
In yet another shameless story about breaching confidentiality, yesterday it was revealed that Google has been downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. This is no different to a story several weeks ago where delegates in a hotel in Israel were being spied upon using similar techniques on Windows, injected through malware within the hotel network.
In official statements, Google shrugged off the practice with what amounts to “we can do that”.
This is precisely why we developed BlackFog to protect individuals rights. We have now embedded microphone activation code so that you can be alerted when this sort of activity takes place.
Share This Story, Choose Your Platform!
Related Posts
Managing Ransomware Remediation To Reduce Long-Term Damage
What key steps must organizations follow to ensure effective ransomware remediation in the event of a data breach?
Developing A Ransomware Backup Strategy Your Business Can Trust
A clear ransomware backup strategy is a critical part of any firm's defenses. Here's what you need to know.
Ransomware Protection: A Complete Guide To Preventing Modern Attacks
What must all firms know in order to improve their ransomware protection strategy for the threats of 2026?
Double Extortion Ransomware: What It Is, How It Works And How To Prevent It
What is double extortion ransomware and what should firms know in order to protect against this threat?
Shadow AI And The Expanding Enterprise Attack Surface
Shadow AI is expanding the enterprise attack surface. Learn how unsanctioned AI use drives data leakage risks and why real-time prevention is needed.
How to Prevent Ransomware Attacks: Key Practices to Know About
Are you aware of the differences between data privacy vs data security that may impact how you develop a comprehensive protection strategy






