A Controversial Plan to Scan Private Messages for Child Abuse Meets Fresh Scandal

"I think it is fair to say that this was an attempt to influence public opinion in countries critical of the indiscriminate scanning of all digital communications of all EU citizens and to put pressure on the negotiators of these countries to agree to the legislation," says Meki?. "If the European Commission, a significant institution in the EU, can engage in targeted disinformation campaigns, it sets a dangerous precedent." The Dutch researcher's find adds to the controversy surrounding the Commission, which has recently come under fire due to allegations that certain AI firms and advocacy groups with significant financial backing have had a notable level of influence over the shaping of CSAR-allegations that lead Commissioner Ylva Johansson countered, asserting that she had committed no wrongdoing. Johansson's office did not respond to WIRED's request for comment. "There's an inexplicable obsession with this file [CSAR] in the Commission. I don't know where that comes from," EU lawmaker Sophie in 't Veld told WIRED after she submitted a priority parliamentary question on the case. "Why are they doing while the legislative process is still ongoing?". As the pressure on the Commission has been mounting, Johansson lashed out against the influential civil rights nonprofit European Digital Rights, one of the strongest critics of the legislation and a defender of end-to-end encryption. She referred to its funding from Apple, suggesting EDRi was laundering the company's talking points. "Apple was accused of moving encryption keys to China, which critics say could endanger customer data. Yet no one asks if these are strange bedfellows, no one assumes Apple is drafting EDRI's speaking points," she noted in a Commission blog on October 13. Referring to EDRi's independence and transparent funding processes, senior policy adviser Ella Jakubowska tells WIRED: "Attempts to delegitimize civil society suggest a worrying effort to silence critical voices, in line with broader trends of shrinking civic space. When both the content and the process regarding this law are so troubling, we need to ask how the European Commission allowed it to reach this point." Adding to the Commission's conspicuous ad campaign, Meki?'s discovery came on the same day the European Commission formally sent X a request for information under the Digital Services Act, the sweeping EU digital disinformation law, following indications of "Spreading of illegal content and disinformation" on the platform.

This Cyber News was published on www.wired.com. Publication date: Thu, 30 Nov 2023 23:19:27 +0000


Cyber News related to A Controversial Plan to Scan Private Messages for Child Abuse Meets Fresh Scandal

