Recent #Privacy news in the semiconductor industry

about 15 hours ago

➀ Microsoft is testing a new Teams feature that can automatically update a user's work location based on the Wi-Fi network they are connected to.

➁ The feature is intended to reduce confusion in the workplace by helping colleagues identify who is on-site or remote.

➂ The feature will be off by default, and tenant admins will have the privilege of deciding whether to enable location reporting and require end-user opt-in.

MicrosoftPrivacyteams
about 23 hours ago

➀ Microsoft clarifies screenshots from Gaming Copilot are used to analyze in-game actions, not for AI training;

➁ The optional feature is enabled by default, requiring PowerShell admin access for full removal;

➂ Users raise privacy concerns over automatic data transmission and limited transparency in settings.

MicrosoftGamingPrivacy
11 days ago

➀ The U.S. Department of Justice seized 127,271 Bitcoins (valued at $15B) from Chen Zhi, a Cambodian fraudster accused of orchestrating a 'pig butchering' scam using forced labor;

➀ The operation involved a transnational criminal network spanning 30+ countries, with victims deceived through emotional manipulation and fake investments;

➂ Chen Zhi faces up to 40 years in prison, while his conglomerate 'Prince Group' was officially designated as a criminal organization by U.S. and UK authorities.

CryptocurrencyCybersecurityPrivacy
13 days ago

➀ ETH Zurich researchers identified a hardware-level vulnerability named **RMPocalypse** in AMD's SEV-SNP technology, which secures confidential cloud computing environments;

➁ The flaw allowed 100% success rate in bypassing protections, exposing sensitive data (e.g., AI-processed messages) via memory management weaknesses in AMD processors;

➂ AMD patched the issue post-disclosure, reinforcing the critical role of secure computing for data sovereignty and cloud trust.

AMDCybersecurityPrivacy
20 days ago

➀ Ed, an CEO, strategizes to secure a lucrative UK government ID card contract estimated at £1.2-2 billion, leveraging political connections;

➁ He proposes ScunthorpeID (SID) as a British front company for public reassurance, highlighting its tech capabilities and friendly acronym;

➂ Negotiates a 30% net profit share with ScunthorpeID's owner after playful bargaining over subcontracting roles like distribution and customer service.

Privacycybersecuritysemiconductor
22 days ago

➀ Researchers developed the Mic-E-Mouse technique, utilizing high-DPI mouse sensors (20,000+ DPI) to capture acoustic vibrations and convert them into speech via AI processing;

➀ The attack exploits compromised software (e.g., games or creative apps) to collect raw mouse data, which is then filtered and enhanced through neural networks for 42-61% speech recognition accuracy;

➂ While alarming, this method highlights evolving AI-driven privacy risks and echoes historic surveillance tactics like the KGB's Great Seal bug.

AIPrivacycybersecurity
28 days ago

➀ A U.S. court upheld DJI's designation as a Chinese military company, citing sufficient evidence from the Department of Defense;

➁ DJI will continue operating in the U.S. and pursue legal remedies despite lost business and reputational damage;

➂ Concerns persist over potential Chinese government-mandated backdoors in DJI drones, raising U.S. national security fears

MicrochipPrivacycybersecurity
about 1 month ago

➀ Washington University researchers developed SIDE technology to embed traceable digital fingerprints in 3D-printed objects, enabling forensic tracking of printer metadata;

➁ The innovation targets ghost gun regulation but faces challenges like firmware modifications and fingerprint removal tactics;

➂ Critics argue the method may be circumvented through model simplification, open-source printer modifications, or physical alterations to prints.

3D printingPrivacycybersecurity
about 1 month ago

➀ Cabinet members raise concerns about widespread AI-driven scams, pressuring Ed to take action as the newly appointed "Scams Czar";

➀ Ed establishes an HMG hotline to validate internet communications, collaborating with Greaser's team to analyze scam patterns;

➂ A proposed fake rare earth mine investment scheme reveals potential corruption, as Greaser suggests profiting by endorsing the scam through government channels.

