Pandora's Box: Another New Way to Leak All Your Sensitive Data

Pandora's Box: Another New Way to Leak All Your Sensitive Data

Much like AWS S3 buckets, these files can be shared to anyone with the link, restricted to those within your company (Box Enterprise), or to specific users. Companies using Box Enterprise get their own sub-domain, and documents saved on Box can be shared to anyone with the unique URL.

Introducing Firefox Send, Providing Free File Transfers while Keeping your Personal Information Private

Introducing Firefox Send, Providing Free File Transfers while Keeping your Personal Information Private

Here’s how Firefox Send works: <span style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" data-mce-type="bookmark" class="mce_SELRES_start"></span> Encryption & Controls at your fingertips Imagine the last time you moved into a new apartment or purchased a home and had to share financial information like your credit report over the web.

Protecting user privacy: an approach for untraceable web browsing history and unambiguous user profiles

Protecting user privacy: an approach for untraceable web browsing history and unambiguous user profiles

In this paper, we aim to study the following problem: how many links and what links should be added to a user’s browsing history to boost user privacy while retaining high utility. When it comes to selecting actual links to hit the desired topic counts, PBooster needs access to the user’s friend list on social media.

#1: You Don’t Own Your Identity — The Digital Identity Podcast

#1: You Don’t Own Your Identity — The Digital Identity Podcast

We are delighted to present the first episode of our Digital Identity Podcast: You Don’t Own Your Identity . This podcast aims to steer you through those murky waters by providing insight into how personal information is managed and how we can provide a better alternative.

Steamp0rt/Big-Ol-Privacy-Guide

Nice looking UI, fully open source, free (albeit with premium), stores encrypted vault on cloud (but it can be self-hosted) Malwarebytes [D] - It's always good to have a second line of defense against malware, after your own common sense, of course!

Signal >> Blog >> I link therefore I am

Signal >> Blog >> I link therefore I am

Previewing the future As time goes on, we may expand the list of sites where link previews are available with new additions that include the necessary meta tags and support HTTPS connections that are compatible with Signal’s privacy-enhancing proxy.

Powerful iPhone spy tool allowed UAE to view photos, emails, texts, locations and passwords

Powerful iPhone spy tool allowed UAE to view photos, emails, texts, locations and passwords

A team of former U.S. government intelligence operatives working for the United Arab Emirates hacked into the iPhones of activists, diplomats and rival foreign leaders with the help of a sophisticated spying tool called Karma […] The […] operatives described Karma as a tool that could remotely grant access to iPhones simply by uploading phone numbers or email accounts into an automated targeting system.

Japan plans to hack into millions of its citizens’ connected devices

Japan plans to hack into millions of its citizens’ connected devices

The Japanese government will try to hack into internet-connected devices in homes and offices around the country starting from next month as part of efforts to improve cybersecurity, NHK World-Japan reports . It will be conducted by Japan’s National Institute of Information and Communications Technology (NICT).

A Future with Elon Musk’s Neuralink

A Future with Elon Musk’s Neuralink

Neuralink is one of the companies founded by Elon Musk. Elon Musk said the following in the podcast, when asked about the difference in intelligence between us regular humans and the ones that will have the chip implanted in them.

Over 140 International Airlines Affected by Major Security Breach

Over 140 International Airlines Affected by Major Security Breach

Potential attackers could view and change private information in flight bookings made by millions of customers of major international airlines because of a security issue in the Amadeus online booking system found by Safety Detective's Noam Rotem.

Windows 10 1903 may display Let's make Windows even better prompt

Windows 10 1903 may display Let's make Windows even better prompt

Windows 10 version 1903, the next feature update for Microsoft's Windows 10 operating system, may display a prompt to users to link more of their devices and services to the operating system and their Microsoft account.

How Microsoft has (so far) avoided tough scrutiny over privacy issues

How Microsoft has (so far) avoided tough scrutiny over privacy issues

Microsoft sells targeted ads against search results, and users have complained about how their data is secured in the cloud, the company hasn’t received nearly the same level of scrutiny, and it’s been years since its executives were hauled before Congress.

Apple App Store games found to be communicating with malware

Apple App Store games found to be communicating with malware

The researchers said the iPhone apps were loaded with ads, which could have duped users into tapping a link and granting permission for malware installed outside the App Store.

LinkedIn reverses course after censoring Chinese profile page of US-based human rights activist Zhou Fengsuo

LinkedIn reverses course after censoring Chinese profile page of US-based human rights activist Zhou Fengsuo

Zhou, who said he posted content such as articles and photos on LinkedIn only “sporadically”, had most recently posted a message ahead of the new year on behalf of his organisation, Humanitarian China , that mentioned the Tiananmen Square crackdown.

