None
<p>In this episode, we explore Amazon Ring’s newly introduced Familiar Faces feature that utilizes AI for facial recognition. We discuss the convenience of identifying familiar people at your doorstep, the privacy concerns it raises, and the legal implications surrounding biometric data. Learn about how this feature works, potential inaccuracies, and privacy laws in certain U.S. states. We also discuss broader concerns about AI and surveillance, and provide practical advice on using this technology responsibly.</p><p><strong>** Links mentioned on the show **</strong></p><p><strong>Ring Doorbells Can Now Identify Faces—But Experts Say It’s a Major Privacy Invasion. Here’s Everything You Need to Know</strong><br>
<a href="https://www.rd.com/article/ring-doorbells-facial-identification/">https://www.rd.com/article/ring-doorbells-facial-identification/</a></p><p><!-- notionvc: ae2b6536-287f-4dcb-89b2-fc14c9575985 --></p><p><!-- notionvc: 5c9611f2-5f49-4d60-bdd7-b69ebea22814 --></p><p><!-- notionvc: 17d9bc6d-8c44-4a36-9db1-17fde342d397 --></p><p><!-- notionvc: e3de0f66-e26f-4a06-b2a7-4816aa9d48a3 --></p><p><!-- notionvc: 91530a67-bb76-4ae0-bc72-6f9fa0abe6bd --></p><p><!-- notionvc: fc12dc07-4fad-4bf7-af27-608e52408c03 --></p><p><!-- notionvc: acf4c416-cc6b-426a-b4cd-4c9f66df6cb6 --></p><p><!-- notionvc: 88a160a5-1f28-444a-aacb-c577fab234c7 --><!-- notionvc: 4c797aac-e61c-4709-bfde-9b44b7533e21 --></p><p><!-- notionvc: 9c5c40e5-5031-4e60-8b50-66bc37374346 --></p><p><!-- notionvc: f403c979-1a0d-4041-9f6c-1d9d477f473e --></p><p><strong>** Watch this episode on YouTube **</strong></p><p><strong>** Become a Shared Security Supporter **</strong></p><p>Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Become a supporter today! <a href="https://patreon.com/SharedSecurity">https://patreon.com/SharedSecurity</a></p><p><strong>** Thank you to our sponsors! **</strong></p><p><strong>SLNT</strong></p><p>Visit <a href="https://www.avantlink.com/click.php?tt=cl&merchant_id=364b46a6-e620-4c44-bb24-6b4d59b0af40&website_id=430328bd-a1b1-499e-a241-f5aa426345c2&url=https%3A%2F%2Fslnt.com">slnt.com</a> to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.</p><p><strong>Click Armor</strong></p><p>To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: <a href="https://clickarmor.ca/sharedsecurity">https://clickarmor.ca/sharedsecurity</a></p><p><strong>** Subscribe and follow the podcast **</strong></p><p>Subscribe on YouTube: <a href="https://www.youtube.com/c/SharedSecurityPodcast">https://www.youtube.com/c/SharedSecurityPodcast</a></p><p>Follow us on Bluesky: <a href="https://bsky.app/profile/sharedsecurity.bsky.social">https://bsky.app/profile/sharedsecurity.bsky.social</a></p><p>Follow us on Mastodon: <a href="https://infosec.exchange/@sharedsecurity">https://infosec.exchange/@sharedsecurity</a></p><p>Join us on Reddit: <a href="https://www.reddit.com/r/SharedSecurityShow/">https://www.reddit.com/r/SharedSecurityShow/</a></p><p>Visit our website: <a href="https://sharedsecurity.net/">https://sharedsecurity.net</a></p><p>Subscribe on your favorite podcast app: <a href="https://sharedsecurity.net/subscribe">https://sharedsecurity.net/subscribe</a></p><p>Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: <a href="https://shared-security.beehiiv.com/subscribe">https://shared-security.beehiiv.com/subscribe</a></p><p>Leave us a rating and review: <a href="https://ratethispodcast.com/sharedsecurity">https://ratethispodcast.com/sharedsecurity</a></p><p>Contact us: <a href="https://sharedsecurity.net/contact">https://sharedsecurity.net/contact</a></p><p>The post <a href="https://sharedsecurity.net/2026/01/19/rings-facial-recognition-feature-convenience-or-privacy-nightmare/">Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?</a> appeared first on <a href="https://sharedsecurity.net/">Shared Security Podcast</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/rings-facial-recognition-feature-convenience-or-privacy-nightmare/" data-a2a-title="Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frings-facial-recognition-feature-convenience-or-privacy-nightmare%2F&linkname=Ring%E2%80%99s%20Facial%20Recognition%20Feature%3A%20Convenience%20or%20Privacy%20Nightmare%3F" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frings-facial-recognition-feature-convenience-or-privacy-nightmare%2F&linkname=Ring%E2%80%99s%20Facial%20Recognition%20Feature%3A%20Convenience%20or%20Privacy%20Nightmare%3F" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frings-facial-recognition-feature-convenience-or-privacy-nightmare%2F&linkname=Ring%E2%80%99s%20Facial%20Recognition%20Feature%3A%20Convenience%20or%20Privacy%20Nightmare%3F" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frings-facial-recognition-feature-convenience-or-privacy-nightmare%2F&linkname=Ring%E2%80%99s%20Facial%20Recognition%20Feature%3A%20Convenience%20or%20Privacy%20Nightmare%3F" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frings-facial-recognition-feature-convenience-or-privacy-nightmare%2F&linkname=Ring%E2%80%99s%20Facial%20Recognition%20Feature%3A%20Convenience%20or%20Privacy%20Nightmare%3F" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://sharedsecurity.net/">Shared