Smashing Security podcast #409: Peeping perverts and FBI phone calls

In episode 409 of the “Smashing Security” podcast, we uncover the curious case of the Chinese cyber-attack on Littleton’s Electric Light Company, and a California landlord’s hidden camera scandal.

Find out about this, and more, in the latest editio… Continue reading Smashing Security podcast #409: Peeping perverts and FBI phone calls

Amazon Ends Little-Used Privacy Feature That Let Echo Users Opt Out of Sending Recordings to Company

Amazon is ending a little-used privacy feature that let some users of its Echo smart speaker prevent their voice commands from going to the company’s cloud.
The post Amazon Ends Little-Used Privacy Feature That Let Echo Users Opt Out of Sending Recordi… Continue reading Amazon Ends Little-Used Privacy Feature That Let Echo Users Opt Out of Sending Recordings to Company

Six additional countries identified as suspected Paragon spyware customers

Researchers found suspected Graphite deployments in Australia, Canada, Cyprus, Denmark, Israel and Singapore.

The post Six additional countries identified as suspected Paragon spyware customers appeared first on CyberScoop.

Continue reading Six additional countries identified as suspected Paragon spyware customers

Is our codebase secure while we are using the AI agents and copilots?

In today’s world of AI, we are seeing new AI models and agents coming up, almost every day, that claim to be near to a human programmer.
That said, a few security concerns are getting raised in my mind. Of course, when we use AI agents, th… Continue reading Is our codebase secure while we are using the AI agents and copilots?

Is our codebase secure while we are using the AI agents and copilots?

In today’s world of AI, we are seeing new AI models and agents coming up, almost every day, that claim to be near to a human programmer.
That said, a few security concerns are getting raised in my mind. Of course, when we use AI agents, th… Continue reading Is our codebase secure while we are using the AI agents and copilots?

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure even in the event of a cloud breach. As of February 21, 2025, Apple removed ADP… Continue reading Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure even in the event of a cloud breach. As of February 21, 2025, Apple removed ADP… Continue reading Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

DOGE staffer violated security policies at Treasury Department, court filing shows

The filing was part of a case brought by state attorneys general seeking to block DOGE access to sensitive information.

The post DOGE staffer violated security policies at Treasury Department, court filing shows appeared first on CyberScoop.

Continue reading DOGE staffer violated security policies at Treasury Department, court filing shows

Amazon’s Controversial Change to Echo’s Privacy Settings Takes Effect Soon

Amazon is mandating cloud-based processing for Echo voice commands, removing local storage and disabling Alexa’s voice ID to expand its generative AI capabilities. Continue reading Amazon’s Controversial Change to Echo’s Privacy Settings Takes Effect Soon