To Search Through Millions of License Plates, Police Should Get a Warrant

To Search Through Millions of License Plates, Police Should Get a Warrant

Yang, argues that when a U.S. Postal Service inspector used a commercial ALPR database to locate a suspected mail thief, it was a Fourth Amendment search that required a warrant.

U.S. agency error exposes 2.3 million disaster survivors to fraud: watchdog

U.S. agency error exposes 2.3 million disaster survivors to fraud: watchdog

WASHINGTON (Reuters) - The U.S. Federal Emergency Management Agency (FEMA) exposed 2.3 million disaster survivors to possible identity theft and fraud by improperly sharing sensitive personal information with an outside company, according to an internal government watchdog.

HMD admits the Nokia 7 Plus was sending personal data to China

HMD admits the Nokia 7 Plus was sending personal data to China

HMD is in hot water following a report from Norwegian site NRKbeta, which found that HMD's Nokia 7 Plus was sending users' personal information to a server in China.

Finland to investigate Nokia-branded phones after data breach report

Finland to investigate Nokia-branded phones after data breach report

HELSINKI (Reuters) - Finland’s data protection ombudsman said on Thursday he would investigate whether Nokia-branded phones had breached data rules after a report said the handsets sent information to China.

Chelsea Manning is Sacrificing her Freedom to Defend Freedom of the Press

Chelsea Manning is Sacrificing her Freedom to Defend Freedom of the Press

By refusing to testify before this grand jury, Chelsea Manning has made a more principled stand for freedom of the press than Judith Miller could have ever hoped to.

The privacy risks of pre-installed software on Android devices

The privacy risks of pre-installed software on Android devices

Many pre-installed apps facilitate access to privileged data and resources, without the average user being aware of their presence or being able to uninstall them. On the one hand, the permission model on the Android operating system and its apps allow a large number of actors to track and obtain personal user information.

Utah Just Became a Leader in Digital Privacy

Utah Just Became a Leader in Digital Privacy

Rather than wait for court action, Utah legislators passed this latest privacy law, which requires law enforcement to obtain a warrant with probable cause in order to access any electronic data held by a third party, at least in most cases.

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

55 unique entities, owned by 46 parent companies, received or processed app user data, including developers and parent companies (first parties) and service providers (third parties). 37 (67%) provided services related to the collection and analysis of user data, including analytics or advertising, suggesting heightened privacy risks.

Flaw in popular PDF creation library enabled remote code execution

Flaw in popular PDF creation library enabled remote code execution

Danny Bradbury A security researcher has discovered a high-severity bug in a popular PHP library that could enable attackers to run remote code on web servers. The researcher, who calls himself Polict, discovered another way to exploit a bug in the PHP programming language that was originally reported at Black Hat in 2018.

Streaming site Kanopy exposed viewing habits of users, researcher says

Streaming site Kanopy exposed viewing habits of users, researcher says

In a blog post, Paine said the server contained between 25-40 million daily logs, which he said could have identified all the videos searched for and watched from a user’s IP address.

Researchers Create Fake Profiles on 24 Health Apps and Learn Most Are Sharing Your Data

Researchers Create Fake Profiles on 24 Health Apps and Learn Most Are Sharing Your Data

Though the company said it properly informed users about the data-sharing, the government’s health ministry has since promised an investigation into the app.

Facial recognition can speed you through airport security, but there's a cost

Facial recognition can speed you through airport security, but there's a cost

"US Customs and Border Protection is changing the face of travel with its cloud-based facial biometric matching service," the agency says in a pamphlet explaining the technology.

Who Defends Your Data? Report Reveals Peruvian ISPs Progress on User Privacy, Still Room for Improvement

Who Defends Your Data? Report Reveals Peruvian ISPs Progress on User Privacy, Still Room for Improvement

Judicial Order: Companies earned a star in this category if they require that the government obtain a warrant from a judge before handing over user data (either content or metadata).

Criminal Suspects Deserve Genetic Privacy, Too

Criminal Suspects Deserve Genetic Privacy, Too

Both sites allow individuals to obtain raw DNA data files, which they can then upload to an open-source database like GEDmatch in order to connect them to distant family members.

The Government wants to free up your bank data. Here's what that means for you

The Government wants to free up your bank data. Here's what that means for you

The Consumer Data Right (CDR), which begins to come online mid-year, aims to give Australians more agency to access and control parts of their personal information.

It's Scary How Much Personal Data People Leave on Used Laptops and Phones, Researcher Finds

It's Scary How Much Personal Data People Leave on Used Laptops and Phones, Researcher Finds

Frantz amassed a respectable stockpile of refurbished, donated, and used hardware: 41 desktops and laptops, 27 pieces of removable media (memory cards and flash drives), 11 hard disks, and six cellphones. Screenshot: Josh Frantz / Rapid7 Only two of the devices were erased properly, he said: a Dell laptop and a Hitachi hard drive.

