#dataprotection

2025-12-15

L'Europa ripensa la protezione dati: semplificazione necessaria o compromesso al ribasso?

garr.tv/w/5Th96wFXQwtiBDqsEqtr

ECS Infotech Pvt. Ltd.ecsinfotech
2025-12-15

SOC as a Service (SOCaaS): A Smarter Way to Secure Your Business in 2025

Discover why SOC as a Service is the smarter security choice for 2025. Explore benefits, pricing, features, and how SOCaaS strengthens business cybersecurity.

πŸ‘‰ Read more: ecsinfotech.com/soc-as-a-servi

SOC as a Service (SOCaaS): A Smarter Way to Secure Your Business in 2025
Kalvin Carefour Johnny πŸ‡²πŸ‡Ύkalvin0x58c@gallant.kalvin.my
2025-12-15

The "privacy" you think you have in Malaysia is an illusion.

Authorities have a legal backdoor into your entire digital existence. Under Section 249 of the Communications & Multimedia Act (CMA), police can demand your passwords, PINs, or biometrics during an investigation.

Here is the creepy part: Refusing to unlock your phone IS the crime itself.

They don't need to crack sophisticated encryption; they just crack you with the threat of immediate arrest for "obstruction." You become a criminal just for trying to protect your data dignity.

And it's getting worse. The incoming #Pindaan2025 amendments propose escalating penalties for non-compliance up to a staggering RM1 MILLION fine or 5 YEARS in prison.

This isn't about fighting crime; it's an infrastructure designed to force compliance through state-sanctioned fear. Your digital mind is yours only until they ask for it. Wake up.

#DigitalRightsMY #AKM1998 #Privacy #Censorship #MalaysiaBoleh #DigitalRightsMY #CMA2025 #Section249 #PrivacyInMalaysia #EndSurveillance #FightCensorship #DigitalFreedom #Malaysia #OnlinePrivacy #DataProtection #EncryptionRights #SurveillanceState #CyberSecurityMY #RightToSilence #TechPolicy #HumanRights #DigitalJustice #StopPindaan2025 #PrivacyNow #FreedomOfExpression #MalaysianPolitics #DigitalActivism #RightToPrivacy #SurveillanceLaws #InformationRights #AKM1998 #OrangKenaCekup #DigitalOppression #SecureTheWeb #ResistSurveillance #TechForGood #DigitalSovereignty #OnlineFreedom #DataOwnership #DigitalRights

Zevonixzevonix
2025-12-13

πŸ“± Mobile devices hold sensitive dataβ€”protect them.
πŸ”’ Use biometric logins like fingerprints or face recognition for stronger security.
πŸ‘‰ zurl.co/KXEEI

PPC Landppcland
2025-12-13

Dutch authority reprimands Takeaway for Google Analytics data transfers: Netherlands data protection regulator issues formal reprimand against food delivery company for transferring customer data to US through Analytics from 2020 to 2023. ppc.land/dutch-authority-repri

PPC Landppcland
2025-12-13

Meta settles Nigerian privacy case for $32.8 million: Meta and Nigeria's data authority reach settlement after investigation into behavioral advertising practices affecting 60 million users in the West African nation. ppc.land/meta-settles-nigerian

PPC Landppcland
2025-12-13

Netherlands raises serious concerns about EU Digital Omnibus privacy changes: Dutch government warns proposed GDPR amendments could substantially weaken data protection without effectively reducing regulatory burden for businesses. ppc.land/netherlands-raises-se

Brian Greenberg :verified:brian_greenberg@infosec.exchange
2025-12-12

We keep talking about GenAI as if it lives in clouds and servers. In reality, it lives in browser tabs, copy fields, and file uploads. And that’s exactly where most security strategies go blind. Oh, and banning AI will never work. Productivity always finds a way around policy. The smarter move is to govern behavior where it actually happens: inside the browser, at the moment data leaves your hands. Clear policies define what should never touch a prompt. Isolation keeps sensitive work separate from exploratory AI use. And real-time controls on copy, paste, and upload turn GenAI from a risk multiplier into a managed capability. If your GenAI security strategy starts after data leaves the browser, you’re already late to the conversation.