Incident Response Plan: How to Build, Examples, Template - A strong incident response plan - guidance that dictates what to do in the event of a security incident - is vital to ensure organizations can recover from an attack or other cybersecurity event and minimize potential disruption to company ...
9 months ago Techtarget.com
A Controversial Plan to Scan Private Messages for Child Abuse Meets Fresh Scandal - "I think it is fair to say that this was an attempt to influence public opinion in countries critical of the indiscriminate scanning of all digital communications of all EU citizens and to put pressure on the negotiators of these countries to agree ...
11 months ago Wired.com
Is TikTok Safe for Kids? - As the TikTok craze continues to spread worldwide, many parents wonder about the safety implications of the app their kids can't get enough of, particularly if their kids are on the younger side. TikTok features mature user content that may require ...
10 months ago Pandasecurity.com
Leak of Greek Diaspora Emails Shakes Government: A Closer Look - The recent leak of Greek diaspora emails has sent shockwaves through the conservative government of Prime Minister Kyriakos Mitsotakis. The scandal, which unfolded in March 2024, has raised questions about privacy, data protection, and political ...
7 months ago Cysecurity.news
Latest Information Security and Hacking Incidents - Private cloud providers may be among the primary winners of today's generative AI gold rush, as CIOs are reconsidering private clouds, whether on-premises or hosted by a partner, after previously dismissing them in favour of public clouds. At the ...
5 months ago Cysecurity.news
Meta's child safety challenges: A deep dive - Meta's top brands, including Facebook and Instagram, have lately been under fire for being unable to provide sufficient child safety measures on its social media platforms. Government reports, as well as media investigations coming predominantly from ...
10 months ago Pandasecurity.com
A Plan to Protect Critical Infrastructure from 21st Century Threats - On April 30th, the White House released National Security Memorandum-22 on Critical Infrastructure Security and Resilience, which updates national policy on how the U.S. government protects and secures critical infrastructure from cyber and ...
5 months ago Cisa.gov
Ensuring Online Safety for Your Child: Tips and Measures - In the digital landscape of 2024, children are spending significant amounts of time online, whether it's for educational purposes, gaming, or entertainment. With technology advancing rapidly, such as Apple's Vision Pro, maintaining constant ...
9 months ago Cysecurity.news
Government Quash All Post Office Horizon Convictions - It comes after the government in July 2021 had promised to compensate those postmasters who had their Horizon-related convictions overturned. The Government said this week it has committed to making sure these convictions are overturned by the end of ...
9 months ago Silicon.co.uk
Cybersecurity Crisis Management: Best Practices for Business Continuity - In the current security environment, cyber threats present an ever-increasing challenge for business organizations. To remain competitive, enterprises must implement strategies and protocols to manage cybersecurity crises and ensure business ...
1 year ago Tripwire.com
What's new in the MSRC Report Abuse Portal and API - The Microsoft Security Response Center has always been at the forefront of addressing cyber threats, privacy issues, and abuse arising from Microsoft Online Services. Building on our commitment, we have introduced several key updates to the Report ...
4 months ago Msrc.microsoft.com
Crafting an Effective Cyber Attack Response Plan: A Comprehensive Guide - In an era dominated by digital advancements, businesses and organizations face an ever-growing threat from cyber attacks. The importance of having a robust cyber attack response plan cannot be overstated. A well-crafted plan not only helps mitigate ...
10 months ago Cybersecurity-insiders.com
Free & Downloadable Cybersecurity Incident Response Plan Templates - An effective cybersecurity incident response plan can be the difference between a minor disruption and a major crisis. This article provides you with comprehensive IRP templates in PDF, Word, and Google Docs formats to ensure your organization can ...
9 months ago Heimdalsecurity.com
Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
10 months ago Techtarget.com
What Apple's Promise to Support RCS Means for Text Messaging - RCS will thankfully bring a number of long-missing features to those green bubble conversations in Messages, but Apple's proposed implementation has a murkier future when it comes to security. The RCS standard will replace SMS, the protocol behind ...
9 months ago Eff.org
Researchers Claim Design Flaw in Google Workspace Puts Organizations at Risk - Google is disputing a security vendor's report this week about an apparent design weakness in Google Workspace that puts users at risk of data theft and other potential security issues. According to Hunters Security, a flaw in Google Workspace's ...
11 months ago Darkreading.com
Marriott Leads the Way to Protect Children Online - Read how Marriott has rapidly deployed Cisco DNS-layer security across nearly 5,000 properties to advance human rights. For over 96 years, Marriott International, the world's largest hospitality company, has been Putting People First. Grounded in its ...
7 months ago Umbrella.cisco.com
Fighting European Threats to Encryption: 2023 Year in Review - In the online world, the best tool we have to defend this right is end-to-end encryption. Politicians across Europe attempted to undermine encryption, seeking to access and scan our private messages and pictures. EFF spent this year fighting hard ...
10 months ago Eff.org
CVE-2024-23649 - Lemmy is a link aggregator and forum for the fediverse. Starting in version 0.17.0 and prior to version 0.19.1, users can report private messages, even when they're neither sender nor recipient of the message. The API response to creating a ...
9 months ago
eSecurity Planet - Dashlane is a password management software that's popular for business and personal uses alike. Like many other password managers, Dashlane makes it easy for users to create new passwords and store existing ones in a secure vault. Internet security ...
9 months ago Esecurityplanet.com
Facebook Is Reportedly Struggling To Detect And Remove Child Abuse Content - Facebook has always had a hard time staying ahead of bad actors seeking to exploit the platform. The degree to which the company allegedly can't keep up is beyond disturbing. According to an explosive report this week from The Wall Street Journal, ...
11 months ago Facecrooks.com
The AI-Generated Child Abuse Nightmare Is Here - Over the course of September, analysts at the IWF focused on one dark web CSAM forum, which it does not name, that generally focuses on "Softcore imagery" and imagery of girls. Within a newer AI section of the forum, a total of 20,254 AI-generated ...
11 months ago Wired.com
How to Secure Your Kid's Android Device - After finding risky software on an Android device marketed for kids, we wanted to put together some tips to help better secure your kid's Android device. There's a handful of different tools, settings, and apps that can help better secure your kid's ...
11 months ago Eff.org
How to Conduct Incident Response Tabletop Exercises - An incident response tabletop exercise is an activity that involves testing the processes outlined in an incident response plan. Attack simulations are run to ensure incident response team members know their roles and responsibilities - and whether ...
9 months ago Techtarget.com
Data Breach Response: A Step-by-Step Guide - In today's interconnected world, organizations must be prepared to respond swiftly and effectively in the face of a data breach. To navigate these challenges, a well-defined and comprehensive data breach response plan is essential. Let's explore the ...
9 months ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)