Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/ac/b1/14/acb11479-b940-5587-8756-0471b45c56d6/mza_11528295852167454444.jpg/600x600bb.jpg
The IT Privacy and Security Weekly Update.
R. Prescott Stearns Jr.
321 episodes
1 day ago
Into year five for this award-winning, light-hearted, lightweight IT privacy and security podcast that spans the globe in terms of issues covered with topics that draw in everyone from executive, to newbie, to tech specialist. Your investment of between 15 and 20 minutes a week will bring you up to speed on half a dozen current IT privacy and security stories from around the world to help you improve the management of your own privacy and security.
Show more...
Tech News
News
RSS
All content for The IT Privacy and Security Weekly Update. is the property of R. Prescott Stearns Jr. and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Into year five for this award-winning, light-hearted, lightweight IT privacy and security podcast that spans the globe in terms of issues covered with topics that draw in everyone from executive, to newbie, to tech specialist. Your investment of between 15 and 20 minutes a week will bring you up to speed on half a dozen current IT privacy and security stories from around the world to help you improve the management of your own privacy and security.
Show more...
Tech News
News
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/8957130/8957130-1736896711510-320cd6d6a9b8c.jpg
EP 264.5 deep dive Maps, Taps, and facial slaps. The IT Privacy and Security Weekly Update for October 28th 2025
The IT Privacy and Security Weekly Update.
17 minutes 51 seconds
5 days ago
EP 264.5 deep dive Maps, Taps, and facial slaps. The IT Privacy and Security Weekly Update for October 28th 2025

Technology, once a neutral servant, now increasingly operates according to hidden incentives-shaped by corporate interests, data extraction, and algorithmic autonomy-often against the user’s best interests. Across several examples, systems built for convenience expose deeper trends of control, deception, and surveillance that challenge the meaning of ownership and privacy.


A vivid instance comes from an iLife A11 smart vacuum whose owner blocked its telemetry data from being sent to foreign servers. In response, the manufacturer issued a remote “kill command,” disabling the device entirely. This was no bug-it was a deliberate assertion of corporate dominance over a purchased product. The episode reveals how “ownership” in the Internet of Things era is often conditional: users buy hardware but rent functionality subject to corporate approval.


Another case, the “Universe Browser,” illustrates how malicious actors co-opt privacy rhetoric. Marketed as a secure, privacy-first browser, it was in fact malware harvesting user data, logging keystrokes, and overriding protections. This inversion-using the language of security to enable surveillance-underscores the growing difficulty of distinguishing genuine tools from predatory ones.


Even legitimate corporations are not immune from enabling exploitation. A campaign called “CoPhish” weaponized Microsoft’s Copilot Studio, hosting phishing bots on genuine Microsoft domains. Users who trusted the “safe” Microsoft URL unknowingly interacted with malicious agents designed to steal personal data. This tactic erodes the basic cybersecurity habit of domain verification: when trusted infrastructure itself becomes compromised, safety heuristics fail.


Surveillance also seeps into professional spaces. Microsoft Teams recently added a feature allowing employers to detect and display an employee’s physical location whenever connected to company Wi-Fi. Marketed as a productivity feature, it effectively enables silent location tracking. While technically optional, it normalizes pervasive workplace monitoring and blurs the line between employee presence and personal autonomy.


Finally, generative AI is undermining the ethos of open-source software. Trained on public repositories, AI models often reproduce code without attribution or license-a phenomenon known as “license amnesia.” This strips creators of recognition and breaks the reciprocal cycle that sustains open-source collaboration. If left unchecked, AI-generated “laundered” code risks transforming a shared innovation commons into an extractive, one-way pipeline that benefits corporations without replenishing the community.


The IT Privacy and Security Weekly Update.
Into year five for this award-winning, light-hearted, lightweight IT privacy and security podcast that spans the globe in terms of issues covered with topics that draw in everyone from executive, to newbie, to tech specialist. Your investment of between 15 and 20 minutes a week will bring you up to speed on half a dozen current IT privacy and security stories from around the world to help you improve the management of your own privacy and security.