Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Search
Content type:
Examples
LA police ask Ring owners for footage of protests against police violence
22nd June 2022
Content type:
Explainer
An introduction to software updates (and why they matter)
29th October 2021
Content type:
Report
Smart Cities: Utopian Vision, Dystopian Reality
31st October 2017
Content type:
Report
Connected Cars: What Happens To Our Data On Rental Cars?
6th December 2017
Content type:
News & Analysis
Protecting Innovations and Protecting Data: Can we have surveillance and innovation?
1st August 2016
Content type:
News & Analysis
Why the Internet of Things Begs for a Paradigm Shift in Internet Security
2nd November 2016
Content type:
Examples
As Finland freezes DDoS attack paralyses heating systems
1st December 2017
Content type:
News & Analysis
Is Your Car Connected?
3rd April 2017
Content type:
Examples
Garadget punishes complaining customer with lockout
1st December 2017
Content type:
Examples
Fitbit data tests murder suspect's alibi
1st December 2017
Content type:
Examples
Lawsuit alleges that Bose headphones spy on users
1st December 2017
Content type:
Case Study
Case Study: The Myth of Device Control and the Reality of Data Exploitation
30th August 2017
Content type:
Case Study
Case Study: Connected Cars and the Future of Car Travel in the Digital Age
30th August 2017
Content type:
Case Study
Case Study: The Myth of Free Wi-Fi
1st December 2017
Content type:
Advocacy
Submissions to the UK and EU competition authorities on the Amazon/iRobot merger
23rd May 2023
Content type:
Advocacy
Our position on the EU Cyber Resilience Act (CRA)
2nd May 2023
Content type:
Report
We looked into the software support practices for 5 of the most popular smart devices (and the results may disappoint you)
20th October 2022
Content type:
Press release
Privacy International research shows that smart device security updates fail to meet consumers' expectations
20th October 2022
Content type:
Advocacy
PI's proposed amendments to the draft Directive on empowering consumers for the green transition
10th October 2022
Content type:
Examples
Coronavirus brings new wave of workplace surveillance
20th May 2020
Content type:
Examples
Smartphones, laptops, IoT devices vulnerable to new BIAS Bluetooth attack
19th May 2020
Content type:
Examples
Apple health data used in a rape and murder investigation
12th July 2019
Content type:
Examples
Australia: Apple Watch data assist in a murder investigation
12th July 2019
Content type:
Examples
Police Use Fitbit Data to Charge 90-Year-Old Man with murder
12th July 2019
Content type:
Examples
iPhone health app data used to uncover a murder plot in the UK
12th July 2019
Content type:
Examples
Pacemaker data used in court
12th July 2019
Content type:
Examples
New Hampshire double murder case in another Amazon Echo case
17th May 2019
Content type:
News & Analysis
The mystery of the Amazon Echo data
17th April 2019
Content type:
Examples
Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange
1st April 2020
Content type:
Examples
Design flaw leaves Bluetooth devices vulnerable
1st April 2020
Pagination
Current page
1
Page
2
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join