Your “smart” TV is a dumb idea

Your “smart” TV is a dumb idea

Let’s start with a basic rundown of the critical features most people look for in a new television: Screen size: We can almost stop the list right here.

Login With Facebook, Google or AT&T? Thanks, but No Thanks

Login With Facebook, Google or AT&T? Thanks, but No Thanks

There's more: Project Verify is better than the Facebook and Google SSOs because it's going to be checked against your mobile SIM card, phone number, user credentials, account tenure and phone account type (info only your wireless carrier has).

Antitrust case against Google similar to Microsoft's: Mississippi AG

Antitrust case against Google similar to Microsoft's: Mississippi AG

"We attorneys general have authority under consumer protection acts to do both," Hood said on "The Exchange." "So it'll be a multifaceted suit or, hopefully, we can get a settlement if we can get some agreement with them." Several state attorneys generals recently spoke about their willingness to go after the likes of , Google and other tech giants in interviews with The Washington Post .

Free Phishing Test

Free Phishing Test

All you need to do is to enter your website name to make a comprehensive search of any malicious, counterfeiting and squatting websites that impersonate your digital identity, brand name or trademarks: Phishing Test First Screen First section of the report is dedicated to cybersquatting — all possible variations of squatted domains that use your brand or company name.

The government uses images of vulnerable people to test facial recognition software.

The government uses images of vulnerable people to test facial recognition software.

When a company, university group, or developer wants to test a facial recognition algorithm, it sends that software to NIST, which then uses the full set of photograph collections to determine how well the program performs in terms of accuracy, speed, storage and memory consumption, and resilience.

Exploding sneakers are only one reason for passing IoT cyber-security regulations

Exploding sneakers are only one reason for passing IoT cyber-security regulations

Sometimes shipped with factory-set, hardcoded passwords and often unable to be updated or patched, IoT devices can represent a weak point in a network’s security, leaving the rest of the network vulnerable to attack Hacker-created IoT botnets can direct enormous swarms of connected sensors like thermostats or sprinkler controllers to cause damaging and unpredictable spikes in infrastructure use, leading to things like power surges or reduced availability of critical infrastructure on a city or state-wide level.

Why You Should Be Worried about Online Ad Tracking (Step-By-Step Guide to Stop It)

Why You Should Be Worried about Online Ad Tracking (Step-By-Step Guide to Stop It)

Open Settings Go to Privacy Select Advertising Toggle the Limit Ad Tracking switch Even if you turn this feature off, Apple can still collect data about you to send ads in the right language and for the right location.

EU member state websites laden with third-party cookies

EU member state websites laden with third-party cookies

A new report (PDF) reveals that the vast majority of EU member state websites are laden with third-party cookies that are not disclosed to visitors. Third-party service plugins and embeds are the main way in which trackers landed on government and public health sector websites according to the report.

Now sites can fingerprint you online even when you use multiple browsers

Now sites can fingerprint you online even when you use multiple browsers

"From the negative perspective, people can use our cross-browser tracking to violate users' privacy by providing customized ads," Yinzhi Cao, the lead researcher who is an assistant professor in the Computer Science and Engineering Department at Lehigh University, told Ars.

How much privacy do you have left on the web?

How much privacy do you have left on the web?

The former requires providing your mobile phone number which is immediately tied to your real-life identity — more on that soon. So it seems that having your accounts linked to your real-life identity via your mobile phone number is usually unavoidable even if it’s not the same number you normally use.

Slack hands over control of encryption keys to regulated customers

Slack hands over control of encryption keys to regulated customers

Slack announced today that it is launching Enterprise Key Management (EKM) for Slack, a new tool that enables customers to control their encryption keys in the enterprise version of the communications app.

Airplane seat cameras: US senators raise concerns

Airplane seat cameras: US senators raise concerns

'Standard feature' Concerns about seatback cameras have prompted a response from two US senators.Courtesy American Airlines American Airlines told CNN Travel in early March that cameras are "a standard feature," but not activated and that the carrier has no plans to use them.

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI If you are new to LOKI, the Australian project is self described on their landing page as a “privacy network which will allow users to transact and communicate privately over the internet, providing a suite of tools to help maintain the maximum amount of anonymity possible while browsing, transacting and communicating online”.

Nevada considers technology to scan cellphones after crashes

Nevada considers technology to scan cellphones after crashes

(AP) — Most states ban texting behind the wheel, but a legislative proposal could make Nevada one of the first states to allow police to use a contentious technology to find out if a person was using a cellphone during a car crash.

Trading privacy for survival is another tax on the poor

Trading privacy for survival is another tax on the poor

“I can’t cross-examine an algorithm.” advertisement Personal data is used to deny low-income people access to resources or opportunities, but it’s also used to target them with predatory marketing for payday loans or even straight-up scams.