Security Podcast</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Tom Eston">Tom Eston</a>. Read the original post at: <a href="https://sharedsecurity.net/2026/01/19/rings-facial-recognition-feature-convenience-or-privacy-nightmare/">https://sharedsecurity.net/2026/01/19/rings-facial-recognition-feature-convenience-or-privacy-nightmare/</a> </p>
As artificial intelligence integration accelerates within enterprises, the cybersecurity landscape is undergoing significant change, with machine identities now surpassing human users in many organizations. This shift, highlighted by Simon Tai, managing direc…
Save my User ID and Password
Some subscribers prefer to save their log-in information so they do not have to enter their User ID and Password each time they visit the site. To activate this function… [+307 chars]
The European Commission "has opened a public call for evidence on European open digital ecosystems," writes Help Net Security, part of preparations for an upcoming Communication "that will examine the role of open source in EU's digital infrastructure."
The …
"Europe must regain control over its software supply chain to safeguard freedom, security, and innovation," suggests an individual from Slovakia. Similar perspectives appear to be widely shared among… [+599 chars]
LA and Chicago square off in the final Divisional Round game of the NFL Playoffs. We'll show you how to watch Rams vs. Bears online.
Two franchises that squeezed through their respective Wild Card games meet in the Divisional Round in their bid for a spot at the NFC Championship game. Not sure where to catch this country-spanning … [+7288 chars]
Washington state residents may soon be forced to produce IDs before getting onto websites with pornographic content. Within the state's House of Representatives, Rep. Mari Leavitt introduced House Bill 2112, which is informally known as the Keep Our Children …
Washington state residents may soon be forced to produce IDs before getting onto websites with pornographic content. Within the state's House of Representatives, Rep. Mari Leavitt introduced House Bi… [+1477 chars]
For decades, Disneyland has been heralded as “The Happiest Place on Earth,” a meticulously curated sanctuary where families escape the stresses of the real world to immerse themselves in fantasy. However, that illusion of safety was nearly shattered recently …
For decades, Disneyland has been heralded as “The Happiest Place on Earth,” a meticulously curated sanctuary where families escape the stresses of the real world to immerse themselves in fantasy. How… [+7146 chars]
Houston heads to New England for the final Divisional Round game of the NFL Playoffs. We'll show you how to watch Texans vs. Patriots online.
The Divisional Round of the NFL Playoffs continues with another AFC showdown. Below, we've gathered everything you need to know about how to watch Texans vs. Patriots, including free global live stre… [+7512 chars]
The GTM Crisis: Solving Capital Inefficiency, The Black Box Barrier, and Execution Latency - Vertical Agentic Marketing Agencymatrixmarketinggroup.com
Unlock revenue growth by dismantling the GTM Trifecta. We analyze Capital Inefficiency, Black Box attribution, and Execution Latency with expert insights, stats, and actionable strategies for RevOps … [+17899 chars]
More than eight years into the modern era of artificial intelligence, the industry has moved past the awe of generative AI 1.0. The novelty is gone and in its place is scrutiny. Enterprises are less impressed by demos and more impatient about outcomes. Market…
More than eight years into the modern era of artificial intelligence, the industry has moved past the awe of generative AI 1.0.
The novelty is gone and in its place is scrutiny. Enterprises are less… [+44264 chars]
Elon Musk wants Tesla to iterate new AI accelerators faster than AMD and Nvidia. This can be done, but with caveats.
Nvidia tends to release its AI GPUs at an annual cadence, which keeps the company ahead of all rivals. AMD has invested a lot to keep up, so it also launches new AI accelerators on a yearly rhythm. A… [+3832 chars]
It follows Trump's threats to use 'economic force' to make Canada the 51st state.
