UK ministers urge internet users to increase online security

UK ministers urge internet users to increase online security

And less than half of those surveyed do not always use a strong, separate password for their main email account. NCSC’s Technical Director Dr Ian Levy added: "Password re-use is a major risk that can be avoided - nobody should protect sensitive data with something that can be guessed, like their first name, local football team or favourite band.

Hacker Breaks Into French Government's New Secure Messaging App

Hacker Breaks Into French Government's New Secure Messaging App

Dubbed " Tchap ," the end-to-end encrypted, open source messaging app has been created by the French government with an aim to keep their officials, parliamentarians and ministers data on servers inside the country over concerns that foreign agencies could use other services to spy on their communications.

Bellingcat - Creating an Android Open Source Research Device on Your PC - bellingcat

Bellingcat - Creating an Android Open Source Research Device on Your PC - bellingcat

Installation: Genymotion and VirtualBox. For this guide, we will use Genymotion to set up an Android virtual device on Windows. Just like with a real phone, you can search for and install apps onto your Android virtual device through the Google Play store.

Facebook now says its password leak affected ‘millions’ of Instagram users

Facebook now says its password leak affected ‘millions’ of Instagram users

“We discovered additional logs of Instagram passwords being stored in a readable format,” the company said. Last month, Facebook admitted it had inadvertently stored “hundreds of millions” of user account passwords in plaintext for years, said to have dated as far back as 2012.

Facebook says it 'unintentionally uploaded' 1.5 million people's email contacts without their consent

Facebook says it 'unintentionally uploaded' 1.5 million people's email contacts without their consent

A Facebook spokesperson said before May 2016, it offered an option to verify a user's account using their email password and voluntarily upload their contacts at the same time. Facebook now plans to notify the 1.5 million users affected over the coming days and delete their contacts from the company's systems.

When you get online – get paranoid

When you get online – get paranoid

OPSEC is your online footprint – it reaches from the furthest corners of the internet to the devices that you use and takes into account the things that you do every day.

How To Stop Using Free Email

How To Stop Using Free Email

So for most free services like Gmail, Yahoo, or Hotmail, you're not going to be able to use your existing email address with a different email provider. The next thing you want to do is update all your online accounts that use your old address to contact you.

Australian Child-Tracking Smartwatch Vulnerable to Hackers

Australian Child-Tracking Smartwatch Vulnerable to Hackers

(Photo: Troy Hunt) An Australian company that markets a smartwatch that lets parents monitor their children shut down its service on Monday after researchers revealed hackers could track a child's location, spoof the location, add themselves as a "parent" and view personally identifiable information associated with the account.

Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support

Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support

But the issue is much worse than previously reported, with the hackers able to access email content from a large number of Outlook, MSN, and Hotmail email accounts, according to a source who witnessed the attack in action and described it before Microsoft’s statement, as well as screenshots provided to Motherboard.

Microsoft discloses security breach that impacted some Outlook accounts

Microsoft discloses security breach that impacted some Outlook accounts

Chinese companies have leaked over 590 million resumes via open databases Over 540 million Facebook records found on exposed AWS servers According to Microsoft, between January 1, 2019, and March 29, 2019, a hacker, or group of hackers, compromised the account of a Microsoft support agent, one of the company's customer support representatives that handles technical complaints.

How to Stop Amazon From Listening to Your Alexa Recordings

How to Stop Amazon From Listening to Your Alexa Recordings

According to a Bloomberg report , Amazon employs thousands of workers to transcribe recordings of Alexa users for the purpose of improving the voice assistant's recognition algorithm. You can review a number of things here, including our voice history, skill permissions, and other data settings.

Cybercrime market selling full digital fingerprints of over 60,000 users

Cybercrime market selling full digital fingerprints of over 60,000 users

Image: ZDNet. The reason why a marketplace like Genesis has come to exist today is because in recent years, online services have improved their anti-fraud systems, and are now capable of detecting abnormal account login activity by looking at more details, rather than only a user's username and password.

Facebook still tracks you after you deactivate account

Facebook still tracks you after you deactivate account

Deactivating isn't as extreme, the company says, and the social network continues collecting your data in case you change your mind and want to return to your profile.

Why Won’t Twitter Help Us Delete Our Tweets?

Why Won’t Twitter Help Us Delete Our Tweets?

But for many tweet deleters, getting rid of old posts is a practical matter — a replacement for simple and obvious Twitter privacy features that simply do not exist.

US immigration police broke Facebook rules with fake profiles for college sting

US immigration police broke Facebook rules with fake profiles for college sting

In a network of suspicious Facebook accounts linked to the University of Farmington, the college’s alleged president, Ali “AJ” Milani, liked the Michigan Jaguars sports club and had a 51-person friend list that was mostly people from south Asia, despite Milani ostensibly living in Detroit.

