
In yet another shameless story about breaching confidentiality, yesterday it was revealed that Google has been downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. This is no different to a story several weeks ago where delegates in a hotel in Israel were being spied upon using similar techniques on Windows, injected through malware within the hotel network.
In official statements, Google shrugged off the practice with what amounts to “we can do that”.
This is precisely why we developed BlackFog Privacy to protect individuals rights. We have now embedded microphone activation code so that you can be alerted when this sort of activity takes place. When will companies start to respect users privacy….
Related Posts
BlackFog Awarded 2025 MSP Today Product of the Year
BlackFog ADX wins 2025 MSP Today Product of the Year, recognizing its leadership in ransomware prevention and anti-data exfiltration.
Data Splicing vs. Traditional DLP: The New Threat for Enterprises
Explore how data splicing attacks bypass traditional DLP solutions and why ADX, with its real-time endpoint monitoring and AI based threat analysis, offers a powerful defense against advanced data exfiltration techniques.
Data Backup and Data Recovery: What Every Business Needs to Know
Understand these critical data backup and data recovery steps to reduce the risk of lengthy downtime following data loss.
DNS Exfiltration: How Hackers Use Your Network to Steal Data Without Detection
Learn how DNS exfiltration works and why this method of data theft often goes undetected.
How Do You Protect Yourself From Hackers? Proactive Strategies for Business Data Security
Follow these advanced data protection strategies to help protect your firm from hackers in an increasingly challenging environment.
5 Steps to a Disaster Recovery Plan That Protects Your Business
Follow these key steps to develop a data backup and recovery plan fit for the digital-first world.