Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LinkedIn Under Scrutiny: Allegations of Privacy Invasion

LinkedIn Under Scrutiny: Allegations of Privacy Invasion

Posted on April 13, 2026 By CWS

LinkedIn, a Microsoft-owned company, is facing serious allegations of invading user privacy through what is being termed ‘BrowserGate’. Claims have emerged accusing LinkedIn of scanning users’ computers to gather information without consent, sparking widespread debate within the cybersecurity community.

The BrowserGate Controversy

The controversy, known as BrowserGate, has gained attention for its claims that LinkedIn is engaging in unauthorized computer scanning. Search results for ‘BrowserGate’ prominently display accusations of LinkedIn conducting corporate espionage, raising significant privacy concerns among users.

According to the BrowserGate exposé, LinkedIn has been accused of misleading EU regulators by not fully complying with the Digital Markets Act. Despite being designated as a regulated gatekeeper, LinkedIn is allegedly expanding its surveillance capabilities, contrary to the regulation’s intent.

Allegations of Surveillance

BrowserGate’s claims suggest that LinkedIn employs JavaScript to scan for thousands of browser extensions each time a user accesses the platform through a Chrome-based browser. The data collected is encrypted and transmitted to LinkedIn’s servers, potentially profiling users based on sensitive personal attributes.

LinkedIn, however, counters these claims by asserting that the data collection is solely for identifying extensions that violate its terms and to enhance site stability. The company denies using the data to infer personal information about its users.

Expert Analysis and Legal Concerns

Tyler Reguly, a security researcher, investigated the process and concluded that LinkedIn’s actions do not constitute malicious intent. He describes it as ‘resource probing’ to check for installed extensions, rather than an invasive scan of user devices.

Legal experts, however, caution that the legality of such data collection depends on jurisdiction and user consent. Without transparent disclosure and consent, LinkedIn’s actions might breach privacy laws, such as the GDPR, potentially resulting in legal ramifications.

Ultimately, Reguly believes that LinkedIn’s lack of communication about the process is the primary issue. He suggests that organizations should use the information about problematic extensions to enhance their cybersecurity measures.

This situation underscores the importance of transparency in data collection practices, highlighting the fine line between improving security and infringing on user privacy. It remains critical for LinkedIn to clarify its practices and ensure compliance with privacy laws to regain user trust.

Security Week News Tags:BrowserGate, corporate espionage, Cybersecurity, data protection, Extensions, GDPR, JavaScript, LinkedIn, Privacy, user consent

Post navigation

Previous Post: FBI and Indonesian Police Disrupt W3LL Phishing Scheme
Next Post: Maximize SOC ROI with Advanced Threat Intelligence

Related Posts

Why Sincerity Is a Strategic Asset in Cybersecurity Why Sincerity Is a Strategic Asset in Cybersecurity Security Week News
IoT Security Firm Exein Raises  Million  IoT Security Firm Exein Raises $81 Million  Security Week News
Chrome, Edge Extensions Caught Stealing ChatGPT Sessions Chrome, Edge Extensions Caught Stealing ChatGPT Sessions Security Week News
Adobe Addresses 44 Vulnerabilities in Software Update Adobe Addresses 44 Vulnerabilities in Software Update Security Week News
WatchGuard Patches Firebox Zero-Day Exploited in the Wild WatchGuard Patches Firebox Zero-Day Exploited in the Wild Security Week News
Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Phishing Attacks Exploit GitHub and Jira Notifications
  • Nginx 1.29.8 & FreeNginx Update Bolster Security
  • Maximize SOC ROI with Advanced Threat Intelligence
  • LinkedIn Under Scrutiny: Allegations of Privacy Invasion
  • FBI and Indonesian Police Disrupt W3LL Phishing Scheme

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Phishing Attacks Exploit GitHub and Jira Notifications
  • Nginx 1.29.8 & FreeNginx Update Bolster Security
  • Maximize SOC ROI with Advanced Threat Intelligence
  • LinkedIn Under Scrutiny: Allegations of Privacy Invasion
  • FBI and Indonesian Police Disrupt W3LL Phishing Scheme

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark