Popular browsers made to cough up browsing history

Popular browsers made to cough up browsing history

One of the visited-link attacks – CVE2018-6137, a bug in Chrome 67 that Google fixed in June – peeled off user browsing history at the rate of 3,000 URLs per second.

Stop Using Microsoft Edge To Download Chrome -- Unless You Want Malware

Stop Using Microsoft Edge To Download Chrome -- Unless You Want Malware

Except that when he clicked it the resulting domain was "GoogleOnline2018.com." The fake site isn't an exact copy of Google's own Chrome landing page, but looks genuine enough to fool people.

How Google Protected Andy Rubin, the ‘Father of Android’

How Google Protected Andy Rubin, the ‘Father of Android’

Instead, the company handed him a $90 million exit package, paid in installments of about $2 million a month for four years, said two people with knowledge of the terms.

Startpage.com

Startpage.com

So why are online companies harvesting our personal data without our consent? That’s why we’re developing online tools that help you to stay in control of your personal information. Because it’s our belief that personal data should be your data, not Big Data.

Google makes it easier to delete your search history

Google makes it easier to delete your search history

Today's change makes things a lot easier as it requires just a click on the "Your data in Search" page to clear the entire search history that Google associates with the account.

Easy censorship-resistant communication with Syndie

Easy censorship-resistant communication with Syndie

Syndie operates like blogs, newsgroups, and forums. Then click “Create posts,” now see “Anyone can reply to an authorized post” is checked? If you want to make your forum as “forum,” then simply check “Anyone can post” in “Create posts.”

Apple to US users: Here's how you can now see what personal data we hold on you

Apple to US users: Here's how you can now see what personal data we hold on you

The move brings the four countries in line with Europe, where Apple began offering a simpler way to download a copy of user data in May, just before the EU's strict GDPR privacy legislation came into effect.

Securing your users' authentication

Securing your users' authentication

This way, if a user’s account is compromised and the attacker locks the user out, the user can still use the printed page to reset their account, change their password and add two-factor auth to make the account more secure.

Despite new rules, tracking political ad spend across Facebook, Google, and Twitter remains difficult

Despite new rules, tracking political ad spend across Facebook, Google, and Twitter remains difficult

Additionally, all three platforms have not given the same level of access to researchers.Assistant Professor of Computer Science and Engineering Damon McCoy VentureBeat in a phone interview that he and his team started using a scraping tool to collect data from Facebook’s ad archive almost as soon as it was released in May.

"Big Star Labs" spyware campaign affects over 11,000,000 people

"Big Star Labs" spyware campaign affects over 11,000,000 people

When you install or use the Poper Blocker Product, we collect from you: the type of device, operating system and browsers you are using; the date and time stamp; the browsing usage, including visited URLs, clickstream data or web address accessed; TabID; the browser identifier; and your Internet Protocol address (trimmed and hashed so that it cannot be used to identify you).

Firefox Lightbeam – Visually Seeing the Benefits of Privacy in Real Time

Firefox Lightbeam – Visually Seeing the Benefits of Privacy in Real Time

It gives us a unique way to test our Firefox guide and see if all of the settings changes and extensions are really making a difference. This second screenshot is visiting the exact same site with the hardening guide optimizations enabled and the extensions enabled and on their default settings.

How to delete your Google account

How to delete your Google account

If you want to remove particular Google services from your account, click Delete products and sign into your account when prompted. You'll see a list of all the Google services associated with your account -- just click the trash can icon next to those you want to delete.

UMatrix – A Powerful Firefox Extension to Enhance Security and Privacy

UMatrix – A Powerful Firefox Extension to Enhance Security and Privacy

uMatrix adds Cookie, CSS, Media/Image, Script, XML Http Requests (XHR), Frame, and other types of blocking to your security and privacy arsenal, and it allows the user to fine tune each of these types of blocking to the user’s preference.

Reasons not to use (i.e., be used by) Facebook

Under pressure from cross-dressers, Facebook said it would relax the 'real name' policy and allow people to use aliases, but only if they are generally known by those aliases or if they were victims of certain types of abuse or stalking.

No More Google

No More Google

Google Chrome ⟶ 170 pts 👍 Firefox Google Search ⟶ 109 pts 👍 Duck Duck Go Google Analytics ⟶ 31 pts 👍 Simple Analytics Google Mail ⟶ 37 pts 👍 ProtonMail Google Authenticator ⟶ 19 pts 👍 Authy 5 pts 👍 Zoho

Apple is quietly giving people 'trust scores' based on their iPhone data

Apple is quietly giving people 'trust scores' based on their iPhone data

The tech giant, which last month became the first public company to be worth more than $1 trillion (£757bn), said in an update to its privacy policy that the scores would be determined by tracking the calls and emails made on Apple devices.

Three years later, Let’s Encrypt has issued over 380 million HTTPS certificates

Three years later, Let’s Encrypt has issued over 380 million HTTPS certificates

That means bloggers, single-page websites and startups alike can get an easy-to-install certificate for free — even news sites like TechCrunch rely on Let’s Encrypt for a secure connection.

The British Airways Breach: How Magecart Claimed 380,000 Victims

The British Airways Breach: How Magecart Claimed 380,000 Victims

Recently, Magecart operatives placed one of these digital skimmers on Ticketmaster websites through the compromise of a third-party functionality resulting in a high-profile breach of Ticketmaster customer data.

An SEO Expert Has Shown How Chrome’s Back Button can be Hijacked to Spy on Users

An SEO Expert Has Shown How Chrome’s Back Button can be Hijacked to Spy on Users

Typically, a security researcher would first confidentially disclose a vulnerability in the Chrome browser directly to Google, instead of to the world, as Petrovic did on the Dejan website.

AMP: the missing controversy – Ferdy Christant

AMP: the missing controversy – Ferdy Christant

The main goal of this article though is to add a new point of controversy, one hardly discussed. AMP has been created completely outside of W3C and WHATWG, the main standard bodies for the web.

Google AMP Can Go To Hell

Google AMP Can Go To Hell

Basically, Google has forced websites – specifically news publishers – to create AMP versions of their articles. Google wants publishers’ AMP version to look, feel, and behave exactly like the regular version of the website.

Facebook opens up its ads pixel to a limited number of Groups

Facebook opens up its ads pixel to a limited number of Groups

We’re now expanding Group Insights to let Group admins and brands link their groups with their existing Facebook ads pixel, allowing them to understand how members in their Group engage with their websites.

Ask Siri for Your Forgotten Passwords

Ask Siri for Your Forgotten Passwords

Alternatively, you can just ask Siri for the password for a particular site or app and she’ll take you to the account page in settings with the password information you requested.

Firefox will soon block ad-tracking software by default

It’s going to study the effects of blocking trackers that slow page times starting next month, and it will make that feature on by default in Firefox 63 if it proves successful in improving performance.

Lufthansa data leak: What a single URL can reveal about you

Lufthansa data leak: What a single URL can reveal about you

When not carefully implemented, these scripts can capture the unique URLs pointing to an order/booking details page – meaning that third parties now have access to all that data.

Third-party cookies - the guests who won't leave

Third-party cookies - the guests who won't leave

We argue that we should aim to return to a web where third-party cookies are blocked by default, and are making that possible for users of our anti-tracking technology in Cliqz and Ghostery, however this is made difficult by the prevailing assumption that cookies are a free-for-all, making many sites fail to function properly in this environment.