'Is that even legal?': Companies may be sharing new credit or debit card information without you knowing

'Is that even legal?': Companies may be sharing new credit or debit card information without you knowing

Vanessa Acuña blames an "updating service" that some credit and debit card companies have that allows new account numbers and expiry dates to be shared with merchants customers have dealt with in the past.

Research: Classification of attacks on Tor clients and Tor hidden services

Research: Classification of attacks on Tor clients and Tor hidden services

This message will be routed from the entry node of the hidden service, which is controlled by the adversary, to the central server and will include information such as the circuit ID, the cell timestamp, the source IP address, and the circuit ID.

DARPA is Working on an Anonymous Mobile Communication System

DARPA is Working on an Anonymous Mobile Communication System

The United States’ Defense Advanced Research Projects Agency (DARPA) is behind the many innovative and useful technologies such as Unix, GPS, Tor, etc. Read More: DARPA is Developing a Secure Open Source Voting System.

Hackers Steal More Than 100 Mercedes-Benz Cars in Chicago by Hacking Car2Go Car-Sharing App: Report

Hackers Steal More Than 100 Mercedes-Benz Cars in Chicago by Hacking Car2Go Car-Sharing App: Report

According to Edwards, Car2Go was "hacked " and, as a result, there were as many as 100 fleet vehicles unaccounted for in the car sharing provider's Chicago market. BMW, Daimler May Combine Car-Sharing Services Car2Go and ReachNow, Report Says Posted in Tech.

How To Stop Using Free Email

How To Stop Using Free Email

So for most free services like Gmail, Yahoo, or Hotmail, you're not going to be able to use your existing email address with a different email provider. The next thing you want to do is update all your online accounts that use your old address to contact you.

“Blockchain in Cybersecurity: The future?” (From our Forums.)

“Blockchain in Cybersecurity: The future?” (From our Forums.)

NASA has decided to use blockchain technology as a way of enhancing security and minimizing denial of service and other different traffic service attacks. Also, blockchain security means there is no centralized authority in control of the network to verify the data going through it which makes it hard for hackers to orchestrate an attack.

Microsoft disabled or replaced these Google features in the new Edge

Microsoft disabled or replaced these Google features in the new Edge

Microsoft published a list of services that it replaces or disabled in the Chromium-based version of Microsoft Edge recently.

Using Disposable Services

Using Disposable Services

These services come in the form of disposable mailboxes and phone numbers. Don’t use these for anything personal as multiple people will be able to see it.

Amazon staff listen to customers' Alexa recordings, report says

Amazon staff listen to customers' Alexa recordings, report says

Amazon employees around the world regularly listen to recordings from the company’s smart speakers as part of the development process for new services, Bloomberg News reports.

Facebook still tracks you after you deactivate account

Facebook still tracks you after you deactivate account

Deactivating isn't as extreme, the company says, and the social network continues collecting your data in case you change your mind and want to return to your profile.

Smart speaker recordings reviewed by humans

Smart speaker recordings reviewed by humans

Image copyright Getty Images Image caption Google Home, Amazon Echo and Apple HomePod speakers According to Apple's security policy, voice recordings lack personally identifiable information and are linked to a random ID number, which is reset every time Siri is switched off.

Why Won’t Twitter Help Us Delete Our Tweets?

Why Won’t Twitter Help Us Delete Our Tweets?

But for many tweet deleters, getting rid of old posts is a practical matter — a replacement for simple and obvious Twitter privacy features that simply do not exist.

Two in Three Hotel Websites Leak Guest Booking Details and Allow Access to Personal Data

Two in Three Hotel Websites Leak Guest Booking Details and Allow Access to Personal Data

Since the email requires a static link, HTTP POST web requests are not really an option, meaning the booking reference code and the email are passed as arguments in the URL itself.

An Amazon employee might have listened to your Alexa recording

An Amazon employee might have listened to your Alexa recording

A spokesperson defended the company's practices, however, telling Bloomberg that the e-commerce giant only listens to "an extremely small sample" and that its employees do not have access to identifying information:. We only annotate an extremely small sample of Alexa voice recordings in order [to] improve the customer experience.

Here's The Shocking Reality Of Completely Blocking Google From Your Life

Here's The Shocking Reality Of Completely Blocking Google From Your Life

Hill discovered that after only a few hours into her experiment, her various devices had tried to ping Google servers more than 15,000 times. Apparently that number paled in comparison to her "block Amazon challenge" which revealed 293,000 attempted pings to Amazon servers in one short week.

Jumbo is a powerful privacy assistant for iOS that cleans up your social profiles

Jumbo is a powerful privacy assistant for iOS that cleans up your social profiles

Valade and his six-person team based in New York began developing an app they hope will come to feel like your digital lawyer, a “data fiduciary” that manages privacy settings on your behalf.

