Tag: Data Privacy


  • Misdirected Email Risk in Enterprise Security: Insights from Abnormal AI’s 2025 Report

    Misdirected Email Risk in Enterprise Security: Insights from Abnormal AI’s 2025 Report

    Overview: A Growing Threat Beyond Phishing Enterprise email continues to be a critical communication channel, yet it remains a prime vector for data leakage and security breaches. Abnormal AI’s latest research, “2025 State of Misdirected Email Prevention: Keeping Sensitive Data Out of the Wrong Inboxes,” highlights a sobering reality: human error is accelerating the risk…

  • Humanoid Robot Under Attack: Bluetooth Flaw Lets Hackers Steal Data and Spy for China

    Humanoid Robot Under Attack: Bluetooth Flaw Lets Hackers Steal Data and Spy for China

    Overview: A Vulnerable Humanoid Robot in Plain Sight A recent analysis by Alias Robotics uncovers significant security flaws in the Unitree G1 humanoid robot. The researchers conclude that the device can be exploited as a tool for espionage and cyber attacks, with attackers able to gain root access and control via Bluetooth Low Energy (BLE).…

  • Albanese PM mobile number leaked raises privacy concerns

    Albanese PM mobile number leaked raises privacy concerns

    Australian Prime Minister’s mobile number reported online In a development that has drawn attention to digital privacy and safety, a US-based website has listed the mobile numbers and emails of high-profile Australians, including Prime Minister Anthony Albanese and Opposition Leader Sussan Ley. The site markets itself as a platform that aggregates contact details for professionals…

  • OneDrive Facial Recognition: How Often You Can Toggle the Feature

    OneDrive Facial Recognition: How Often You Can Toggle the Feature

    Microsoft OneDrive’s Facial Recognition Feature Faces a Toggle Limit Microsoft is testing a facial-recognition tool in OneDrive intended to help users organize photos by the people in them. The feature, which is enabled by default for those in the preview, adds a new privacy toggle under Settings > Privacy and permissions. Its purpose is to…

  • RMPocalypse: ETH Researchers Uncover Vulnerability in Confidential Cloud Environments

    RMPocalypse: ETH Researchers Uncover Vulnerability in Confidential Cloud Environments

    New findings from ETH Zurich compromise confidence in confidential cloud computing Cloud services have become essential for individuals and organizations alike, enabling secure data storage and powerful processing from anywhere. For highly sensitive workloads—such as healthcare or financial data—cloud providers offer confidential computing environments. These are designed so that data remains encrypted not just at…

  • Choosing Your AI Chatbot: Green Flags and Red Flags

    Choosing Your AI Chatbot: Green Flags and Red Flags

    Introduction: What a chatbot can and cannot do for you When people say “AI,” they often mean a chatbot—an assistant that can answer questions, draft content, and help you work more efficiently. These tools have transformed how we learn, create, and solve problems, but they can also lead to pitfalls if used unwisely. Tragic stories…

  • How to pick your AI chatbot: green and red flags for safer use

    How to pick your AI chatbot: green and red flags for safer use

    Introduction When people say “AI,” they often mean a chatbot. These digital assistants have transformed how we work, learn, and create, but they can also lead to harmful experiences if not chosen carefully. This piece distills practical guidance from conversations with industry expert Josh Aquino, Head of Communications for Microsoft in the Philippines, about how…

  • How to Pick Your AI Chatbot: A Practical Guide to Safe, Effective Choices

    How to Pick Your AI Chatbot: A Practical Guide to Safe, Effective Choices

    Why choosing the right AI chatbot matters When people talk about AI, they often mean chatbots that can assist, inform, and inspire. These tools have the potential to boost productivity, deepen understanding, and unlock new creative paths. But not all chatbots are created equal. Guardrails, data handling, and user agency vary across platforms, and a…

  • Government Holds Firm: No Negotiation with Hackers After Qantas Breach

    Government Holds Firm: No Negotiation with Hackers After Qantas Breach

    Australia Maintains a No-Ransom Stance in Cybercrime The Australian government is standing firm on its policy of not negotiating with cyber criminals or paying ransoms, even as a ransomware group released stolen Qantas data on the dark web. The breach, which emerged in July, affected around 5.7 million Qantas customers and involved data from 40…

  • JP Morgan’s Biometric Access Policy at New Manhattan HQ: Security Push or Privacy Concern?

    JP Morgan’s Biometric Access Policy at New Manhattan HQ: Security Push or Privacy Concern?

    Overview: Biometric access at JP Morgan’s new Manhattan HQ As JP Morgan Chase moves toward full occupancy of its multibillion-dollar Manhattan headquarters, the bank has begun implementing biometric access for employees. Reports indicate that staff moving into the new 60-storey complex are now being asked to register fingerprints or eye-based data to gain entry through…