Amazon reportedly has thousands of people listening to snippets of Alexa conversations

Amazon reportedly has thousands of people listening to snippets of Alexa conversations

The report said the Amazon team transcribes the recordings and shares the conversations with other parts of the company in order to make Alexa's "understanding of human speech" better.

Govt. May Link Facebook, Twitter With Aadhaar, Mobile Number; But Why?

Govt. May Link Facebook, Twitter With Aadhaar, Mobile Number; But Why?

has understood the problem, and very soon, you can be asked to link your social media accounts with anyone Govt. For instance, a mobile number is required for creating a Twitter account, and moreover, they are offering Aadhaar and other Govt.

Should you be concerned about LastPass uploading your passwords to its server?

Should you be concerned about LastPass uploading your passwords to its server?

No changes to any of the other actions which will provide the server with the key to decrypt your data: Opening Account Settings, Security Challenge, History, Bookmarklets, Credit Monitoring Linking to a personal account Adding an identity Importing data if the binary component isn’t installed Printing all sites Some of these actions will prompt you to re-enter your master password.

Bellingcat - Locating The Netherlands' Most Wanted Criminal By Scrutinising Instagram - bellingcat

Bellingcat - Locating The Netherlands' Most Wanted Criminal By Scrutinising Instagram - bellingcat

A fugitive convict from the Netherlands is taunting Dutch police with provocative pictures and videos from Iran, playing a game of “catch me if you can” on Instagram.

Twitter ‘took over’ a user’s account and joked about reading their DMs

Twitter ‘took over’ a user’s account and joked about reading their DMs

At a time when tech giants have come under fire for failing to protect the private data of their users, Twitter took over one of its users’ accounts for fun and then tweeted jokes about reading the account’s private messages.

Facebook Caught Asking Some Users Passwords for Their Email Accounts

Facebook Caught Asking Some Users Passwords for Their Email Accounts

However, Facebook has been found asking some newly-registered users to provide the social network with the passwords to their email accounts, which according to security experts is a terrible idea that could threaten privacy and security of its users.

Twitter is secretly holding onto deleted direct messages

Twitter is secretly holding onto deleted direct messages

Then open the profile page of the account you want to receive notifications from, tap the Bell icon next to the Following button and choose between All Tweets, Only Live Video and Off. Twitter's privacy policy states that anyone who deactivates their account will have their data deleted after a 30-day grace period.

Use with Caution: 7 Common Yet Dangerous Online Places in 2019

Use with Caution: 7 Common Yet Dangerous Online Places in 2019

Related: Hackers Make $3.25 Billion a Year from Exploiting Social Media Platforms .The report also pays attention to the range of malicious services offered openly on social networks, such as hacking tools, botnets for hire, cryptocurrency scams.

Facebook to Fight Belgian Ban on Tracking Users (and Even Non-Users)

Facebook to Fight Belgian Ban on Tracking Users (and Even Non-Users)

understands “that people want more information and control over the data Facebook receives from other websites and apps that use our services,” the company said in a statement.

Twitter locks all new user accounts in order to force them to give up their phone numbers

Twitter locks all new user accounts in order to force them to give up their phone numbers

I am not a fan of their actions recently and I cannot even get onto their platform to begin tweeting since I don't want to give them my phone number.

My 1-week Code and Legal Part Review on “Crypviser” Messenger.

My 1-week Code and Legal Part Review on “Crypviser” Messenger.

Crypviser positions itself as a protected, decentralized and anonymous messenger with identification via blockchain. Crypviser and its applications are under the complete control of this company:The source code is not public, so the question of security of messaging is closed.

Guide to reasonable privacy on Android

Guide to reasonable privacy on Android

The primary purpose for this purchase was to test the feasibility of having to use Android for everyday needs as an alternative to the unfortunate and seemingly inevitable demise of Window Phone, like my ultra-awesome Lumia 950 , which remains the most graceful and elegantly designed mobile operating system, decent privacy included.

EFF Submits Consumer Data Privacy Comment to the California Attorney General

EFF Submits Consumer Data Privacy Comment to the California Attorney General

The Electronic Frontier Foundation has filed comments on two issues: first, how to verify consumer requests to companies for access to personal information, and for deletion of that information; and second, how to make the process of opting out of the sale of data easy, using the framework already in place for the Do Not Track (DNT) system.

Login With Facebook, Google or AT&T? Thanks, but No Thanks

Login With Facebook, Google or AT&T? Thanks, but No Thanks

There's more: Project Verify is better than the Facebook and Google SSOs because it's going to be checked against your mobile SIM card, phone number, user credentials, account tenure and phone account type (info only your wireless carrier has).

How much privacy do you have left on the web?

How much privacy do you have left on the web?

The former requires providing your mobile phone number which is immediately tied to your real-life identity — more on that soon. So it seems that having your accounts linked to your real-life identity via your mobile phone number is usually unavoidable even if it’s not the same number you normally use.

More