Border Agents Fail to Delete Personal Data of Travelers After Electronic Searches, Watchdog Says

Border Agents Fail to Delete Personal Data of Travelers After Electronic Searches, Watchdog Says

The Department of Homeland Security’s internal watchdog, known as the Office of the Inspector General (OIG), released a new report yesterday detailing CBP’s many failures at the border. Customs officials can conduct two kinds of electronic device searches at the border for anyone entering the country.

Google CEO Sundar Pichai thinks Android users know how much their phones are tracking them

Google CEO Sundar Pichai thinks Android users know how much their phones are tracking them

Further in the hearing, Pichai was asked if Google could improve its user dashboard and tools to better teach people how to protect their privacy, including turning off data collection and location tracking.

With 52.5 Million Users' Data Exposed On Google+, Google Quickens Shutdown

With 52.5 Million Users' Data Exposed On Google+, Google Quickens Shutdown

The Google+ social network inadvertently gave app developers access to about 52.5 million users' information — even data not meant to be public — because of a bug in its software, Google says.

Profiling and Automated Decision Making: Is Artificial Intelligence Violating Your Right to Privacy?

Profiling and Automated Decision Making: Is Artificial Intelligence Violating Your Right to Privacy?

As the UN High Commissioner for Human Rights noted in August 2018 “big data analytics and artificial intelligence increasingly enable States and business enterprises to obtain fine-grained information about people’s lives, make inferences about their physical and mental characteristics and create detailed personality profiles.”

Google+ to shut down early after privacy flaw affects over 50m users

Google+ to shut down early after privacy flaw affects over 50m users

A privacy flaw that inadvertently exposed the names, email addresses, ages and other personal information of 52.5 million Google+ users last month convinced Google to close the service in April instead of August, as previously announced.

Telegram, WhatsApp and Signal open to side-channel attacks

Telegram, WhatsApp and Signal open to side-channel attacks

Researchers at Cisco's Talos Group are warning users to not to assume that the very popular encrypted messaging apps Telegram, WhatsApp and Signal will keep the communications confidential, as they partly delegate security to the operating systems they run on.

5 Sure Signs You Have Been Hacked

5 Sure Signs You Have Been Hacked

These messages are from hackers, and their goal is to get your friends and family to click links or visit sites where malicious software can automatically infect their devices as well. Data usage that suddenly spikes with no reasonable explanation is another sign that you have been hacked.

Customs officers searching more travelers’ devices

Customs officers searching more travelers’ devices

NEW YORK (AP) — U.S. Customs and Border Protection officers are searching the electronic devices of travelers more often, and did not always follow proper protocol, a new watchdog report has found.

Facebook Well Aware That Tracking Contacts Is Creepy: Emails

Facebook Well Aware That Tracking Contacts Is Creepy: Emails

But thanks likely to this evasion of Android permission requests, Facebook users did not realize for years that the company was collecting information about who they called and texted, which would have helped explain to them why their “People You May Know” recommendations were so eerily accurate.

Public slams Finnish Transport Safety Agency for privacy breach

Public slams Finnish Transport Safety Agency for privacy breach

The Finnish Transport Safety Agency (Trafi) on Sunday said it had suspended the service while it investigates whether the tool infringes on people’s data privacy and security.

Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret

Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret

At least 75 companies receive anonymous, precise location data from apps whose users enable location services to get local news and weather or other information, The Times found.

Google Play has dropped 22 malware: Uninstall these apps – Tech Lapse

Google Play has dropped 22 malware: Uninstall these apps – Tech Lapse

After the incident, Google officially posted on Twitter calling on mobile phone users to pay attention to security warnings from the operating system and be alert to third-party applications.

Infographic: How to Become Invisible on the Internet

Infographic: How to Become Invisible on the Internet

More people want to opt out of this data collection, but aside from disconnecting entirely or taking ludicrous measures to safeguard information, there aren’t many great options available to limit what is seen and known about you online. The simple actions that can be taken fall into three major realms: internet browsers, social networks, and mobile phones.

Electric vehicles are sending real-time location and diagnostic data to Chinese government monitoring centers

Electric vehicles are sending real-time location and diagnostic data to Chinese government monitoring centers

Global carmakers are feeding real-time location information and dozens of other data points from electric vehicles to Chinese government monitoring centres, potentially adding to China’s rich kit of surveillance tools as President Xi Jinping steps up the use of technology to track Chinese citizens.