TL;DR
🧠 GenAI risk lives in browser behavior, not models
⚑ Blocking AI fails; governed use scales
πŸŽ“ Policy, isolation, and edge controls actually work
πŸ” Secure prompts before data ever leaves

thehackernews.com/2025/12/secu

#GenAI #BrowserSecurity #DataProtection #Infosec #security #privacy #cloud #cybersecurity

Zevonixzevonix
2025-12-12

βš™οΈ Your apps and services collect more than you think.
πŸ”’ Regularly review privacy settings to keep control over your data.
πŸ‘‰ zurl.co/GC8V4

2025-12-12

☝️ Gartner recommends banning AI-powered browsers in sensitive environments β€” convenience is colliding with data leakage and prompt injection risks. Control before curiosity. 🚫🌐 #AIBrowsers #DataProtection

theregister.com/2025/12/08/gar

2025-12-12

The UK ICO has fined LastPass Β£1.2M for the 2022 breach affecting 1.6M UK users. Attackers accessed cloud storage volumes via two compromised employee devices, obtaining encrypted vault data. Regulators say there’s no evidence passwords were decrypted, though experts remain split on long-term risk.

How do you assess the threat when encrypted vaults are exposed but not cracked?

Source: therecord.media/uk-fines-lastp

Share your thoughts and follow @technadu for more infosec reporting.

#Infosec #Cybersecurity #LastPass #Encryption #IAM #DataProtection #TechPolicy #SecurityNews

UK fines LastPass Β£1.2 million for data breach affecting 1.6 million people
2025-12-12

I have started curating a list of interesting reads in relation to the #Digital #Omnibus
proposals: julienrossi.com/blog/2025/12/1

Let me know if you have other reading suggestions. For the moment the list is still rather short.

#DigitalOmnibus #GDPR #dataprotection

knoppixknoppix95
2025-12-12

Brave is testing an agentic AI mode with Leo to automate research, comparisons, and summaries πŸ€–

Because agentic actions pose risks, it runs in an isolated profile with strict access limits, intent checks, and no user-data training πŸ”

But… is this really safe? What do you think, privacy folks? πŸ‘€

@brave

πŸ”— bleepingcomputer.com/news/arti

knoppixknoppix95
2025-12-12

Notepad++ 8.8.9 patches a flaw in its WinGUp updater after reports that some systems retrieved malicious executables instead of legitimate updates ⚠️

The new release enforces code-signature checks and aims to curb targeted hijacking of update traffic πŸ”

πŸ”— bleepingcomputer.com/news/secu

knoppixknoppix95
2025-12-12

UK regulators fined LastPass Β£1.2M after investigations linked its 2022 breaches to weak internal controls and a compromised employee device πŸ”

Encrypted vaults remained intact, but exposed metadata and weak master passwords raised long-term security risks πŸ”

πŸ”— bleepingcomputer.com/news/secu

knoppixknoppix95
2025-12-12

Signal’s reputation for secure messaging rests on strong E2EE using the open-source Signal Protocol πŸ”

The app collects minimal metadata, but concerns remain around SGX reliance, AWS hosting, and past CDN-based deanonymization research πŸ›°οΈ
Useful, but not flawless, for privacy-focused users βš–οΈ

@signalapp

πŸ”— proton.me/blog/is-signal-safe

knoppixknoppix95
2025-12-12

Tails 7.3.1 arrives after a last-minute security fix, underscoring the project’s cautious approach to patching πŸ”

The update includes Tor Browser 15.0.3, Tor client 0.4.8.21, and a new Thunderbird build, with upgrades available from Tails 7.0+ πŸ”„

@tails
@torproject

πŸ”— blog.torproject.org/new-releas

knoppixknoppix95
2025-12-12

Tor advances its Rust migration as Arti 1.8.0 lands, aiming to replace legacy C code with safer, memory-secure components πŸ›‘οΈ

The update adds usage-based circuit timeouts to reduce fingerprinting risks, plus smoother onion-service key migration and broader protocol improvements πŸ”„

@torproject

πŸ”— itsfoss.com/news/tor-rust-rewr

veroandiveroandi
2025-12-12

"US Customs and Border Protection (CBP) is requesting approval not only to make all foreigners visiting the US without visas submit a comprehensive set of biometric identifiers (β€œface, fingerprint, DNA, and iris”) but to do so by installing and using a closed-source CBP smartphone app that requires permission to access Wi-Fi scanning and network data; take photos and video; access any fingerprint, iris scan, or other biometric sensors, and (...)"

papersplease.org/wp/2025/12/10

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst