Tech Experts: What You Post Online Could Be Directly Impacting Your Insurance Coverage

Tech Experts: What You Post Online Could Be Directly Impacting Your Insurance Coverage

“Especially for claims, they look into social media, looking to see if someone’s driving a motorcycle without a helmet or posting pictures drinking and smoking,” said Duarte Pereira, senior VP of FitechGelb.

I’m 14, and I quit social media after discovering what was posted about me

Teens get a lot of warnings that we aren’t mature enough to understand that everything we post online is permanent, but parents should also reflect about their use of social media and how it could potentially impact their children’s lives as we become young adults.

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Two years ago, Google has silently handed the project E2EMail which was started to enable easy end-to-end encryption in Gmail via a browser extension to "the open source community". Three years earlier, Google had announced that they are building an end-to-end encrypted Chrome plugin to automatically encrypt emails between Gmail users.

US red lines for digital trade with the UK cause alarm

| Javier Ruiz US red lines for digital trade with the UK cause alarm The US government has published its negotiating objectives for a trade deal with the UK, which include some worrying proposals on digital trade, including a ban on the disclosure of source code and algorithms, and potential restrictions on data protection.

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Use credit instead of debit – When running a transaction as debit and entering your PIN, you are foregoing many of the protection features of the card per your user agreement.

DuckDuckGo Testimony Before the United States Senate

DuckDuckGo Testimony Before the United States Senate

Below is the prepared testimony of Gabriel Weinberg , CEO & Founder of DuckDuckGo, before the United States Senate Judiciary Committee Hearing on GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation .

World Day Against Cyber Censorship 2019 — Who are the Biggest Enemies of the Internet?

World Day Against Cyber Censorship 2019 — Who are the Biggest Enemies of the Internet?

Current ‘Enemies of the Internet’: The governments of these countries usually block popular applications and technologies, filter specific websites and sometimes even manipulate the content that is allowed by sharing propaganda and fake news. Privacy and geo-blocked content bypass, are the two main purposes of the VPN, so it’s an essential tool when fighting cyber censorship.

#IWD2019 Online gender-based violence: a privacy matter?

#IWD2019 Online gender-based violence: a privacy matter?

The need for a gendered right to privacy All of these cases show that with technologies transforming our experience of the world, we will need a right to privacy well suited to protect women and gender diverse people from new forms of abuses, which will keep emerging as long as the patriarchal structures that fuel gender-based violence remain unchallenged.

Facebook Plans to Become World’s Biggest Central Bank?

Facebook Plans to Become World’s Biggest Central Bank?

If Facebook issued its own digital currency, and all its users had a Facebook mobile wallet with Facebook coins in it, then the need for credit cards will diminish more and more.

Google Maps could point users down the wrong path

Google Maps could point users down the wrong path

Should a person call one of these institutions by accessing it through Google Maps, the inquiry will be answered by a fraudster who will then press the caller to divulge their bank details or credit card information before subsequently attempting to take as much money as possible.

When Kids Realize Their Whole Life Is Already Online

When Kids Realize Their Whole Life Is Already Online

“These parents act as both gatekeepers of their children’s personal information and as narrators of their children’s personal stories.” Read: The perils of “sharenting” Preschools and elementary schools often keep blogs or upload photos of kids to Instagram accounts and Facebook pages so that working parents can feel like a part of their kids’ day.

Chinese facial recognition database exposes 2.5m people

Chinese facial recognition database exposes 2.5m people

They make artificial intelligence-based security software systems f… twitter.com/i/web/status/1… — Victor Gevers (@0xDUDE) The database housed records on over 2.5m people, including their gender, nationality, address, date of birth, photo, and employer.

One click and you're out: UK makes it an offence to view terrorist propaganda even once

One click and you're out: UK makes it an offence to view terrorist propaganda even once

But a controversial inclusion was to update the offence of obtaining information "likely to be useful to a person committing or preparing an act of terrorism" so that it now covers viewing or streaming content online.

Nest Secure had a secret microphone, can now be a Google Assistant

Nest Secure had a secret microphone, can now be a Google Assistant

Nest Guard does have one on-device microphone that is not enabled by default.” [ Read also: The IoT security survival guide | Get the latest from CSO: Sign up for our newsletters ] Nest Secure owners have been able to use Google Assistant and voice commands, but it previously required a separate Google Assistant device to hear your commands.

7 things to do on Clean Out Your Computer Day 2019

7 things to do on Clean Out Your Computer Day 2019

It’s best to clean out manually so you don’t accidentally delete something important. And if you feel like you’re getting too much advertising emails from companies — don’t forget to unsubscribe.

Firefox fights for family privacy

Firefox fights for family privacy

With Firefox, digital privacy becomes a little more possible for your family Firefox products work by collecting a minimum amount of sensitive information about the people who use them, such as their browsing habits.

People and publishers start to turn against micro-targeted advertising and its harms to privacy

People and publishers start to turn against micro-targeted advertising and its harms to privacy

Although readers of this blog will be familiar with these practices, it seems that the general public is only just waking up to micro-targeted ads and real-time bidding based on categorization of users and their interests.

Companies Are Not Going to Stop Collecting Your Data – Here’s Why

Companies Are Not Going to Stop Collecting Your Data – Here’s Why

Just take one look at Facebook, seen twice in my list of recent breaches above, as the best example of why you still need to worry about your data online. Nearly every online company has questionable data privacy practices, from Google to Amazon to Apple to Yahoo and Microsoft.

Explainer: With new rules to snoop and censor on…

Explainer: With new rules to snoop and censor on…

Called the Intermediary Rules, 2011 , they are drafted under the Information Technology Act, 2000 that provides immunity to online platforms and internet service providers for content which is transmitted and published by end users.

How to protect yourself this Data Privacy Day

How to protect yourself this Data Privacy Day

Use complex passcodes for your devices – Alice Duckett It’s not just passwords for your email addresses and social media accounts that need to be secure – ensure that your laptop and mobile phone are secure too.

Expect More From Tor in 2019

Expect More From Tor in 2019

We spent 2018 fighting for the fundamental human rights to privacy and freedom online and made our software more accessible than ever before. More people need robust censorship circumvention tools as internet freedom declines around the world.

Your digital identity has three layers, and you can only protect one of them

Your digital identity has three layers, and you can only protect one of them

It is shaped by technology companies and advertisers who make key decisions based on their interpretation of seemingly benign data points: what movies you choose to watch, the time of day you tweet, or how long you take to click on a cat video.

Celebrate Data Privacy Day with most advanced privacy softwares

Celebrate Data Privacy Day with most advanced privacy softwares

Privacy extensions These are the few extensions that I would recommend having in order to increase your privacy online: Privacy badger — It’s a free and open-source browser extensions created by Electronic Frontier Foundation.

Cyber security expert: 'private social media' is an oxymoron

Cyber security expert: 'private social media' is an oxymoron

"Is there a way to camouflage who they actually are, I mean there must be but, I don't know much about it." Teaching parents how to use new phones or apps is just as important as teaching the kids, said Guerry.

Declutter Your Data 2019

Declutter Your Data 2019

Day 5 – Change Your Passwords on Remaining Accounts After you have reduced or simplified your list of online accounts, you now have an inventory of the websites and companies that constitute your digital identity.

Apple CEO Tim Cook: It's Time for Action on Data Privacy

Apple CEO Tim Cook: It's Time for Action on Data Privacy

Last year, before a global body of privacy regulators, I laid out four principles that I believe should guide legislation: First, the right to have personal data minimized.

Americans reluctant to pay for privacy

Americans reluctant to pay for privacy

The survey found that when potential tradeoffs were not part of the question, approximately 80 per cent of Americans agreed they would like Google, Facebook and other online services to collect less of their data.

DuckDuckGo switches to privacy-focused Apple Maps to ‘set a new standard of trust online’

DuckDuckGo switches to privacy-focused Apple Maps to ‘set a new standard of trust online’

Screen Cleaner DuckDuckGo shared the news on its blog today : The company said it is excited to be working with Apple to “set a new standard of trust online, and we hope you’ll enjoy this update.” It is also seeking feedback from users to help improve searches.

Stopping Unsolicited Mail, Phone Calls, and Email

Stopping Unsolicited Mail, Phone Calls, and Email

The good news is that you can cut down on the number of unsolicited mailings, calls, and emails you receive by learning where to go to "just say no." Consumer Reporting Companies If you decide that you don't want to receive prescreened offers of credit and insurance, you have two choices: You can opt out of receiving them for five years or opt out of receiving them permanently.

Cyberstalking: Definition, Laws, and How to Stay Safe

Cyberstalking: Definition, Laws, and How to Stay Safe

Most people are victimized for an average of Cyberstalking is a serious crime with scary statistics. However, most organizations that specialize in this area have definitions that contain the same elements: While stalking can be done by a stranger, most victims know their stalker.

More