Don't Mail In That DNA Kit Until You Know These Facts

Don't Mail In That DNA Kit Until You Know These Facts

As we become more comfortable with at-home DNA testing kits and allowing companies to assess our biological makeup, the market continues to shift in a variety of ways including the types of diseases and disorders that can be tested, how accurate the tests are, and the amount of information shared – which can include selling your data to third parties.

Washington state’s data privacy bill, supported by Microsoft, dies as key players fail to reach compromise

Washington state’s data privacy bill, supported by Microsoft, dies as key players fail to reach compromise

Efforts to enact new data privacy regulations in Washington state failed this week as legislators and tech titans Amazon and Microsoft failed to reach a compromise before the deadline. State Sen. Reuven Carlyle sponsored the bill and vowed to revive the effort to enact new privacy regulations in 2020.

SecurityWatch: Make Corporations, Not Customers, Suffer for Data Breaches

SecurityWatch: Make Corporations, Not Customers, Suffer for Data Breaches

On March 29, Earl Enterprises announced that visitors to its chain restaurants may have had their credit card information stolen. If you ate out at specific Buca di Beppo, Chicken Guy!, Earl of Sandwich, Mixology, Planet Hollywood, or Tequila Taqueria, you may have had your credit or debit card information stolen.

Utah Bans Police From Searching Digital Data Without A Warrant, Closes Fourth Amendment Loophole

Utah Bans Police From Searching Digital Data Without A Warrant, Closes Fourth Amendment Loophole

Under the Electronic Information or Data Privacy Act (HB 57), state law enforcement can only access someone’s transmitted or stored digital data (including writing, images, and audio) if a court issues a search warrant based on probable cause.

Hackers Steal More Than 100 Mercedes-Benz Cars in Chicago by Hacking Car2Go Car-Sharing App: Report

Hackers Steal More Than 100 Mercedes-Benz Cars in Chicago by Hacking Car2Go Car-Sharing App: Report

According to Edwards, Car2Go was "hacked " and, as a result, there were as many as 100 fleet vehicles unaccounted for in the car sharing provider's Chicago market. BMW, Daimler May Combine Car-Sharing Services Car2Go and ReachNow, Report Says Posted in Tech.

Julian Assange Suffered Severe Psychological and Physical Harm in Ecuadorian Embassy, Doctors Say

Julian Assange Suffered Severe Psychological and Physical Harm in Ecuadorian Embassy, Doctors Say

An American doctor who conducted several medical and mental health evaluations of WikiLeaks founder Julian Assange inside Ecuador’s Embassy in London over the last two years says that she believes she was spied on and that the confidentiality of her doctor-patient relationship with Assange was violated.

2018 Online Trust Audit and Honor Roll

2018 Online Trust Audit and Honor Roll

As in previous years, 100 baseline points can be earned in each of the three major assessment categories (consumer protection, site security and privacy).

As cashless stores grow, so does the backlash

As cashless stores grow, so does the backlash

Before this year there was only one jurisdiction that required businesses to accept cash: Massachusetts, which passed a law nearly 40 years ago.“The potential societal cost of a cashless economy I think outweighs the potential benefits for businesses,” said Ritchie Torres, a New York City councilman for the South Bronx who introduced the bill.

Facebook Showed Me My Data Is Everywhere And I Have Absolutely No Control Over It

Facebook Showed Me My Data Is Everywhere And I Have Absolutely No Control Over It

And this is likely how a Maserati dealership in Scottsdale ended up on my advertisers “who use a contact list” page — its agency works with a data broker who has uploaded a massive contact list.

Your car is watching you. Who owns the data?

Your car is watching you. Who owns the data?

As cars collect and share performance data with automakers, “what happens if the mechanic down the street, who has been servicing your car for years, can’t get that data from the vehicle manufacturer?” asked Bill Hanvey, CEO of Auto Care Association, a trade group that represents about 235,000 repair stores.

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

When personal information is fraudulently used to open new accounts, BJS says, people affected experience a lot financial problems in the future. Someone calls you claiming to be from your bank and asks for sensitive personally identifiable information like your social security number.

Amazon’s Alexa can handle patient information now — what does that mean for privacy?

Amazon’s Alexa can handle patient information now — what does that mean for privacy?

In the case of Livongo, the company whose voice skill lets users check their blood sugar reading, Alexa is mostly a way to transmit the information.

Opinion | Why It’s So Easy for a Bounty Hunter to Find You

Opinion | Why It’s So Easy for a Bounty Hunter to Find You

Your carrier needs this data to deliver service. But, according to recent news reports, this real-time phone location data has long been available to entities beyond your wireless carrier, for a price.

HTTPS Isn't Always As Secure As It Seems

HTTPS Isn't Always As Secure As It Seems

Vulnerabilities that are full-on "leaky" involve more deeply flawed encryption channels between browsers and web servers that would enable an attacker to decrypt all the traffic passing through them.

