Troy Hunt: Beyond Passwords: 2FA, U2F and Google Advanced Protection

Troy Hunt: Beyond Passwords: 2FA, U2F and Google Advanced Protection

For example, if you physically have someone's mobile phone in your hand and it's unlocked, you could login to an account by initiating a password reset, receiving the email in their email client then entering the "2nd factor" token sent via SMS or generated by a soft token app on the device.

Google accused of 'trust demolition' over health app

Google accused of 'trust demolition' over health app

Lawyer and privacy expert Julia Powles, who has closely followed the development of Streams, responded on Twitter: "DeepMind repeatedly, unconditionally promised to 'never connect people's intimate, identifiable health data to Google'.

HTTP/3: Come for the speed, stay for the security

HTTP/3: Come for the speed, stay for the security

In 2013, Google introduced a new experimental protocol called Quick UDP Internet Connections (QUIC), that would make HTTP requests faster and more secure. Google estimates that traditional TCP-based HTTP requests take about 100ms because the client has to establish a connection with the server before it asks for anything.

Google accused of 'trust demolition' over health app

Google accused of 'trust demolition' over health app

Lawyer and privacy expert Julia Powles, who has closely followed the development of Streams, responded on Twitter: "DeepMind repeatedly, unconditionally promised to 'never connect people's intimate, identifiable health data to Google'. DeepMind repeatedly, unconditionally promised to *never* connect people's intimate, identifiable health data to Google.

Google 'betrays patient trust' with DeepMind Health move

Google 'betrays patient trust' with DeepMind Health move

Google has been accused of breaking promises to patients, after the company announced it would be moving a healthcare-focused subsidiary, DeepMind Health, into the main arm of the organisation. Google says the restructure is necessary to allow DeepMind’s flagship health app, Streams, to scale up globally.

Private by Design: How we built Firefox Sync

Private by Design: How we built Firefox Sync

Where does it go?” With the Firefox Sync design, you enter a passphrase of your choosing and it is used to derive an encryption key that never leaves your computer.

Google’s G Suite Twitter account is the latest to get hacked in bitcoin scam

Google’s G Suite Twitter account is the latest to get hacked in bitcoin scam

Google’s official G Suite Twitter account is the latest victim of an ongoing bitcoin scam that has been plaguing the social media platform for the last few weeks, joining companies like Target (which saw a similar hack this morning), via The Next Web.

Google’s “Smart City of Surveillance” Faces New Resistance in Toronto

Google’s “Smart City of Surveillance” Faces New Resistance in Toronto

The group represents the latest and largest effort by Torontonians to start having the kinds of public conversations, teach-ins, and debates that should have “taken place last year, when this project was first announced,” according to Bianca Wylie, co-founder of Tech Reset Canada and one of the lead organizers of the opposition to Sidewalk Toronto.

Is Your Smartphone Really Cheating You?

Is Your Smartphone Really Cheating You?

Most of this information is utilized by applications to enhance the user experience—thereby ensuring that your phone apps switch swiftly among landscape and portrait modes, and keep you on the correct track for your commute—but a section of this information is logged and stored based on the decisions of the handset manufacturer.

Google Internet Traffic Is Briefly Misdirected Through Russia, China

Google Internet Traffic Is Briefly Misdirected Through Russia, China

In a notice posted on Monday on its website, Google said it had resolved the issue as of 2:35 p.m. Pacific Standard Time, and that its services were operating as expected.

Google, Facebook, and Amazon benefit from an outdated definition of “monopoly”

Google, Facebook, and Amazon benefit from an outdated definition of “monopoly”

For decades the standard for evaluating whether to break up monopolies, or block the mergers that create them, has been “consumer welfare.” And this consumer welfare standard has predominantly been interpreted as low prices.

Google needs to break up its all-or-nothing approach to permissions

Google needs to break up its all-or-nothing approach to permissions

"Since Google Home Hub uses the Google Assistant to interface with YouTube, web and app activity is a required permission to enable voice actions."

Will you be getting a smart home spy for Christmas?

Will you be getting a smart home spy for Christmas?

You can still speak to the digital assistants embedded in these devices, but their screens enable hands-free video calling (apart from the Google one), can act as a control pad for various smart devices you may have around your home, such as thermostats or security cameras and (this feature is on heavy rotation in all the promotional material) you can use them to prompt you through a recipe without resorting to smearing your buttery fingers over your phone or laptop.

Facebook Is the Least Trusted Major Tech Company When it Comes to Safeguarding Personal Data, Poll Finds

Facebook Is the Least Trusted Major Tech Company When it Comes to Safeguarding Personal Data, Poll Finds

is the least trustworthy of all major tech companies when it comes to safeguarding user data, according to a new national poll conducted for Fortune, highlighting the major challenges the company faces following a series of recent privacy blunders.