Are you ready? This is all the data Facebook and Google have on you | Dylan Curran

Are you ready? This is all the data Facebook and Google have on you | Dylan Curran

Click on this link to see your own data: google.com/maps/timeline?… Here is every place I have been in the last 12 months in Ireland. Click on this link to see your own data: google.com/settings/ads/ Google knows all the apps you use Google stores information on every app and extension you use.

Amazon error allowed Alexa user to eavesdrop on another home

Amazon error allowed Alexa user to eavesdrop on another home

The customer had asked to listen back to recordings of his own activities made by Alexa but he was also able to access 1,700 audio files from a stranger when Amazon sent him a link, German trade publication c’t reported.

Amazon Says 'Human Error' Allowed Alexa User to Eavesdrop on Another Home

Amazon Says 'Human Error' Allowed Alexa User to Eavesdrop on Another Home

The customer had asked to listen back to recordings of his own activities made by Alexa but he was also able to access 1,700 audio files from a stranger when Amazon sent him a link, German trade publication c't reported.

How to Purify Your Device After Clicking a Phishing Link

How to Purify Your Device After Clicking a Phishing Link

Once you’ve realized that you clicked on a phishing link, the first thing you should do is disconnect from the internet. Next, install it on your suspicious device, ignoring any prompts to connect to the internet to update the program.

CenturyLink intentionally abuses Utah law to shutdown internet and serve ads via DNS hijacking

CenturyLink intentionally abuses Utah law to shutdown internet and serve ads via DNS hijacking

Rich Snapp, one such customer went and asked State Senator Todd Weiler, the sponsor of this bill that became a law, what on earth was going on.

5 Sure Signs You Have Been Hacked

5 Sure Signs You Have Been Hacked

These messages are from hackers, and their goal is to get your friends and family to click links or visit sites where malicious software can automatically infect their devices as well. Data usage that suddenly spikes with no reasonable explanation is another sign that you have been hacked.

Report: Microsoft is scrapping Edge, switching to just another Chrome clone

Report: Microsoft is scrapping Edge, switching to just another Chrome clone

There's nothing magical about Blink or V8 that makes the Chrome password manager better than Edge's; it's just that Google has taken the time to do the work.

LinkedIn violated data protection by using 18M email addresses of non-members to buy targeted ads on Facebook

LinkedIn violated data protection by using 18M email addresses of non-members to buy targeted ads on Facebook

First, the DPC found that LinkedIn in the US had obtained emails for 18 million people who were not already members of the social network, and then used these in a hashed form for targeted advertisements on the Facebook platform, “with the absence of instruction from the data controller” — that is, LinkedIn Ireland — “as is required.”

LinkedIn used 18 million non-user e-mails to target Facebook ads

LinkedIn used 18 million non-user e-mails to target Facebook ads

Ireland’s Data Protection Commission issued a report last week (via TechCrunch) that covered its activities during the first six months of 2018, in which it highlighted a complaint against LinkedIn. It found that the company used millions of e-mail addresses of non-LinkedIn users to target ads on Facebook.

LinkedIn cuts off email address exports with new privacy setting

LinkedIn cuts off email address exports with new privacy setting

Now LinkedIn confirms to TechCrunch that “This is a new setting that gives our members even more control of their email address on LinkedIn. If you take a look at the setting titled ‘Who can download your email’, you’ll see we’ve added a more detailed setting that defaults to the strongest privacy option.

Is Intersection part of Google?

So the CEO of Sidewalk Labs, an Alphabet subsidiary, is also “responsible for overall leadership” of Intersection, a company that InLink UK, whose lead partner is Intersection, describes as a “third party”.

BT InLink in London: building a privatised "smart city" by stealth

If you want to knock something down or build something new you generally need to get planning permission from the local council. If you want to build a McDonalds in London you’d apply to the local council for planning permission.

State senator sought to weaken biometric privacy protections he had championed

State senator sought to weaken biometric privacy protections he had championed

Link's effort to change the now 10-year-old Biometric Information Privacy Act came as lawsuits were being filed by Illinois residents accusing Facebook of improperly using digital facial recognition in photo tagging.

Popular browsers made to cough up browsing history

Popular browsers made to cough up browsing history

One of the visited-link attacks – CVE2018-6137, a bug in Chrome 67 that Google fixed in June – peeled off user browsing history at the rate of 3,000 URLs per second.

Proposed EU copyright changes: is this the death of the internet?

Proposed EU copyright changes: is this the death of the internet?

This effectively means that all content contained in any link or reference to other material (such as memes and news stories) would firstly require the internet platform to obtain a license before it could be shared.

Twitter is being investigated over its collection of data in its link-shortening system

Twitter is being investigated over its collection of data in its link-shortening system

The Ireland Data Protection Commission is investigating the social network since they refused to provide their t.co web link tracking data to UK professor, Michael Veale. The situation could become dire if the DPC and the EU’s Data Protection Board were to find that Twitter had violated the regulations of the GDPR.

More