Now-Patched Google Photos Vulnerability Let Hackers Track Your Friends and Location History

Now-Patched Google Photos Vulnerability Let Hackers Track Your Friends and Location History

If the search time took longer than the baseline, I could assume the query returned results and thus infer that the current user visited Iceland. So by adding a date to the search query, I could check if the photo was taken in a specific time range.

Data Breaches

Stationary Device (STAT) Stationary computer loss (lost, inappropriately accessed, discarded or stolen computer or server not designed for mobility) Unintended Disclosure (DISC) Unintended disclosure (not involving hacking, intentional breach or physical loss – for example: sensitive information posted publicly, mishandled or sent to the wrong party via publishing online, sending in an email, sending in a mailing or sending via fax) Unknown

Has your privacy been lost in private jet travel?

Has your privacy been lost in private jet travel?

When it comes to hiring a private jet, there are dozens of folks that typically handle your information. Your information is encrypted from the moment you transmit it to our secure servers.

Alarm over leaked US database targeting journalists and immigration activists

Alarm over leaked US database targeting journalists and immigration activists

Photograph: Ariana Drehsler/UPI/Barcroft Images “It means that the debate about immigrants’ rights, about the treatment of immigrants, about the treatment of asylum seekers, is going to be suppressed or censored because the people who are speaking out with a voice that’s critical of the government are going to be singled out for harsher treatment or punished,” Bhandari said.

Tracking tools found on EU government and health websites

Tracking tools found on EU government and health websites

These are external links and will open in a new window Image copyright Getty Images Image caption Almost all EU government websites have trackers Online tools which track user behaviour for advertisers have been found on a swathe of EU public health websites, including NHS and Gov.uk pages.

EFF Submits Consumer Data Privacy Comment to the California Attorney General

EFF Submits Consumer Data Privacy Comment to the California Attorney General

The Electronic Frontier Foundation has filed comments on two issues: first, how to verify consumer requests to companies for access to personal information, and for deletion of that information; and second, how to make the process of opting out of the sale of data easy, using the framework already in place for the Do Not Track (DNT) system.

Antitrust case against Google similar to Microsoft's: Mississippi AG

Antitrust case against Google similar to Microsoft's: Mississippi AG

"We attorneys general have authority under consumer protection acts to do both," Hood said on "The Exchange." "So it'll be a multifaceted suit or, hopefully, we can get a settlement if we can get some agreement with them." Several state attorneys generals recently spoke about their willingness to go after the likes of , Google and other tech giants in interviews with The Washington Post .

Why You Should Be Worried about Online Ad Tracking (Step-By-Step Guide to Stop It)

Why You Should Be Worried about Online Ad Tracking (Step-By-Step Guide to Stop It)

Open Settings Go to Privacy Select Advertising Toggle the Limit Ad Tracking switch Even if you turn this feature off, Apple can still collect data about you to send ads in the right language and for the right location.

Airplane seat cameras: US senators raise concerns

Airplane seat cameras: US senators raise concerns

'Standard feature' Concerns about seatback cameras have prompted a response from two US senators.Courtesy American Airlines American Airlines told CNN Travel in early March that cameras are "a standard feature," but not activated and that the carrier has no plans to use them.

Trading privacy for survival is another tax on the poor

Trading privacy for survival is another tax on the poor

“I can’t cross-examine an algorithm.” advertisement Personal data is used to deny low-income people access to resources or opportunities, but it’s also used to target them with predatory marketing for payday loans or even straight-up scams.

A huge trove of medical records and prescriptions found exposed

A huge trove of medical records and prescriptions found exposed

According to a brief review of the data, the faxes contained a host of personally identifiable information and health information, including medical records, doctor’s notes, prescription amounts and quantities, as well as illness information, such as blood test results.

Google rolls out privacy tool for AI developers

Google rolls out privacy tool for AI developers

Google has released the TensorFlow Privacy tool, an update to its open source TensorFlow machine learning framework, that will allow developers to enhance the privacy of their AI ( artificial intelligence ) models. The use of differential privacy essentially means that AI models trained on user data can’t encode personally identifiable information.

The unauthorized sale of your health data is coming to an end

The unauthorized sale of your health data is coming to an end

Data brokers then aggregate this deidentified health information and sell it to third party buyers; for example Adam Tanner of the Harvard Institute for Quantitative Social Science estimates that a large pharmaceutical company might pay between $10 million and $40 million per year for data, consulting and services from Iqvia alone.

WhatsApp founder warns world to ‘delete Facebook’ immediately

WhatsApp founder warns world to ‘delete Facebook’ immediately

Both Mr Acton and Mr Koum had tried to find a way to monetise WhatsApp without bombarding users with adverts (file photo) FACEBOOK'S PRIVACY DISASTERS December 2018: Facebook comes under fire after a bombshell report discovered the firm allowed over 150 companies, including Netflix, Spotify and Bing, to access unprecedented amounts of user data, such as private messages.

More