Antitrust case against Google similar to Microsoft's: Mississippi AG

Antitrust case against Google similar to Microsoft's: Mississippi AG

"We attorneys general have authority under consumer protection acts to do both," Hood said on "The Exchange." "So it'll be a multifaceted suit or, hopefully, we can get a settlement if we can get some agreement with them." Several state attorneys generals recently spoke about their willingness to go after the likes of , Google and other tech giants in interviews with The Washington Post .

Beijing AI Targets “Hospital Scalpers”

Beijing AI Targets “Hospital Scalpers”

An AI system misunderstood a bus ad featuring Chinese billionaire Mingzhu Dong, falsely identifying her as a jaywalker Over 900 hospital scalpers were detained in Beijing last year as part of a citywide crackdown.

Confessions of a private spy

Confessions of a private spy

Of course, Weinstein hired Black Cube - an organisation staffed by ex-Mossad operatives and a favoured plaything of some of the less savoury individuals stalking the planet - to spy on McGowan.

How Target Snooped on Shoppers, Changed Prices Based on Location

How Target Snooped on Shoppers, Changed Prices Based on Location

It reads, in part, “We’ve made a number of changes within our app to make it easier to understand pricing and our price match policy.” In essence, the firm has added language to its app that makes clear a price is valid in a store or online — see the screenshot below, provided by Target.

Facial Recognition Surveillance Now at a Privacy Tipping Point

Facial Recognition Surveillance Now at a Privacy Tipping Point

Facebook, for example, now uses AI-powered facial recognition software as part of its core social networking platform to identify people, while law enforcement agencies around the world have experimented with facial recognition surveillance cameras to reduce crime and improve public safety.

The case against behavioral advertising is stacking up

The case against behavioral advertising is stacking up

We have not been impacted from a revenue standpoint, and, on the contrary, our digital advertising business continues to grow nicely.” So while (of course) not every publisher is the NYT, publishers that have or can build brand cachet, and pull in a community of engaged readers, must and should pause for thought — and ask who is the real winner from the notion that digitally served ads must creep on consumers to work?

Mapping Who Lives in Border Patrol's '100-Mile Zone'

Mapping Who Lives in Border Patrol's '100-Mile Zone'

Congress also authorized CBP to set permanent and temporary checkpoints, patrol highways, and board buses, trains, and other vehicles “within a reasonable distance” of the U.S. border, which regulations in 1953 set as “up to a 100 miles.” These regulations were made to allow border officers to intercept unauthorized entrants who had bypassed checks at ports of entry.

Qubes OS 4.0.1 has been released!

Qubes OS 4.0.1 has been released!

Similarly, if you’re currently using a Qubes 4.0.1 release candidate (4.0.1-rc1 or 4.0.1-rc2), and you’ve followed the standard procedure for keeping it up-to-date, then your system is equivalent to a 4.0.1 stable installation, and no additional action is needed.

The Apple Secret or the Secret Apple? Will Privacy as Marketing Plan Survive?

The Apple Secret or the Secret Apple? Will Privacy as Marketing Plan Survive?

Together, the four Chinese companies make up a third of the world's active smartphones." With China leading the way, many of the countries where non-Apple devices are selling better than iPhones are not known for their overarching concern about consumer privacy, much less laws protecting it.

CES 2019 – AI Assistants Are Multiplying, Are We Privacy-Ready?

CES 2019 – AI Assistants Are Multiplying, Are We Privacy-Ready?

The statement was in the form of a large ad that stated, “What happens on your iPhone, stays on your iPhone.” Apple is correct to bring up privacy at a time when tech companies will have more data and information than ever before from AI-powered speakers.

Massive 'Fortnite' security hole allowed hackers to take over accounts, eavesdrop on chats

Massive 'Fortnite' security hole allowed hackers to take over accounts, eavesdrop on chats

By Variety LOS ANGELES — "Fortnite" players were exposed to hackers who could control their accounts, purchase in-game items through their credit cards, and drop into in-game chats posing as the hacked player, cybersecurity firm Check Point Software Technologies discovered in November.

Vizio Claims Smart TVs Spy on You for Your Own Good

Vizio Claims Smart TVs Spy on You for Your Own Good

According to Baxter, Vizio believes it’s the industry leader in disclosing how tracking is occurring and allowing people to opt out of it.

Exploring Privacy Pass

Let’s say the secret key of the Privacy Pass server is the number and there’s a publicly known point on the curve called and execute the protocol as follows: This has the problem of tracking, since the server will be able to store all this data and correlate it to the user when the s is used by the user.

How To Blow Your Online Cover With URL Previews

How To Blow Your Online Cover With URL Previews

The difference with URL previews in messaging applications is that you are broadcasting to the website owner that you are discussing the website, as opposed to just browsing to it.

Privacy Inequality: The Most Brutal Form of Inequality You’ve Ever Imagined

Privacy Inequality: The Most Brutal Form of Inequality You’ve Ever Imagined

But the one that’s coming will intensify this situation in every way, dehumanizing the people who won’t be able to afford to pay for privacy. 3. Dehumanizing people: The Protected and The Predictable What’s happening now isn’t just that data increases its value over time.