Why Phone Numbers Stink As Identity Proof — Krebs on Security

Why Phone Numbers Stink As Identity Proof — Krebs on Security

Nixon said countless companies have essentially built their customer authentication around the phone number, and that a great many sites still let users reset their passwords with nothing more than a one-time code texted to a phone number on the account.

Facial recognition overkill: How deputies cracked a $12 shoplifting case

Facial recognition overkill: How deputies cracked a $12 shoplifting case

WCSO Via public records requests, CNET reviewed seven sheriff's office reports that showed facial recognition being put to use in making an arrest. Deputy Jeff Talbot, Washington County's public information officer, said WCSO has made arrests on "crimes on multiple levels" using Rekognition, not just minor offenses.

Search The Thousands Of Disaster Buyouts FEMA Didn't Want You To See

Search The Thousands Of Disaster Buyouts FEMA Didn't Want You To See

Investigations How Federal Disaster Money Favors The Rich NPR analyzed records from a Federal Emergency Management Agency database of more than 40,000 property acquisitions, or "buyouts," funded by the agency from 1989 through 2017.

A huge trove of medical records and prescriptions found exposed

A huge trove of medical records and prescriptions found exposed

According to a brief review of the data, the faxes contained a host of personally identifiable information and health information, including medical records, doctor’s notes, prescription amounts and quantities, as well as illness information, such as blood test results.

Google’s Nest fiasco harms user trust and invades their privacy

Google’s Nest fiasco harms user trust and invades their privacy

But, following a trust-shattering move by Google last month regarding its Nest Secure product, consensus on one issue has emerged: Companies shouldn’t ship products that can surreptitiously spy on users.

Google rolls out privacy tool for AI developers

Google rolls out privacy tool for AI developers

Google has released the TensorFlow Privacy tool, an update to its open source TensorFlow machine learning framework, that will allow developers to enhance the privacy of their AI ( artificial intelligence ) models. The use of differential privacy essentially means that AI models trained on user data can’t encode personally identifiable information.

Why the Debate Over Privacy Can't Rely on Tech Giants

Why the Debate Over Privacy Can't Rely on Tech Giants

It’s clear after this hearing that companies who deliberately over-collect data and sidestep user privacy are making a business choice, and they could choose to operate differently. Freshman Sen. Josh Hawley asked DeVries whether users can fully turn off all Google’s location tracking services on their Android phones.

Facebook is helping Intel design their next processor

Facebook is helping Intel design their next processor

Facebook is working with Intel to improve its upcoming Copper Lake processors. The company is helping Intel add a touch of deep learning to the Copper Lake processors to improve the performance. Intel is expected to release the Copper Lake processors later this year.

The unauthorized sale of your health data is coming to an end

The unauthorized sale of your health data is coming to an end

Data brokers then aggregate this deidentified health information and sell it to third party buyers; for example Adam Tanner of the Harvard Institute for Quantitative Social Science estimates that a large pharmaceutical company might pay between $10 million and $40 million per year for data, consulting and services from Iqvia alone.

Internet providers would need permission to use consumer data under proposed MT legislation

Internet providers would need permission to use consumer data under proposed MT legislation

HELENA — Rep. Daniel Zolnikov (R-Billings) says people have a right to be asked if internet service providers can use their personal data. Zolnikov said providers will still be able to use data to create profiles of people based on their browsing history to make targeted ads.

Your Health Data Are a Gold Mine for Advertisers

Your Health Data Are a Gold Mine for Advertisers

“We kept privacy in mind as we were building our KidsMD skills.” Privacy foregrounds the conversation as providers explore voice-enabled health care and balance legal concerns with giving sound medical advice.

EM Client

EM Client

Most folks usually write something when they want to complain - I do as well (LOL) - but I also like to say Thank You when you get a real good and well supported piece of software. Neil Martin Just a note to say thanks for building a damn good email client to replace Outlook.

This is how age verification will work under the UK's porn law

This is how age verification will work under the UK's porn law

"The user verifies their email address and then chooses an age verification option from our list of third party providers, using options such as SMS, credit card, passport, or driving licence," a spokesperson for AgeID explains.

How Australia Will Handle Cryptocurrency Hacks After Coincheck

How Australia Will Handle Cryptocurrency Hacks After Coincheck

What the Coincheck hack tells us about how Australian regulators will handle a cryptocurrency hack Hacks like the one on Coincheck expose gullible investors to risk, but it also means funds could be flowing undetected into the hands of money launderers and terrorists.

Police Are Increasingly Taking Advantage of Home DNA Tests. There Aren’t Any Regulations to Stop It.

Police Are Increasingly Taking Advantage of Home DNA Tests. There Aren’t Any Regulations to Stop It.

By the time authorities in Sacramento, California, announced an arrest in the Golden State Killer case in April 2018, Moore had spent years uncovering family secrets for hire as a self-taught expert in DNA and genealogical research.

More