connected-vehicles.html
The United States could take a new step in its trade restrictions policy against China. Recently, the government announced heavy tariffs on Chinese EVs. Now, a new report claims that the United States will soon propose a ban on Chinese software and hardware for connected vehicles.The connected and autonomous vehicles segment is booming in the Asian country. Chinese companies have been developing connected and autonomous EVs for a long time, a sector where even Xiaomi has ventured. However, the United States government is responding with protectionist policies on the local market.
Washington may soon propose a ban on Chinese hardware and software for connected vehicles. Recently, Washington announced a severe 100% tariff on Chinese electric vehicles. According to Reuters, the next step will be a proposal for a total ban on hardware and software used in connected vehicles. If it sounds familiar, it’s because the United States did the same thing years ago with Huawei’s telecommunications equipment. The United States Department of Commerce could announce the measure on Monday.
…
Source: BrianKregs Mastodon account
https://infosec.exchange/@briankrebs/113187277290933742
Just FYI in re a new feature of iOS 18 and later: Request or give remote control in a Facetime call on an iPhone. This one could be a double-edged sword for some iPhone owners in your life. Thankfully, it’s not full remote control: https://support.apple.com/guide/iphone/request-give-remote-control-a-facetime-call-iph5d70f34a3/ios
Accept a remote control request
A participant can request to remotely control your screen if they’re using an iPhone or iPad with iOS 18, iPadOS 18, or later.
When you receive a remote control request notification in the FaceTime app on your iPhone, tap Allow.
A countdown from 3 to 1 appears, then the remote control session starts.
WARNING: The person remotely controlling the screen can perform tasks on your iPhone such as opening and closing apps, changing settings, deleting items, or sending messages. Only approve remote control requests from people you trust.
Source: Tech Times
https://www.techtimes.com/articles/307372/20240904/cox-media-group-reveals-active-listening-software-spies-user-convos.htm
[thx, Jeff] Your conversations may not be safe on Facebook and Google because of Cox Media.
A marketing firm called Cox Media Group has recently revealed that it is listening to user conversations via their smartphones through its so-called “Active Listening” Software. With this, the company will push advertisements that users will see on certain platforms based on the heard conversations as unveiled by a report.
The famed media conglomerate is known for its massive partnership with Meta’s Facebook and Google, among other Big Tech clients.
Cox Media Group Confess That It Listens to Your Conversations for Ads
404 Media’s recent exposé unveiled how Cox Media Group (CMG) privately confessed that it can listen to user conversations via a person’s smartphone to help them deliver the most appropriate ads in their online experience. It was revealed that CMG admitted this via a slide deck unveiled to investors, detailing how it can listen in on a conversation.
This was made possible through CMG’s “Active Listening” software according to the New York Post, and it also uses artificial intelligence to obtain “real-time data.”
Later on, its AI will analyze these collected data across over 470 sources, with the consumers leaving data trail “based on their conversations.” That being said, it was not revealed how many users were affected by this spying.
…