BroadbandBreakfast.com: How to Understand The Future of Privacy Policy: A Q&A With David Brin

BroadbandBreakfast.com: How to Understand The Future of Privacy Policy: A Q&A With David Brin

BROADBAND BREAKFAST INSIGHT: We remember reading The Transparent Society 20 years ago, back in the days when Sun Microsystems CEO Scott McNealy said, "You have no privacy; get over it." Brin's book was remarkably prescient in providing a pathway for how to live with the ever-decreasing private space occasioned by technological progress.

It Appears China is Building a Massive Espionage Database on America

It Appears China is Building a Massive Espionage Database on America

Summary China is owning us with impunity, and they’re building massive databases to help them target high-value individuals and companies for information and/or leverage Most people aren’t aware of this level of organization and strategic, long-term thinking on their part, and they should be I’m not sure how to fault them for doing this, other than to point out that much of it is illegal.

What We Can Learn About Online Privacy From Climate Change

What We Can Learn About Online Privacy From Climate Change

But let’s be realistic: They’re small measures when you consider the big picture, that the gears of the online world are greased with our data.

EU-U.S. Privacy Shield Renewed, Privacy Commitments Ignored

EU-U.S. Privacy Shield Renewed, Privacy Commitments Ignored

The European Commission has renewed the EU-U.S. Privacy Shield, a framework permitting the flow of European consumers' personal data to the U.S. Oddly, the Commission cited the FTC investigation into the Cambridge Analytica scandal (which has produced no outcome) and the appointment of three members to the PCLOB as support for renewal.

Electric vehicles are sending real-time location and diagnostic data to Chinese government monitoring centers

Electric vehicles are sending real-time location and diagnostic data to Chinese government monitoring centers

Global carmakers are feeding real-time location information and dozens of other data points from electric vehicles to Chinese government monitoring centres, potentially adding to China’s rich kit of surveillance tools as President Xi Jinping steps up the use of technology to track Chinese citizens.

Schneier on Security

Reality #2: Any data point you share with a company will in all likelihood eventually be hacked, lost, leaked, stolen or sold ­ usually through no fault of your own.

5 Best Raspberry Projects that will provide you online security

5 Best Raspberry Projects that will provide you online security

Everyone needs an online security due to high eminence hacking and different malicious malware attacks. So, today in this lesson, we’ll discuss the best 5 Raspberry Pi projects that will provide you a strong online security from hackers.

Microsoft Office collects email data in breach of GDPR, regulator rules

Microsoft Office collects email data in breach of GDPR, regulator rules

Dutch investigators said they had found large scale collection of personal data through Office, which Microsoft collected without informing users. However, the report found that Microsoft does collect data including email subject lines and snippets of content.

Google Maps has become a big bloated mess of features nobody wants

Google Maps has become a big bloated mess of features nobody wants

Yeah, most people use Google Maps to look up directions to place and find nearby restaurants or bars, but I can't help but feel Google's cramming too many features into the app.

Branch.io Flaws may have affected as many as 685 million individuals

Branch.io Flaws may have affected as many as 685 million individuals

More than 685 million users may have been exposed to XSS attacks due to a flaw in Branch.io service used by Tinder, Shopify, and many others. “Digging deeper, we found out many big websites were sharing the vulnerable endpoint in their code and domains, including Shopify, Yelp, Western Union, and Imgur.

Police forcing me to install Jingwang spyware app, how to minimize impact?

Police forcing me to install Jingwang spyware app, how to minimize impact?

By watching the traffic leaving this app (which can be easily intercepted in the network itself since there is no SSL encryption) you can figure out what requests it sends to the destination server and what responses it expects back.

For Google, you're neither the consumer nor the product. You're a data point.

For Google, you're neither the consumer nor the product. You're a data point.

I bet it was a successful experiment for Google: by using the app, you’ve generated a lot of important information, helped them learn useful patterns and god knows what else.

Privacy Outrage! Chrome 69 Uploading browsing data without a choice – Informassive

Privacy Outrage! Chrome 69 Uploading browsing data without a choice – Informassive

With no denial to the fame and popularity it enjoys, and with all due respect to the quality of services it provides, Google still faces a lot of flak for its continued dismissal of user privacy. In this mode, all your browsing data is synced to the cloud to be available across devices.

Does the internet know you better than you know yourself?

Does the internet know you better than you know yourself?

People might care more about their online privacy if the full power of online service providers, especially social media apps like Facebook, were more obvious to us as ordinary internet users.

Steve Bannon Wants to Nationalize Facebook and Google’s Data

Steve Bannon Wants to Nationalize Facebook and Google’s Data

Bannon isn’t alone in this mindset: conservatives have grown exponentially less trusting of Silicon Valley in general, and social-media companies in particular, in the years since the 2016 election, as Facebook, Twitter, and Google have begun to crack down on hate speech, foreign propaganda, and conspiracy theories.

More