AIPrivacycybersecurity
about 1 month ago

➀ The article critiques IoT-based electrical safety devices that claim comprehensive protection but lack branch-circuit monitoring and proper certifications

➁ Indian standards (IS 732/IEC 61439) require system-level safety designs, which cannot be achieved through single-device solutions promoted by some government bodies

➂ Major concerns include data privacy risks under Digital Personal Data Protection Act, post-fault alerts instead of prevention, and unauthorized use of technical standards for product validation

Electrical SafetyIoTPrivacy
about 2 months ago

➀ The article portrays a fictional dialogue where "Ed The Serial CEO" advises the UK Prime Minister on using technology to manage illegal immigration, including drone surveillance (Tekever), real-time monitoring systems (Anduril), and facial recognition;

➁ Ed proposes relocating migrants to Orford Ness, suggesting infrastructure upgrades to create temporary accommodations while balancing public perception and media optics;

➂ The plan involves political maneuvering, leveraging connections with construction firms, and framing the solution to avoid backlash from critics and the media.

PrivacySoftwarecybersecurity
about 2 months ago

➀ Chinese social media platforms like WeChat and Douyin now legally require AI-generated content labeling with watermarks and metadata;

➁ The Cyberspace Administration of China enforces penalties for AI-driven misinformation, targeting paid online commentators;

➂ Global parallels emerge as IETF proposes AI disclosure standards and Google implements C2PA image credentials.

AIPrivacycybersecurity
about 2 months ago

➀ The German Cybersecurity Innovation Agency (Cyberagentur) celebrated its fifth anniversary, emphasizing its role in financing disruptive cybersecurity research and advancing national digital sovereignty;

➀ The agency announced a strategic shift toward proactive vigilance (Vigilanz) to counter cyberattacks and disinformation, with plans to expand its advisory role for policymakers;

➂ Winners of the HAL2025 innovation competition were honored for projects on autonomous swarm systems, including communication resilience and AI-driven security assessments for public events.

PrivacySoftwarecybersecurity
2 months ago

➀ China's Great Firewall (GFW) disrupted all HTTPS traffic on TCP port 443 for 74 minutes, potentially due to misconfiguration or a new censorship mechanism;

➀ The anomaly specifically targeted port 443, unlike past protocol-wide blocks, raising questions about GFW's evolving tactics;

➂ The incident highlights China's conflicted approach to balancing economic reliance on global internet access with strict information control.

ChinaPrivacycybersecurity
2 months ago

➀ The German Cybersecurity Innovation Agency (Cyberagentur) launched the ZANDER-F research program with €15 million funding to develop technologies enabling communication and imaging through conductive barriers like Faraday cages, addressing challenges for special forces in anti-piracy operations and disaster scenarios;

➁ The initiative explores unconventional approaches including plasmonic surface wave transmission, low-frequency electromechanical signals, and subatomic particle-based data transfer, with applications in border security, disaster rescue, and urban drone detection;

➂ The 5-year multi-stage project is now open for proposals, with submission deadlines starting October 2025, aiming to revolutionize secure communication systems beyond traditional radio limitations

Privacycybersecuritysemiconductor
2 months ago

➀ A security researcher exploited vulnerabilities in Intel's internal websites, accessing sensitive data of 270,000 employees, including names, roles, and contact information.

➁ Four Intel websites, including an internal business card portal and supplier system, had critical flaws like hardcoded credentials and authentication bypasses.

➂ Intel patched the vulnerabilities by February 2025 but rejected the researcher's bug bounty claim, offering only automated responses during disclosure.

IntelPrivacycybersecurity
2 months ago

➀ A controversial University of East London ad links screen time to climate damage through data center emissions, rather than Wi-Fi itself;

➁ The campaign emphasizes the environmental impact of social media-driven data centers, advocating for sustainable infrastructure research;

➂ Critics warn the ad risks misinterpretation by conspiracy theorists, despite its intent to provoke climate awareness.

HPCPrivacysustainability
3 months ago

➀ A critical directory traversal vulnerability (CVE-2025-8088) in WinRAR was exploited by the Russian-linked RomCom hacking group to plant backdoor malware via malicious archives;

➀ The flaw allows attackers to place executable files in Windows startup folders, enabling automatic execution and remote code control;

➁ WinRAR version 7.13 fixes the issue, but users must manually update as the software lacks auto-update functionality.

PrivacyWindowscybersecurity