🎙️ In This Week’s Episode – 💥 Data breaches everywhere, 📺 LG TVs force Copilot, 🧑💼 Insider access failures
LG Copilot Update, Widespread Data Breaches, and Travel Privacy Fears
Hi, it's Ant!
This week on The Awareness Angle, I am on my own, and there is a lot to get through. Data breaches are everywhere, from forgotten accounts and simple misconfigurations to ransomware hitting pharma firms and exposing sensitive data. I look at how software updates are being abused to push malware, why Apple has rushed out fixes for active zero-days, and what it means when governments start accusing each other of cyber attacks on critical infrastructure.
I also dig into LG quietly pushing Microsoft Copilot onto smart TVs without a clear opt-out, raising some big questions about privacy and control in our own homes. And finally, there is a proposal in the US that could see travellers handing over years of social media just to get through the border.
All of that and more in this week’s Awareness Angle. It is just me this time as Luke's on his holidays, so let’s get straight into it.
Listen on your favourite podcast platform - Spotify, Apple Podcasts and YouTube
Listen Now
Podcast · Risky CreativeThis week's stories...
LG smart TVs quietly get Microsoft Copilot
LG has pushed Microsoft Copilot onto a range of smart TVs via a routine firmware update, installing it as a system-level feature with no obvious way to remove it. It just appears. For a lot of people, this is not about Copilot being good or bad, it is about something being added to a device in their living room without being asked.
What really sits underneath this is control and data. Smart TVs already collect a lot of viewing and usage information, and adding an AI assistant only raises more questions about what is being gathered and where it goes. It is the same pattern we have seen with cars, phones, and other “smart” devices, once the hardware is in your home, the software can keep changing.
The Awareness Angle
- Control after purchase – Buying hardware should not mean surrendering future decisions.
- Data follows features – New functionality usually comes with new data flows.
- Question connected defaults – Not everything needs to be online all the time.
US may require travellers to hand over social media history
The US is proposing changes to its visa waiver process that could require travellers to provide up to five years of social media history, along with contact details and other personal information. This would apply to people travelling from countries like the UK who currently enter visa-free, often for work, conferences, or holidays.
I am not suggesting people have anything to hide, but it does raise an uncomfortable question about where the line sits. Online posts, likes, and opinions suddenly become part of a border decision. With major global events coming up in the US, it will be interesting to see how many people rethink travel if this goes ahead.
The Awareness Angle
- Privacy versus security – Extra checks always come with trade-offs.
- Digital history becomes identity – Old posts can gain new meaning at borders.
- Friction changes behaviour – More intrusive processes discourage travel.
Millions exposed by third-party data breaches
This week’s breaches include a credit-checking firm and a veterinary services provider, exposing millions of records through a mix of poor access control and simple misconfiguration. In many cases, the people affected never chose to trust these organisations, their data was just passed along as part of the background machinery of modern services.
This is why third-party risk feels so unfair at a personal level. You can be careful, you can follow advice, and you still end up dealing with the fallout because someone else made a mistake. Identity data cannot be changed, and once it is out there, it stays out there.
The Awareness Angle
- Invisible trust chains – Your data moves far beyond the companies you recognise.
- Long tail impact – Identity exposure lasts longer than headlines.
- Basic hygiene still matters – Most damage comes from simple failures.
Pharma firm hit by ransomware and data theft
A pharmaceutical research firm has confirmed it was hit by ransomware after attackers accessed and stole data before locking systems. This is now the standard playbook. Get in, take what you can, then encrypt everything and demand payment for both silence and recovery.
We still talk about ransomware as if it is mainly about downtime, but the real damage is often the data loss. In sectors like pharma and healthcare, that data can be sensitive, regulated, and tied to real people. Even when systems come back, the risk does not disappear.
The Awareness Angle
- Ransomware is about leverage – Stolen data changes the pressure entirely.
- Backups reduce pain, not risk – Recovery does not undo exposure.
- Early access is the weak point – Phishing and stolen credentials remain common entry routes.
This Week's Discussion Points...
Coupang breach traced to ex-employee access - Watch | Read (BleepingComputer)
Credit check company breach exposes millions - Watch | Read (Tom’s Guide)
Petco Vetco website data exposure - Watch | Read (TechCrunch)
Inotiv ransomware attack and data theft - Watch | Read (BleepingComputer)
Apple emergency zero-day updates - Watch | Read (The Hacker News)
Notepad++ malicious update flaw - Watch | Read (BleepingComputer)
LG TVs install Microsoft Copilot - Watch | Read (WebProNews)
Germany accuses Russia of air traffic control cyber attack - Watch | Read (BBC News)
Pringles account breach and password reuse - Watch | Read (Reddit)
Harley Sugarman's Elsbeth TV show phishing simulation - Watch | Read (LinkedIn)
US proposal to collect travellers’ social media history - Watch | Read (TikTok)
And Finally...Pringles Popped
This week, someone shared a screenshot of a Google warning telling them their password for the Pringles website had been exposed in a data breach. And yes, that raises the obvious question: why does anyone even have a Pringles account?
But that is precisely the point.
Most of us now have hundreds of online accounts. Brand sites, loyalty schemes, competitions, things we signed up for once and never thought about again. We forget they exist, but attackers do not.
When one of those random accounts gets breached, it is not about crisps. It is about whether that same password works anywhere else. Email, shopping, social media, and work tools. That is where the real damage happens.
So laugh at the Pringles account if you want, but it is a perfect reminder that password reuse is still one of the biggest risks out there. If your brain cannot remember every account you have, it should not be trying to remember every password either.
That is why password managers matter, even for the silly stuff.