Big tech has your kid’s data — and you probably gave it to them

Big tech has your kid’s data — and you probably gave it to them

The report calls on parents and schools to examine the type of gadgets children play with, like smart speakers, wifi-powered toys, and gaming apps, all of which are collecting data on kids.

Data privacy issues may be capturing more attention in China

Data privacy issues may be capturing more attention in China

"In China, the medical industry, also the technology industry, the technology companies that are working with AI and also with a lot of data, we all have a common agreement that the symptom data can be collected in a big chunk for big data analysis and also AI training," said Jim Wang, chairman and founder of Nova Vision.

Tech's invasion of our privacy made us more paranoid in 2018

Tech's invasion of our privacy made us more paranoid in 2018

"We think it's a good thing that people are more interested in using privacy controls and managing their information online," a Facebook spokesperson said in a statement. Its traffic had steadily been growing since, but it boomed in 2018 as Facebook's privacy issues blew up, said Gabriel Weinberg, CEO and founder of DuckDuckGo.

‘Black box’ devices could be fitted to all new cars

‘Black box’ devices could be fitted to all new cars

The European Council is proposing that every new car has the data-logging device, which would record the vehicle’s speed, state of safety assistance features and “crash-related parameters and information before, during and after a collision”.

How To Be Invisible On The Internet

How To Be Invisible On The Internet

The simple actions that can be taken fall into three major realms: internet browsers, social networks, and mobile phones.

Your Digital Footprint Looks A Lot Like You

Your Digital Footprint Looks A Lot Like You

We collect information to provide better services to all our users — from figuring out basic stuff like which language you speak, to more complex things like which ads you’ll find most useful

TSA’s Roadmap for Airport Surveillance Moves in a Dangerous Direction

TSA’s Roadmap for Airport Surveillance Moves in a Dangerous Direction

The ink wasn’t even dry on that bill when the Transportation Security Administration (TSA) published their Biometrics Roadmap for Aviation Security and the Passenger Experience, detailing TSA’s plans to work with Customs and Border Protection (CBP) to roll out increased biometric collection and screening for all passengers, including Americans traveling domestically.

Looking Down Under for a Back Door

Looking Down Under for a Back Door

The Australian government is working to enact legislation to make it easier for law enforcement and intelligence agencies to access electronic communications information, including data protected by encryption, by forcing companies to weaken the security of their products.

Senator slams Google's censored search engine work in China

Senator slams Google's censored search engine work in China

Google's creation of a censored search engine for China, known as "Project Dragonfly," is proof China has made "successful efforts to recruit Western companies to their information control efforts," said Senator Mark Warner (D-VA) in Washington D.C. Friday.

New Documents Show That Facebook Has Never Deserved Your Trust

New Documents Show That Facebook Has Never Deserved Your Trust

Company executives proposed several different schemes, from charging certain developers for access per user to requiring that apps “[Facebook] doesn’t want to share data with” spend a certain amount of money per year on Facebook’s ad platform or lose access to their data.

Zash (ZEC) - All You Need to Know

Zash (ZEC) - All You Need to Know

This construction allows two users to transact on the blockchain by obfuscating the information of both the sender and receiver along with the amount. Below is the list of exchanges that allow buying/exchanging of Zcash using various fiat or crypto coins.

Subject Access Requests – tapmydata – Medium

Subject Access Requests – tapmydata – Medium

Tap provides a secure two way street between both organisations and individuals when it comes to access requests.

Opinion | The End of Privacy Began in the 1960s

Opinion | The End of Privacy Began in the 1960s

American companies remained free to gather data on the people who used their products. Congress is again wrestling with the balance between freedom of information and the right to privacy.

Yes, You Should Delete Facebook – Member Feature Stories – Medium

Yes, You Should Delete Facebook – Member Feature Stories – Medium

Netflix doesn’t make more money the more time you spend on it (they make less, actually), so they have no incentive to addict you to the platform (beyond keeping you from switching to a competitor).

New Report: Unknown Data Scraper Breach

New Report: Unknown Data Scraper Breach

It did not contain any sensitive personal data such as credit card details or passwords but they did contain a lot of private information like an individual’s professional background, name, phone number, email address, address, and even their IP.

How Does a Firewall Work?

How Does a Firewall Work?

A firewall is software or hardware that uses predetermined rules to monitor incoming and outgoing network traffic. Traditional firewalls, known as packet filters, examine data for information such as its source and destination IP address.

More