Tesla cars keep more data than you think, including this video of a crash that totaled a Model 3

Tesla cars keep more data than you think, including this video of a crash that totaled a Model 3

That's because the computers on Tesla vehicles keep everything that drivers have voluntarily stored on their cars, plus tons of other information generated by the vehicles including video, location and navigational data showing exactly what happened leading up to a crash, according to two security researchers.

Tech giants back bill that privacy advocates claim is toothless

Tech giants back bill that privacy advocates claim is toothless

We would take a step forward on both data privacy and face surveillance but Microsoft and other tech companies have had, undoubtedly, an outsized influence on this conversation just because they have a lot more lobbyists.

An Ad Fraud Scheme Targeting Android Apps And Twitter’s Ad Network Cost Advertisers Millions

An Ad Fraud Scheme Targeting Android Apps And Twitter’s Ad Network Cost Advertisers Millions

Carmel, of Aniview, told BuzzFeed News that his company “does not knowingly engage in any fraudulent activity” and said his team has been trying to stop this activity on their platform since they were first contact by Protected Media last month.

Facebook Succeeded In Killing Cybersecurity Like It Did Privacy

Facebook Succeeded In Killing Cybersecurity Like It Did Privacy

As Facebook teaches society across the world to no longer care about cybersecurity, the world’s companies will recognize that their costly investments in securing their user data may no longer be necessary.

Pointing to the future: the next step in fraud prevention

Pointing to the future: the next step in fraud prevention

Considering that five million UK consumers had funds stolen from their bank or credit card account in 2017 – at an average cost of £840 each according to comparison site ComparetheMarket – it is vital that issuers are able to resolve payment disputes quickly and efficiently to maintain cardholder loyalty and brand reputation.

Streaming site Kanopy exposed viewing habits of users, researcher says

Streaming site Kanopy exposed viewing habits of users, researcher says

In a blog post, Paine said the server contained between 25-40 million daily logs, which he said could have identified all the videos searched for and watched from a user’s IP address.

Has your privacy been lost in private jet travel?

Has your privacy been lost in private jet travel?

When it comes to hiring a private jet, there are dozens of folks that typically handle your information. Your information is encrypted from the moment you transmit it to our secure servers.

Cambridge Analytica Secrets Allegedly Covered Up by Trump Campaign Veterans

Cambridge Analytica Secrets Allegedly Covered Up by Trump Campaign Veterans

“It's about searching for the answers and triggering accountability.”— David Carroll Carroll’s team hope the High Court judge will fire the administrator and pass the case to government receivers who would then appoint a new administrator willing to investigate legal breaches at Cambridge Analytica and five other interrelated companies.

How much privacy do you have left on the web?

How much privacy do you have left on the web?

The former requires providing your mobile phone number which is immediately tied to your real-life identity — more on that soon. So it seems that having your accounts linked to your real-life identity via your mobile phone number is usually unavoidable even if it’s not the same number you normally use.

The unauthorized sale of your health data is coming to an end

The unauthorized sale of your health data is coming to an end

Data brokers then aggregate this deidentified health information and sell it to third party buyers; for example Adam Tanner of the Harvard Institute for Quantitative Social Science estimates that a large pharmaceutical company might pay between $10 million and $40 million per year for data, consulting and services from Iqvia alone.

This is how age verification will work under the UK's porn law

This is how age verification will work under the UK's porn law

"The user verifies their email address and then chooses an age verification option from our list of third party providers, using options such as SMS, credit card, passport, or driving licence," a spokesperson for AgeID explains.

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Use credit instead of debit – When running a transaction as debit and entering your PIN, you are foregoing many of the protection features of the card per your user agreement.

In-car monitoring: Surveillance tech will make your car less private

In-car monitoring: Surveillance tech will make your car less private

Startup Caaresys imagines its radar-based system monitoring the respiration and heart rates of everyone in the car, with a particular focus on sensing a child that might be hidden from view in the back and potentially left behind in the car.

China’s electric cars are government spies

China’s electric cars are government spies

Though the Volkswagen chief doesn’t explicitly say it, for automakers, providing electric-car data to China’s one-party government is just another cost of doing business in the country.

Smart alarms left 3 million cars vulnerable to hackers who could turn off motors

Smart alarms left 3 million cars vulnerable to hackers who could turn off motors

Two popular smart alarm systems for cars had major security flaws that allowed potential hackers to track the vehicles, unlock their doors and, in some cases, cut off the engine.

Sorry Amazon: Philadelphia bans cashless stores

Sorry Amazon: Philadelphia bans cashless stores

with 144 posters participating Share this story This week, Philadelphia's mayor signed a bill that would ban cashless retail stores, according to The Morning Call . The move makes Philadelphia the first major city to require that brick-and-mortar retail stores accept cash.

More