Avoiding consumer lock-in with the decentralised web

Avoiding consumer lock-in with the decentralised web

Because Weavemail lives on Arweave’s permaweb, you can be confident that as long as you know the address of this transaction, and there is an available Arweave node to serve it to you, your access to this mail client as it currently exists simply cannot be denied, or changed.

List of alternative services that truly respect your privacy

List of alternative services that truly respect your privacy

Telegram, WhatsApp, Facebook Messenger, The main issue with using Telegram is that they use a slightly less secure encryption protocol than that used by Signal. The main issue with WhatsApp and Facebook messenger, though they use strong end-to-end encryption by default (just like Signal), is their collection of metadata.

Data Brokers

Data Brokers

How Consumers Can Opt Out of Directory Services and Other Information Brokers. If you know of a data broker not listed below or notice inaccuracies in the information below, please email us at: webmaster(at). Read more about opting out of Online Information Brokers.

Tomorrow, Congress Votes on Net Neutrality on the House Floor! Hear Directly from Members of Congress at 8pm ET TODAY on Reddit, and Learn What You Can Do to Save Net Neutrality!

Tomorrow, Congress Votes on Net Neutrality on the House Floor! Hear Directly from Members of Congress at 8pm ET TODAY on Reddit, and Learn What You Can Do to Save Net Neutrality!

Many people still aren’t aware of the fight for Net Neutrality, and don’t realize that it will impact them in very real ways– especially those Americans living in rural areas who have the least choice when it comes to internet service providers.

Introducing Warp: Fixing Mobile Internet Performance and Security

Introducing Warp: Fixing Mobile Internet Performance and Security

One silver lining is that if you browse the unencrypted Internet through Warp, when it’s safe to do so, Cloudflare’s network can cache and compress content to improve performance and potentially decrease your data usage and mobile carrier bill.

Privacy Policy (April 10, 2019)

Privacy Policy (April 10, 2019)

Cookies – GMG or third parties may use, place or recognize cookies, pixels, web beacons, HTML5 local storage, JavaScript, and other similar technologies on your computer, device or directly in emails/communications to help us understand how you use the Services and help us provide the Services, serve you content and and show advertising to you.

Private Internet Access (PIA) VPN Service Forges First OEM Partnership with Purism to Offer Hardware and Software Bundles with Powerful Privacy Protection

Private Internet Access (PIA) VPN Service Forges First OEM Partnership with Purism to Offer Hardware and Software Bundles with Powerful Privacy Protection

“Combining our privacy protecting VPN capabilities with Purism’s line of products will provide the ultimate security package to users,” said Ted Kim, CEO of Private Internet Access.

Millions of Facebook records were exposed on public Amazon server

Millions of Facebook records were exposed on public Amazon server

James Martin/CNET A treasure trove of data containing more than 540 million records was exposed online in a public database, security researchers from UpGuard said Wednesday. The exposed database for At the Pool contained data including photos, events and passwords, though UpGuard believes the passwords stored were for the app, not for Facebook accounts.

Facebook Caught Asking Some Users Passwords for Their Email Accounts

Facebook Caught Asking Some Users Passwords for Their Email Accounts

However, Facebook has been found asking some newly-registered users to provide the social network with the passwords to their email accounts, which according to security experts is a terrible idea that could threaten privacy and security of its users.

Opinion | Why It’s So Easy for a Bounty Hunter to Find You

Opinion | Why It’s So Easy for a Bounty Hunter to Find You

Your carrier needs this data to deliver service. But, according to recent news reports, this real-time phone location data has long been available to entities beyond your wireless carrier, for a price.

MLS and Federated Messaging

MLS and Federated Messaging

For messaging with only two participants, Loki Messenger has both an Asynchronous mode using Swarm storage on the Service Node network, and a faster Synchronous mode which allows users to send messages directly to each other via Lokinet.

Microsoft researchers spot NSA style backdoor in Huawei laptops

Microsoft researchers spot NSA style backdoor in Huawei laptops

The Microsoft Defender Advanced Threat Protection (ATP) service featured in Windows 10 version 1809 alerted researchers to an NSA-inspired backdoor vulnerability in Huawei laptops. The PCManager software included in some Huawei’s Matebook systems allows unprivileged users to create processes with superuser privileges, according to a March 25 Microsoft security post.

Protecting yourself from the ‘things’ on your home network

Protecting yourself from the ‘things’ on your home network

Sivan Rauscher, co-founder and CEO of the Israeli-based B2B startup SAM Seamless Network, said in a telephone interview, that hackers target IoT devices because they are easy to hack: As more of our daily lives become more connected and dependent on the web, the sheer number of devices and endpoints in your home makes likely it likely that some of these attacks will succeed.

The ‘Unreality’ of Russian Internet Censorship — Is There an Escape?

The ‘Unreality’ of Russian Internet Censorship — Is There an Escape?

Some bigger providers, such as PIA, had their websites blocked in Russia Thus, VPN is the most popular way to fight growing internet censorship in Russia and other restricted countries.

More