Send us a text It starts with a strange letter in the mail. A car loan you never applied for. A credit card you don't own. A digital ghost is quietly living your life, and you have no idea how it got the keys. When you turn to one of the silent guardians of your financial identity for help, you find only chaos, confusion, and a company that seems to be a danger to itself. This week on Digital Fallout, we tell the true story of one of history's most catastrophic data breaches. It's a tale of s...
All content for Privacy Please is the property of Cameron Ivey and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text It starts with a strange letter in the mail. A car loan you never applied for. A credit card you don't own. A digital ghost is quietly living your life, and you have no idea how it got the keys. When you turn to one of the silent guardians of your financial identity for help, you find only chaos, confusion, and a company that seems to be a danger to itself. This week on Digital Fallout, we tell the true story of one of history's most catastrophic data breaches. It's a tale of s...
Send us a text It started with a few flickering screens in a Danish office. Within minutes, a digital plague had paralyzed global trade, leaving the world's largest shipping company powerless and its massive vessels adrift. But this attack wasn't for ransom—it was for pure destruction. In the premiere of Digital Fallout, we uncover the story of a geopolitical cyber weapon that escaped its cage and the unbelievable, accidental miracle that saved a global empire from permanent deletion. This is...
Send us a text We explore how cybercriminals fell victim to their own security mistakes and examine major attacks targeting corporate SharePoint environments. Privacy legislation advances with new protections for children and groundbreaking AI accountability measures in Minnesota. • Cybercrime forum exposes member data through database misconfiguration • SharePoint under active attack with remote code execution vulnerabilities • California passes enhanced children's privacy legislation...
Send us a text The US military has issued a stark warning to all forces to operate under the assumption that their networks have been compromised by Salt Typhoon, a sophisticated threat actor with ties to the Chinese government. This breach highlights the urgency for organizations to adopt Zero Trust principles as cyber warfare becomes the new battlefield. • Zero Trust is a framework, not a single product or technology • The first tenant of Zero Trust is treating networks as already compromi...
Send us a text The European Parliament has released a groundbreaking 175-page study concluding that AI companies' practice of training on copyrighted material without permission constitutes mass reproduction not covered by current laws. This study recommends transforming the landscape through an opt-in system, radical transparency requirements, and fair compensation models for creators whose work trains AI systems. • EU study reveals AI companies are treating the internet like a free "all-yo...
Send us a text Cameron and Gabe dive into Healthline Media's record-breaking $1.55 million settlement for CCPA violations, examining whether such penalties are sufficient deterrents against improper sharing of sensitive health data. • Healthline violated CCPA by sharing sensitive user health data with advertisers without proper consent • First U.S. regulatory action against a company for disclosing "inferred sensitive data" • Violation included failing to provide mechanisms to opt out of sen...
Send us a text Several popular Chrome extensions, including privacy and security tools, have been found leaking sensitive data through unencrypted HTTP and hard-coded credentials in their code. Security is both hard and easy - hard because of existing unencrypted protocols and trust placed in developers, but easy because fundamental security practices should be common knowledge in 2025. • Chrome extensions including DualSafe Password Manager and Avast Online Security are leaking sensitive us...
Send us a text We explore the recent LexisNexus data breach that exposed sensitive personal information of over 364,000 individuals through a third-party platform accessing their GitHub account. This incident highlights critical vulnerabilities in how data brokers handle our most sensitive information and raises questions about regulatory oversight. • Data exposed included names, date of birth, phone numbers, social security numbers, and driver's license numbers • The breach occurred when so...
Send us a text Gabe and Cameron dive into the unseen dangers of AI systems, exploring how inherent biases shape our perception and how prompt injection attacks pose serious security threats. • Generative AI models contain built-in biases based on their training data, favoring Western and particularly North American perspectives • A recent study shows ChatGPT-4 with personalization is more persuasive than humans 64.4% of the time • Most users accept AI outputs without questioning the underlyi...
Send us a text ProPublica's investigation reveals the National Shooting Sports Foundation has been secretly sharing gun buyers' personal information, including underwear sizes, for political purposes. This privacy breach raises serious concerns about data exploitation even in industries that publicly position themselves as defenders of individual rights. • Gun owners group demands federal investigation into firearms industry data sharing • Personal data shared included underwear sizes and wa...
