SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Reading: Questions raised about how LinkedIn uses the petabytes of data it collects – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > Software > Questions raised about how LinkedIn uses the petabytes of data it collects – Computerworld
Software

Questions raised about how LinkedIn uses the petabytes of data it collects – Computerworld

News Room
Last updated: April 9, 2026 2:59 am
News Room
Share
1 Min Read
SHARE

“Assuming the BrowserGate allegations are true, LinkedIn users should consider reducing the amount of identifiable, trackable, or sensitive data their browser exposes, and organizations should treat LinkedIn as a potentially hostile web environment until facts are verified,” Levine said. “Even if BrowserGate is exaggerated, browser fingerprinting is a real, widespread practice across the web. Treat LinkedIn like any other third-party data collector. LinkedIn has historically been treated as safe, [but] that assumption may need to be revisited.”

Levine said IT executives should “assume that LinkedIn can map your tech stack” and that, if the claims are accurate, LinkedIn could infer “which SaaS tools your employees use, which competitors you rely on, which job search tools your staff is using and which political/religious extensions appear inside your workforce.”

He added that IT should consider blocking LinkedIn on sensitive networks, or require it to only be accessed through VDI, as well as employing browser isolation techniques. Some companies might even want to use a separate isolated browser solely for LinkedIn, or, he said, “use a sandboxed browser session, such as Browserling or other cloud-isolated browsers.”

Read the full article here

You Might Also Like

Perplexity’s new Computer agent will run other agents for you – Computerworld

CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group – Computerworld

What’s the best office suite for business? – Computerworld

Don’t sleep on this powerful new Chrome security booster

IDC lowers its PC sales forecast again — and significantly – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

My first campaign in Europa Universalis 5 may have ruined the entire series for me

April 9, 2026
News

Microsoft 365 Copilot and the end of the single-model era in enterprise AI – GeekWire

April 9, 2026
Games

Graveyard Keeper 2 is coming this year, and the original is free to keep on Steam if you grab it now

April 9, 2026
News

AI Innovation of the Year finalists transform HR, retail, biotech and more – GeekWire

April 9, 2026
Games

Over the Hill devs are celebrating reaching 1 million Steam wishlists by giving you a chance to play the Mudrunner-like off-roader early

April 9, 2026
AI

Chrome, Vivaldi, and the challenge of changing browsers

April 9, 2026

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?