
In yet another shameless story about breaching confidentiality, yesterday it was revealed that Google has been downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. This is no different to a story several weeks ago where delegates in a hotel in Israel were being spied upon using similar techniques on Windows, injected through malware within the hotel network.
In official statements, Google shrugged off the practice with what amounts to “we can do that”.
This is precisely why we developed BlackFog to protect individuals rights. We have now embedded microphone activation code so that you can be alerted when this sort of activity takes place.
Share This Story, Choose Your Platform!
Related Posts
Stopping Akira Through BlackFog’s Prevention-First Strategy
Akira is ransomware targeting infrastructure and endpoints at scale. BlackFog counters it with monitoring and exfiltration prevention.
The State of Ransomware 2025
BlackFog's state of ransomware report 2025 measures publicly disclosed and non-disclosed attacks globally.
5 Ways Large Language Models (LLMs) Enable Data Exfiltration
Explore how LLMs like GPT-5 enable data exfiltration through prompt injection, RAG abuse, memory leaks, tool misuse, and fine-tuning exposure, and how to stop it.
BlackFog Expands ADX Platform with Launch of ADX Vision to Combat Shadow AI Threats
BlackFog launches ADX Vision, expanding its ADX platform to help enterprises combat Shadow AI as 49% of employees use unsanctioned AI tools.
The Importance Of Effective Cloud Security Architecture: What To Know For 2026
What must firms consider when building cloud security architecture that's fit for the modern era of computing?
Why Attack Surface Management Matters Now More Than Ever
What key challenges do companies face as networks expand and their attack surface grows, increasing the need for effective attack surface management?






