Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LinkedIn Under Scrutiny: Allegations of Privacy Invasion

LinkedIn Under Scrutiny: Allegations of Privacy Invasion

Posted on April 13, 2026 By CWS

LinkedIn, a Microsoft-owned company, is facing serious allegations of invading user privacy through what is being termed ‘BrowserGate’. Claims have emerged accusing LinkedIn of scanning users’ computers to gather information without consent, sparking widespread debate within the cybersecurity community.

The BrowserGate Controversy

The controversy, known as BrowserGate, has gained attention for its claims that LinkedIn is engaging in unauthorized computer scanning. Search results for ‘BrowserGate’ prominently display accusations of LinkedIn conducting corporate espionage, raising significant privacy concerns among users.

According to the BrowserGate exposé, LinkedIn has been accused of misleading EU regulators by not fully complying with the Digital Markets Act. Despite being designated as a regulated gatekeeper, LinkedIn is allegedly expanding its surveillance capabilities, contrary to the regulation’s intent.

Allegations of Surveillance

BrowserGate’s claims suggest that LinkedIn employs JavaScript to scan for thousands of browser extensions each time a user accesses the platform through a Chrome-based browser. The data collected is encrypted and transmitted to LinkedIn’s servers, potentially profiling users based on sensitive personal attributes.

LinkedIn, however, counters these claims by asserting that the data collection is solely for identifying extensions that violate its terms and to enhance site stability. The company denies using the data to infer personal information about its users.

Expert Analysis and Legal Concerns

Tyler Reguly, a security researcher, investigated the process and concluded that LinkedIn’s actions do not constitute malicious intent. He describes it as ‘resource probing’ to check for installed extensions, rather than an invasive scan of user devices.

Legal experts, however, caution that the legality of such data collection depends on jurisdiction and user consent. Without transparent disclosure and consent, LinkedIn’s actions might breach privacy laws, such as the GDPR, potentially resulting in legal ramifications.

Ultimately, Reguly believes that LinkedIn’s lack of communication about the process is the primary issue. He suggests that organizations should use the information about problematic extensions to enhance their cybersecurity measures.

This situation underscores the importance of transparency in data collection practices, highlighting the fine line between improving security and infringing on user privacy. It remains critical for LinkedIn to clarify its practices and ensure compliance with privacy laws to regain user trust.

Security Week News Tags:BrowserGate, corporate espionage, Cybersecurity, data protection, Extensions, GDPR, JavaScript, LinkedIn, Privacy, user consent

Post navigation

Previous Post: FBI and Indonesian Police Disrupt W3LL Phishing Scheme
Next Post: Maximize SOC ROI with Advanced Threat Intelligence

Related Posts

Brightspeed Investigating Cyberattack – SecurityWeek Brightspeed Investigating Cyberattack – SecurityWeek Security Week News
Airport Cyberattack Disrupts More Flights Across Europe Airport Cyberattack Disrupts More Flights Across Europe Security Week News
Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks Security Week News
Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM Security Week News
Cyber Insights 2026: Malware and Cyberattacks in the Age of AI Cyber Insights 2026: Malware and Cyberattacks in the Age of AI Security Week News
Cyber Insights 2026: Regulations and the Tangled Mess of Compliance Requirements Cyber Insights 2026: Regulations and the Tangled Mess of Compliance Requirements Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Nginx 1.29.8 & FreeNginx Update Bolster Security
  • Maximize SOC ROI with Advanced Threat Intelligence
  • LinkedIn Under Scrutiny: Allegations of Privacy Invasion
  • FBI and Indonesian Police Disrupt W3LL Phishing Scheme
  • Mozilla Critiques Microsoft’s Copilot Installation Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Nginx 1.29.8 & FreeNginx Update Bolster Security
  • Maximize SOC ROI with Advanced Threat Intelligence
  • LinkedIn Under Scrutiny: Allegations of Privacy Invasion
  • FBI and Indonesian Police Disrupt W3LL Phishing Scheme
  • Mozilla Critiques Microsoft’s Copilot Installation Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark