Tag: law
-
High Court to grill London cops over live facial recognition creep
Tags: lawVictim and Big Brother Watch will argue the Met’s policies are incompatible with human rights law First seen on theregister.com Jump to article: www.theregister.com/2026/01/27/high_court_lfr/
-
He Who Controls the Key Controls the World Microsoft “Often” Provides BitLocker Keys to Law Enforcement
Encryption doesn’t guarantee privacy”, key ownership does. This article explains how cloud-stored encryption keys let third parties unlock your data, exposing the hidden risks behind “secure” services like BitLocker and Gmail. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/he-who-controls-the-key-controls-the-world-microsoft-often-provides-bitlocker-keys-to-law-enforcement/
-
Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns
Tags: access, authentication, backup, breach, business, china, cloud, control, corporate, credentials, data, endpoint, governance, government, group, india, infrastructure, law, mfa, microsoft, risk, service, technologyWhere most enterprises go wrong: Enterprises using BitLocker should treat the recovery keys as highly sensitive, and avoid default cloud backup unless there is a clear business requirement and the associated risks are well understood and mitigated.The safest configuration is to redirect those keys to on-premises Active Directory or a controlled enterprise key vault. Even…
-
Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns
Tags: access, authentication, backup, breach, business, china, cloud, control, corporate, credentials, data, endpoint, governance, government, group, india, infrastructure, law, mfa, microsoft, risk, service, technologyWhere most enterprises go wrong: Enterprises using BitLocker should treat the recovery keys as highly sensitive, and avoid default cloud backup unless there is a clear business requirement and the associated risks are well understood and mitigated.The safest configuration is to redirect those keys to on-premises Active Directory or a controlled enterprise key vault. Even…
-
Law Firm Investigates Coupang Security Failures Ahead of Class Action Deadline
The US law firm Hagens Berman will lead a class action lawsuit against Coupang over security failures that led to a June 2025 data breach First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/law-firm-coupang-security-failures/
-
Bill Gates-backed startup aims to revive Moore’s Law with optical transistors
Neurophos is developing a massive optical systolic array clocked at 56GHz good for 470 petaFLOPS of FP4 compute First seen on theregister.com Jump to article: www.theregister.com/2026/01/24/neurophos_hopes_to_revive_moores_law/
-
ICE Asks Companies About ‘Ad Tech and Big Data’ Tools It Could Use in Investigations
A new federal filing from ICE demonstrates how commercial tools are increasingly being considered by the government for law enforcement and surveillance. First seen on wired.com Jump to article: www.wired.com/story/ice-asks-companies-about-ad-tech-and-big-data-tools/
-
Microsoft Shared BitLocker Recovery Keys with the FBI to Unlock Encrypted Laptop Data
Microsoft has confirmed that it provided BitLocker encryption recovery keys to the FBI following a valid search warrant, marking the first publicly known case of the technology giant sharing encryption keys with law enforcement. The disclosure occurred after federal investigators in Guam requested access to three encrypted laptops believed to contain evidence of fraud in…
-
US punts renewal of threat data sharing law to September
US lawmakers have extended the Cybersecurity Information Sharing Act of 2015 for another nine months, buying time to enact a replacement for the legislation. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637737/US-punts-renewal-of-threat-data-sharing-law-to-September
-
Ransomware gang’s slip-up led to data recovery for 12 US firms
Tags: access, attack, backup, breach, business, citrix, cloud, corporate, cyber, data, data-breach, detection, encryption, endpoint, exploit, finance, group, incident response, infosec, infrastructure, law, linux, network, phishing, powershell, ransom, ransomware, risk, software, spear-phishing, sql, threat, tool, veeam, vulnerabilityscrutinize and audit your backups. If you have a regular backup schedule, is there unexpected or unexplained activity? Von Ramin Mapp notes that crooks are known to time data exfiltration to match corporate off-site backups as a way to hide their work;monitor for encrypted data leaving your environments and see where it goes. Does this…
-
US Officials Urge Congress to Reauthorize Key Quantum Law
Feds Warn US May Lose Quantum Race Without Sustained Research Funding. Federal scientists told Congress that failure to reauthorize the National Quantum Initiative threatens to unravel coordinated research and development progress, stall commercialization and allow China to surpass U.S. leadership as adversaries accelerate post-quantum capabilities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/us-officials-urge-congress-to-reauthorize-key-quantum-law-a-30585
-
Ireland plans law allowing law enforcement to use spyware
The Irish government plans to draft legislation that would make it legal for law enforcement to use spyware, Minister of Justice Jim O’Callaghan said. First seen on therecord.media Jump to article: therecord.media/ireland-plans-law-enforcement-spyware
-
House of Lords backs legislation to ban social media for children under 16
Tags: lawBritain’s House of Lords voted by an overwhelming margin to ban children under age 16 from accessing social media, setting up a vote on the law in the House of Commons. First seen on therecord.media Jump to article: therecord.media/house-lords-bans-social-media
-
Ireland proposes new law allowing police to use spyware
The Irish government announced that it wants to pass a law that would grant police more surveillance powers, such as using spyware to fight serious crime, while aiming to protect the privacy rights of its citizens. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/22/ireland-proposes-new-law-allowing-police-to-use-spyware/
-
Europe’s GDPR cops dished out Euro1.2B in fines last year as data breaches piled up
Regulators logged over 400 personal data breach notifications a day for first time since law came into force First seen on theregister.com Jump to article: www.theregister.com/2026/01/22/europes_gdpr_cops_dished_out/
-
Securing the Future: Practical Approaches to Digital Sovereignty in Google Workspace
Tags: access, attack, ciso, cloud, compliance, computing, container, control, data, defense, dora, email, encryption, GDPR, google, Hardware, healthcare, identity, infrastructure, law, malware, network, privacy, regulation, resilience, risk, service, software, strategy, zero-trustSecuring the Future: Practical Approaches to Digital Sovereignty in Google Workspace madhav Thu, 01/22/2026 – 04:35 In today’s rapidly evolving digital landscape, data privacy and sovereignty have become top priorities for organizations worldwide. With the proliferation of cloud services and the tightening of global data protection regulations, security professionals face mounting pressure to ensure their…
-
Breach Notifications in Europe Rise, While Fines Hold Steady
$1.4 Billion in Known Fines Levied in 2025, Despite Criticism From Outside EU. The volume of data breach notifications being issued to Europeans increased by one-fifth over the past year, while the total fines being imposed by data protection authorities held steady, adding up to 1.2 billion euros for the second year in a row,…
-
Supreme Court to consider whether geofence warrants are constitutional
The Supreme Court agreed to hear a case challenging the constitutionality of geofence warrants, which let law enforcement compel companies to provide the location data of cell phones at specific times and places. First seen on therecord.media Jump to article: therecord.media/supreme-court-geofence-constitutionality
-
Europe Readies Law to Eject Chinese Equipment From Telecoms
Revised Cybersecurity Act Would Also Boost ENISA. Countries across the EU could be forced to kick Chinese telecom manufacturers such as Huawei and ZTE out of their critical infrastructure supply chains, under a far-reaching proposal published by the European Commission on Tuesday. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/europe-readies-law-to-eject-chinese-equipment-from-telecoms-a-30566
-
Europe Readies Law to Eject Chinese Equipment From Telecoms
Revised Cybersecurity Act Would Also Boost ENISA. Countries across the EU could be forced to kick Chinese telecom manufacturers such as Huawei and ZTE out of their critical infrastructure supply chains, under a far-reaching proposal published by the European Commission on Tuesday. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/europe-readies-law-to-eject-chinese-equipment-from-telecoms-a-30566
-
Congressional appropriators move to extend information-sharing law, fund CISA
The legislation also includes mandates on election security funding and CISA staff levels, as well as an extension of a state and local cyber grant program. First seen on cyberscoop.com Jump to article: cyberscoop.com/congressional-appropriators-move-to-extend-information-sharing-law-fund-cisa/
-
Congressional appropriators move to extend information-sharing law, fund CISA
The legislation also includes mandates on election security funding and CISA staff levels, as well as an extension of a state and local cyber grant program. First seen on cyberscoop.com Jump to article: cyberscoop.com/congressional-appropriators-move-to-extend-information-sharing-law-fund-cisa/
-
UK launches landmark ‘Report Fraud’ service to tackle cybercrime and fraud
British authorities are rolling out Report Fraud, a platform intended to win back public trust over how law enforcement responds to widespread cybercrime and fraud. First seen on therecord.media Jump to article: therecord.media/uk-report-fraud-platform-launch-police-cybercrime
-
UK copyright law unfit for protecting creative workers from AI
As the UK government considers its approach to artificial intelligence and copyright, Computer Weekly explores the dynamics at play in copyright markets, and what measures can be taken to ensure that creatives are protected First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637299/UK-copyright-unfit-for-protecting-creative-workers-from-AI
-
Law enforcement tracks ransomware group blamed for massive financial losses
Law enforcement agencies in Ukraine and Germany have identified two members of a Russian-affiliated ransomware group and carried out searches in western Ukraine. Search … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/19/international-ransomware-group-investigation-ukraine/
-
The Year Ransomware Went Fully Decentralized: Cyble’s 2025 Threat Analysis
Cyble’s Annual Threat Landscape Report for 2025 documents a cybercrime environment that remained volatile even as international law enforcement agencies escalated disruption efforts. Large-scale takedowns, arrests, and infrastructure seizures failed to slow adversaries for long. Instead, cybercriminal ecosystems fractured, reorganized, and re-emerged across decentralized platforms, encrypted messaging channels, and invitation-only forums. The ransomware landscape, in particular, demonstrated a capacity…
-
Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?
In this episode, we explore Amazon Ring’s newly introduced Familiar Faces feature that utilizes AI for facial recognition. We discuss the convenience of identifying familiar people at your doorstep, the privacy concerns it raises, and the legal implications surrounding biometric data. Learn about how this feature works, potential inaccuracies, and privacy laws in certain U.S….…
-
EU and INTERPOL Hunt Black Basta Ransomware Kingpin, Suspects Identified in Ukraine
European and international law enforcement agencies have intensified their pursuit of individuals connected to the Black Basta ransomware operation. Authorities confirmed that the alleged leader of the Russia-linked ransomware-as-a-service (RaaS) group has been placed on both the European Union’s Most Wanted list and INTERPOL’s Red Notice, while Ukrainian and German investigators have identified two additional…
-
Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters
ICE protests surveillance yet uses tech to track citizens’ devices, possibly violating privacy laws and the Fourth Amendment, revealed through ICE’s data tools. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/whos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters/
-
UkraineGermany operation targets Black Basta, Russian leader wanted
Police in Ukraine and Germany identified Black Basta suspects and issued an international wanted notice for the group’s alleged Russian leader. Ukrainian and German police raided homes linked to alleged Black Basta ransomware members, identifying two Ukrainian suspects. Law enforcement also issued an international wanted notice for the group’s alleged Russian ringleader. >>The Office of…

