Microsoft, Amazon Top BEC's Favorite Brands

Microsoft, Amazon Top BEC's Favorite Brands

Nearly two-thirds of email attacks spoofing brand names impersonate Microsoft or Amazon, according to one of two studies released today on advanced emailed threats.

How to painlessly remember your passwords – Data Driven Investor – Medium

How to painlessly remember your passwords – Data Driven Investor – Medium

Hence, that example satisfies all requirements for creating a secure password to have upper, lower case letters, special character and number and in the same time noticeably effortless to remember the phrase, today’s computer technology will require at least 550 years to crack that password!

Facebook’s New ID Verification System Is Intrusive

Facebook’s New ID Verification System Is Intrusive

Each time we tried to advertise for the magazine, Facebook was automatically blacklisting the post with errors like. Now, Facebook suggests that you should become “verified” in order to create posts with political content.

An evolution in private messaging | Networks Asia

An evolution in private messaging | Networks Asia

The potential applications of distributed messaging networks, where users own their data, and privacy and security are in-built by design, are worthy of exploration.

EFF Dice-Generated Passphrases

EFF Dice-Generated Passphrases

This page includes information about passwords, different wordlists, and EFF's suggested method for passphrase generation. Use the directions below with EFF's random number generator dice or your own set. EFF's Short Wordlist #2 [.txt], for use with four dice, featuring longer words that may be more memorable.

An open letter to Tim Cook, from

An open letter to Tim Cook, from

At /e/Foundation, we’re building a new mobile ecosystem for users first: it respects their personal data privacy, it’s open source, and we are making it as attractive as possible, for Mom and Dad users.

Mozilla will match all donations to the Tor Project

Mozilla will match all donations to the Tor Project

This process later continued in Firefox 55 when Mozilla added a Tor Browser feature known as First-Party Isolation (FPI), which worked by separating cookies on a per-domain basis, preventing ad trackers from using cookies to track users across the Internet.

Why the NSA Called Me After Midnight and Requested My Source Code

Why the NSA Called Me After Midnight and Requested My Source Code

Maybe people would die, or at least Dave instilled that impression on me as he politely asked if I would be willing to give him my source code; all the while, apologizing for not being able to tell me anything more about the situation.

Mobile app data sharing 'out of control'

Mobile app data sharing 'out of control'

Google said it had clear policies for how developers could handle data, and that the research had mischaracterised some "ordinary functions" of apps. The researchers found that more than 88% of free apps on Google Play shared information with firms owned by Alphabet.

Smart home makers hoard your data, but won’t say if the police come for it

Smart home makers hoard your data, but won’t say if the police come for it

We asked some of the most well-known smart home makers on the market if they plan to release a transparency report, or disclose the number of demands they receive for data from their smart home devices.

The Release of the – MaidSafe – Medium

The Release of the – MaidSafe – Medium

Crust supports hole punching so nodes can connect directly when they might otherwise not be able to. Put simply, this describes the way that Crust itself stores a dynamic list of directly-accessible peers that a node can contact if it wants to join the Network.

What’s the difference between Monero, Zcash, and BEAM?

What’s the difference between Monero, Zcash, and BEAM?

That means that when Monero reaches Bitcoin’s current scale concerning the total number of transactions, its blockchain will be about 5 terabytes — hardly sustainable for a regular PC, let alone on smaller devices.

Crowd Counting Through Walls with WiFi

Crowd Counting Through Walls with WiFi

Researchers in UC Santa Barbara professor Yasamin Mostofi’s lab have given the first demonstration of crowd counting through walls using only everyday communication signals such as WiFi. The technique, which requires only a wireless transmitter and receiver outside the area of interest, could have a variety of applications, including smart energy management, retail business planning and security.

Facebook bug prevented users from deleting their accounts

Facebook bug prevented users from deleting their accounts

Until just a few days ago, some Facebook users could not delete their accounts — the option to do so simply didn’t work. No matter what I tried, and regardless of which browser I used, the Facebook help page for deleting your account would not load when logged into his account:

What Facebook's Address Book Mining Tells Us About Our Privacy

What Facebook's Address Book Mining Tells Us About Our Privacy

Last week Gizmodo reported on its own experiments confirming the findings of a new academic study regarding Facebook’s “shadow profiles” including the company’s practice of associating contact information with user accounts that was not willingly provided by those users, but rather obtained from the address books of other users.

Travellers refusing digital search now face $5000 Customs fine

Travellers refusing digital search now face $5000 Customs fine

The new requirement for reasonable suspicion did not rein in the law at all, Mr Beagle said. Customs Minister Kris Faafoi said the power to search electronic devices was necessary. Border officials searched roughly 540 electronic devices at New Zealand airports in 2017.