Send us a text Privacy Please News, for hitting big topics quickly with a hint of sarcasm to bring some joy and knowledge. This week, we hit on the latest privacy events in tech with a satirical perspective on how your data is being shared, sold, and exploited. From Google's dramatic stance on sharing search data to state-sponsored hackers dominating zero-day exploits, this episode highlights the absurdity of our current digital privacy landscape. • Google CEO Sundar Pichai compares sh...
Send us a text Cameron and Gabe return after a brief hiatus to explore major developments in security, privacy, and resilience. They dive into insights from the IAPP conference and VeeamOn, examining how AI governance and outdated privacy tools are reshaping the industry landscape. • AI governance frameworks dominated IAPP discussions with companies "building the plane as they're flying" • Verizon's Data Breach Report debunks overblown AI security fears, showing real risks are data leakage a...
Send us a text Privacy threats continue to escalate as human error undermines even the most secure systems, from military officials accidentally exposing classified information to Russian hackers targeting encrypted messaging apps. • Signal security breach occurred when defense officials accidentally added a reporter to their encrypted group chat discussing sensitive military operations • Russian-linked attackers targeting Signal users through QR code vulnerabilities, tricking users into lin...
Send us a text Privacy threats are intensifying across multiple fronts, from genetic data vulnerabilities at 23andMe to corporate violations and messaging app security concerns. Cameron Ivey breaks down three urgent privacy issues and provides practical guidance on protecting your digital footprint in an increasingly vulnerable online landscape. • 23andMe users should consider deleting their genetic data immediately due to bankruptcy proceedings that could compromise privacy protections • La...
Send us a text We explore how uncertainty and chaos create both vulnerabilities and opportunities in privacy and security. Amid global turmoil, cybersecurity professionals must adopt a bias toward action to counter increased threats that thrive in chaotic environments. • Chaos serves as a smoke screen for malicious actors, just as DOS attacks once distracted from network intrusions • Recent Ghost ransomware attack affected 70 countries but received less attention due to global uncertainty • ...
Send us a text Today's episode dives into the intersection of AI behavior and digital security concerns. We discuss a startling incident involving a malfunctioning AI robot and explore a new ransomware threat known as Ghost. • Overview of an AI robot incident that raised ethical concerns • Examination of Asimov's Laws of Robotics and their relevance • Introduction to Ghost ransomware and its impact on multiple industries • Discussion on backup security strategies and ...
Send us a text The emergence of quantum computing presents a unique set of challenges and opportunities for data security and privacy. As Microsoft reveals its new quantum chip, the industry must prepare for the significant threats that stable quantum computing poses to existing encryption methods. • Microsoft announces a new quantum processing chip • Potential risks to encryption and data security • Industry skepticism toward claims of rapid advancements • Understand...
Send us a text The episode delves into the ongoing lawsuits challenging the sharing of personal data by federal agencies with Doge, the Department of Government Efficiency. The hosts discuss the implications of these lawsuits, particularly regarding the lack of clarity surrounding Doge's operations and the dismantling of the CFPB, raising concerns about privacy and data protection. • Overview of Doge data lawsuits and their significance • Concerns about data sharing by federal ag...
Send us a text The episode examines the implications of a recent hacking incident involving the Chinese AI company DeepSeek, which claims to outperform competitors on cost and performance. We discuss the risks associated with AI tools, the necessity for better governance, and the broader impacts of AI on cybersecurity and data privacy. • DeepSeek's emergence as a significant player in AI • Performance claims that challenge established tech firms • Consequences of the recent hack on ind...
Send us a textThe conversation centers on the evolving regulatory landscape amid a new administration, discussing the implications for data privacy and AI legislation. The episode emphasizes state-level movements and the potential for Congress to enact a cohesive national law while addressing emerging concerns around social media and technology.• Overview of the new administration's regulatory potential • Recent state-level data privacy laws and their implications • Importance of le...
Send us a textApple’s recent iOS update has raised serious privacy concerns by enabling AI tools that monitor user behavior without consent. The episode emphasizes the urgent need for users to disable invasive settings while questioning Apple's commitment to privacy amidst its marketing claims. • Examination of the AI features in the latest iOS update • Default settings that allow data collection on app usage • Discussion on Apple's reputation versus actual practices • Pot...
Send us a text It starts with a strange letter in the mail. A car loan you never applied for. A credit card you don't own. A digital ghost is quietly living your life, and you have no idea how it got the keys. When you turn to one of the silent guardians of your financial identity for help, you find only chaos, confusion, and a company that seems to be a danger to itself. This week on Digital Fallout, we tell the true story of one of history's most catastrophic data breaches. It's a tale of s...