To adapt, Canada must be pragmatic, he added. That means we have to understand the differences between Canada and other countries and then focus our efforts to work together where were aligned, and i… [+7788 chars]
Tata Consultancy Services’ (TCS) workforce declined by more than 25,800 employees so far in FY26, taking its total headcount to 5,82,163 at the end of the December quarter
Indian IT services firms continue to show a cautious and uneven approach to hiring, with Q3 headcount trends underscoring a shift away from broad-based workforce expansion toward selective additions … [+3351 chars]
The challenge for British security leaders is no longer whether NCSC guidance on credential management is sound, but how to operationalize it effectively.
Despite years of public awareness campaigns, repeated high-profile breaches and ongoing regulatory scrutiny, the use of weak, guessable passwords such as “admin” and “123456” persists in the UK. This… [+6919 chars]
Client demand resurgence boosts IT deal pipeline in Q3, with strong growth in large cap firms and AI-driven investments
Deal wins for large cap IT companies in India grew 12.8 per cent annually and 1.7 per cent sequentially in the December-ending quarter, as clients take decisive action despite global uncertainty.
In… [+4420 chars]
Wire Services report: One more reason things cost more today: cybercrime. A survey by the Identity Theft Resource Center, a San Diego-based education and victim resource nonprofit, found that 38% of small businesses hit by a cyberscam or breach in the previou…
One more reason things cost more today: cybercrime.
A survey by the Identity Theft Resource Center, a San Diego-based education and victim resource nonprofit, found that 38% of small businesses hit … [+755 chars]
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Ukraine–…
Security Affairs newsletter Round 559 by Pierluigi Paganini INTERNATIONAL EDITION
Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
International Press … [+2496 chars]
According to the World Economic Forum’s Report released January 2026, the upcoming meeting on the 18th will highlight instability via: Geoeconomic confrontation, state-based armed conflict, extreme weather events, and societal polarization. Economic risks ar…
According to the World Economic Forums Report released January 2026, the upcoming meeting on the 18th will highlight instability via: Geoeconomic confrontation, state-based armed conflict, extreme we… [+5571 chars]
Senior politicians want the EU to deploy its trade bazooka against the United States over Trump's Greenland claims. Capitals aren't so sure.
With European ambassadors set to convene on Sunday for an emergency meeting to discuss how to respond to the latest tariffs, one EU official told POLITICO that the appetite for such a blow-up was lik… [+1493 chars]
Exlservice Holdings is set to open two new centers in smaller Indian cities this year. The data and AI company aims to tap into better infrastructure and talent outside major metros. This expansion aligns with rising global IT spends focused on AI, infrastruc…
Nasdaq-listed Exlservice Holdings plans to set up two new centres in tier-2 or tier-3 Indian cities this year, as the data and artificial intelligence (AI) company looks to tap infrastructure and tal… [+4475 chars]
Internet monitor FilterWatch warns that authorities are trying to cut the country off from international connectivity.
Joe Tidy,BBC cybersecurity correspondentand
Farshad Bayan,BBC Persian
Iran is 10 days into one of the most extreme internet shutdowns in history, with 92 million citizens cut off from all internet … [+7742 chars]
A cybersecurity breakdown at a digital payments firm is affecting hundreds of thousands of Americans. GSPlatformCo Inc., which manages payment processing, tax compliance and customer billing for online marketplaces, says hackers accessed a system containing c…
A cybersecurity breakdown at a digital payments firm is affecting hundreds of thousands of Americans.
GSPlatformCo Inc., which manages payment processing, tax compliance and customer billing for onl… [+1225 chars]
TL;DR: Build real-world cybersecurity skills with The All-in-One Super-Sized Ethical Hacking Bundle for $35.99—lifetime access (MSRP $1,098). Seats are filling up, but codes are still available.
The tech job market feels shakier than it has in years, and…
Skip to contentWhen you purchase through links in our articles, we may earn a small commission. This doesn't affect our editorial independence
.
TL;DR: Build real-world cybersecurity skills with Th… [+1376 chars]
An initiative of the Ministry of Education, SWAYAM allows students, professionals, among others, to upskill, reskill and learn without considering age or finances as barriers. These free video courses are taught by India's finest institution and their profess…
The Study Webs of Active-Learning for Young Aspiring Minds (SWAYAM) will start fresh registration from January 19 onwards for those who want to upskill themselves. An initiative of the Ministry of Ed… [+6583 chars]
The European Commission is stepping up its efforts behind open-source software, rolling out a new open ecosystem strategy to support EU technological sovereignty, competitiveness and cybersecurity. Building on President von der Leyen’s political guidelines, t…
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
Download Sample Get Special Discount Asia Pacific Drip Email Marketing Market Size, Strategic Outlook & Forecast 2026-2033Market size (2024): 3.7 billion USDForecast (2033): 9.
Download Sample Get Special Discount
Asia Pacific Drip Email Marketing Market Size, Strategic Outlook & Forecast 2026-2033Market size (2024): 3.7 billion USDForecast (2033): 9.6 billion USDCAG… [+24111 chars]