Google Developers

Google Developers

The Google beacon platform enables you to manage your beacons remotely, integrate with Google services and help users' devices to discover content and functionality across Android, native apps and the web.

Why surveillance is even worse for your privacy than you thought: three cautionary tales

Why surveillance is even worse for your privacy than you thought: three cautionary tales

If it is retained, use by criminals is not the only risk: the authorities may demand legal access in order to use that data as they wish, including against the person who caused it to be stored.

Hackers Invade YouTube Ads To Mine Cryptocurrency

Hackers Invade YouTube Ads To Mine Cryptocurrency

The hackers probably targeted YouTube because the platform is so popular, Trend Micro said in a Friday blog post. In this case, the mining scripts in the YouTube scheme were configured to siphon 80 percent of the PC's computing power, Trend Micro said.

Searching For Privacy

Searching For Privacy

Yes, it’s a little-known secret, but there are ways you can search the web without giving up your privacy. This post is simply to inform you of options besides the traditional search engines like Google and Internet Explorer.

Apple's latest anti-tracking feature in Safari takes toll on digital advertising

Apple's latest anti-tracking feature in Safari takes toll on digital advertising

The anti-tracking feature embedded in the newest version of Apple's Safari browser is causing pain among marketers, making it harder to calculate the return-on-investment for digital ads, industry experts say. "ITP 2 will have a huge impact on attribution when a user is exposed to an online ad while using a Safari browser," Harris says.

​iRobot and Google team up to understand your smart home

"Robots with mapping and spatial awareness capabilities will play an important role in allowing other smart devices in the home to more seamlessly work together," said Colin Angle, chairman and CEO of iRobot in a statement.

Hack Brief: Someone Posted Private Facebook Messages From 81,000 Accounts

Hack Brief: Someone Posted Private Facebook Messages From 81,000 Accounts

It’s not clear who’s responsible for stealing the Facebook data, but the BBC says one of the websites where the stolen information was posted appears to have been set up in Saint Petersburg, Russia.

Google Chrome’s Users Take a Back Seat to Its Bottom Line

Google Chrome’s Users Take a Back Seat to Its Bottom Line

Browser Market share (desktop) Tracking protection Chrome 68% None Firefox 11% On by default in Private Browsing Internet Explorer 7% Off by default Safari 6% On by default Edge 4% None Opera 2% Off by default

The Privacy Battle to Save Google From Itself

The Privacy Battle to Save Google From Itself

Every employee—from research scientists to engineers, program managers, and executives—described a single shared goal: to respect Google users and help them understand and control their data as they generate it in real time on Google’s services.

U.S. Supreme Court divided over Google privacy settlement

U.S. Supreme Court divided over Google privacy settlement

WASHINGTON (Reuters) - U.S. Supreme Court justices, in an internet privacy case involving Google(GOOGL.O), disagreed on Wednesday over whether to rein in a form of settlement in class action lawsuits that awards money to charities and other third parties instead of to people affected by the alleged wrongdoing.

Feds Also Using 'Reverse Warrants' To Gather Location/Identifying Info On Thousands Of Non-Suspects

Feds Also Using 'Reverse Warrants' To Gather Location/Identifying Info On Thousands Of Non-Suspects

What used to be officers canvassing the area where a crime took place is now a warrant sent to Google to obtain location data and identifying info for all people and devices in the area.

Google Online Security Blog: Announcing some security treats to protect you from attackers’ tricks

Verify critical security settings to help ensure your account isn’t vulnerable to additional attacks and that someone can’t access it via other means, like a recovery phone number or email address.

Google and the Rest of Tech Industry Are Grappling With These 3 Data Problems

Google and the Rest of Tech Industry Are Grappling With These 3 Data Problems

When considering how to regulate the tech industry, lawmakers typically think of either antitrust or data privacy issues, Jin explained.

What Google knows about you & how to take control of your personal data?

What Google knows about you & how to take control of your personal data?

The tech giant has used this leverage with internet users to bring other services like Chrome browser, YouTube, Gmail, Google Maps & a bunch of other Free services to complement its web searching capability. It’s time for users to take control of their personal data & be responsible for its usage and privacy.

A Busy Week for Data Privacy

A Busy Week for Data Privacy

We at the FTC have an important role to play because we are the ones who are responsible for enforcing that Privacy Shield framework against companies that fail to adhere to it,” Smith said.

Gabriel Weinberg's answer to What is the revenue generation model for DuckDuckGo?

Gabriel Weinberg's answer to What is the revenue generation model for DuckDuckGo?

DuckDuckGo has been a profitable company since 2014 without storing or sharing any personal information on people using our search engine. Google also makes most of their money via this same type of keyword-based advertising that doesn’t require any search-history tracking.

More