Google wants to monitor your mental health. You should welcome it into your mind

Google wants to monitor your mental health. You should welcome it into your mind

He’s going to investigate how technology can help diagnose and treat mental health conditions . A growing number of people choose to track their own physical condition using FitBits, Jawbones and other activity trackers, tiny wearable devices that monitor your movements, pulse rate, sleep patterns and more.

What to Know About Aadhaar, India's Biometric Identity System

What to Know About Aadhaar, India's Biometric Identity System

India’s Supreme Court, in a landmark ruling, said that private companies could no longer require users to provide their Aadhaar details as a condition of service.

What The Heck, Facebook? – The Startup – Medium

What The Heck, Facebook? – The Startup – Medium

Hill ran a Facebook ad specifically targeting a single user, a computer science professor named Alan Mislove. Hill used a phone number that Mislove had never given to Facebook, so in theory they shouldn’t have that number.

You Gave Facebook Your Number For Security. They Used It For Ads.

You Gave Facebook Your Number For Security. They Used It For Ads.

They found that Facebook harvests user phone numbers for targeted advertising in two disturbing ways: two-factor authentication (2FA) phone numbers, and “shadow” contact information. However, until just four months ago, Facebook required users to enter a phone number to turn on any type of 2FA, even though it offers its authenticator as a more secure alternative.

Facebook Is Giving Advertisers Access to Your Shadow Contact Information

Facebook Is Giving Advertisers Access to Your Shadow Contact Information

One of the many ways that ads get in front of your eyeballs on Facebook and Instagram is that the social networking giant lets an advertiser upload a list of phone numbers or email addresses it has on file; it will then put an ad in front of accounts associated with that contact information.

Scroll Explainer: What is the Aadhaar case and what is at stake for Indians?

Scroll Explainer: What is the Aadhaar case and what is at stake for Indians?

Beginning in 2009, the Indian government began enrolling residents onto a platform known as Aadhaar, which provided each enrollee with a 12-digit unique identification number linked to both their demographic and biometric details, including fingerprints and iris scans.

Encrypting SNI: Fixing One of the Core Internet Bugs

Encrypting SNI: Fixing One of the Core Internet Bugs

1 (888) 99-FLARE UK callers UK callers Singapore callers Find a Local Number Cloudflare provides performance and security for any website. More than 8 million websites use Cloudflare. Cloudflare works at the DNS level. To learn more, please visit our website

Privacy under attack, but does anybody care?

Carnegie Mellon privacy economist Alessandro Acquisti has run a series of tests that reveal people will surrender personal information like Social Security numbers just to get their hands on a measly 50-cents-off coupon.

Effectively Measuring Search in Firefox

Last year, we announced new telemetry measurements to count follow-on searches that start in Firefox and continue on search engine pages. The new measurements will give a fuller picture of search activity while maintaining user privacy by limiting collection to aggregate counts.

Apple CEO Tim Cook pens open letter to FBI: We will not build a backdoor into iPhone, not even to investigate terrorists

Apple CEO Tim Cook pens open letter to FBI: We will not build a backdoor into iPhone, not even to investigate terrorists

In "A Message to Our Customers" posted on Apple's website, CEO Tim Cook declared the company's intention to fight the federal government's request to hack users in response to the recent mass-killing in San Bernardino, California.

AT&T and Verizon want to manage your identity across websites and apps

AT&T and Verizon want to manage your identity across websites and apps

The four major US mobile carriers have unveiled a system that would let them manage your logins across any third-party website or app that hooks into it. AT&T VP Johannes Jaskolski, who is managing the carriers' Project Verify consortium, told Krebs that the system will not centralize subscriber data into a multi-carrier database.

Poll Shows GDPR Compliance Lacking

Poll Shows GDPR Compliance Lacking

Only 34.5 % of the approximately 500 professionals responsible for compliance to the European Union (EU) General Data Protection Regulation (GDPR) report maintaining practices that are in keeping with the regulation, a recent Deloitte poll.

Facebook opens up its ads pixel to a limited number of Groups

Facebook opens up its ads pixel to a limited number of Groups

We’re now expanding Group Insights to let Group admins and brands link their groups with their existing Facebook ads pixel, allowing them to understand how members in their Group engage with their websites.

GDPR - What happened?

GDPR - What happened?

In this article we look at the effect GDPR has had on the tracking landscape, the effects it has on the distribution of the market share in online advertising in Europe, and conclude with a recommendations to make the legislation suitable for the web of today.

More