Facebook bug let websites read ‘likes’ and interests from a user’s profile

Facebook bug let websites read ‘likes’ and interests from a user’s profile

“This allowed information to cross over domains — essentially meaning that if a user visits a particular website, an attacker can open Facebook and can collect information about the user and their friends,” said Masas.

EPIC Urges Agencies to Abandon Data Practices that Extend Detention of Children

The proposed rule also conflicts with a Privacy Impact Assessment, which fails to assess this risk. EPIC had previously warned Congress about the misuse of immigrant data by the DHS.

"I'm a person, not a number" - why microchipping staff is a sinister step too far

"I'm a person, not a number" - why microchipping staff is a sinister step too far

It revealed over 50 per cent of workers think their employer is monitoring them at work – and that many feared new technology was going to make workplace monitoring even worse.

State senator sought to weaken biometric privacy protections he had championed

State senator sought to weaken biometric privacy protections he had championed

Link's effort to change the now 10-year-old Biometric Information Privacy Act came as lawsuits were being filed by Illinois residents accusing Facebook of improperly using digital facial recognition in photo tagging.

The Motherboard Guide to Not Getting Hacked

The Motherboard Guide to Not Getting Hacked

The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks , smart home robots that could kill you , and your telecom providers who routinely lose customer data and unwittingly help hackers steal your phone number (and sometimes your money.) Meanwhile, an ever-growing and increasingly passive surveillance apparatus that has trickled down to state and local police is an ever-present threat to our digital privacy and increasingly uses technology that is developed by Silicon Valley giants who are supposedly consumer-focused.

Will you be getting a smart home spy for Christmas?

Will you be getting a smart home spy for Christmas?

You can still speak to the digital assistants embedded in these devices, but their screens enable hands-free video calling (apart from the Google one), can act as a control pad for various smart devices you may have around your home, such as thermostats or security cameras and (this feature is on heavy rotation in all the promotional material) you can use them to prompt you through a recipe without resorting to smearing your buttery fingers over your phone or laptop.

This incredibly simple privacy app helps protect your phone from snoops with one click

This incredibly simple privacy app helps protect your phone from snoops with one click

The app not only saves the process of manually configuring the Android or iOS operating systems to use 1.1.1.1 as their default DNS server, it also forms an encrypted connection between the DNS server and every app on the phone. That’s because Cloudflare uses a VPN connection to send these encrypted DNS requests.

Companies Using Push Notifications for Mobile App Uninstall Tracking

Companies Using Push Notifications for Mobile App Uninstall Tracking

Using uninstall tracking based on push notifications well-known companies that provide mobile apps are still able to reach out to consumers in efforts to lure them back – and potentially aim targeted advertising efforts at them – even though they have deleted the application.

NH judge orders Amazon to give Echo recordings in murder case

NH judge orders Amazon to give Echo recordings in murder case

A judge has ordered Amazon to turn over recordings that might have been captured by an Echo smart speaker in the Farmington house where two women were stabbed to death in January 2017.

Why surveillance is even worse for your privacy than you thought: three cautionary tales

Why surveillance is even worse for your privacy than you thought: three cautionary tales

If it is retained, use by criminals is not the only risk: the authorities may demand legal access in order to use that data as they wish, including against the person who caused it to be stored.

Opt Out

Opt Out

These are the top 10 data brokers, click on each company to have them erase your data by sending a GDPR Erasure Request. Opt Out is a free service which lets you get thousands of organisation to erase your personal data by automating the process of sending GDPR erasure (right to be forgotten) requests.

Private messages from 81,000 hacked Facebook accounts for sale

Private messages from 81,000 hacked Facebook accounts for sale

Hackers appear to have compromised and published private messages from at least 81,000 Facebook users' accounts. The BBC Russian Service contacted five Russian Facebook users whose private messages had been uploaded and confirmed the posts were theirs.

Do Your Apps Know Too Much About You?

Do Your Apps Know Too Much About You?

App makers are starting to bundle permission choices together and still aren’t quite there with letting their users know exactly what they’ll be using data for.

Comcast Hides Commands In Voice Remotes For Halloween

Comcast Hides Commands In Voice Remotes For Halloween

The engineers also added some hidden commands for the coming movie “The Grinch,” including “Xfinity Home, the Grinch” or “Xfinity Home, Grinch is Home,” either of which will turn the color of the light to green.

FCC Republican claims municipal broadband is threat to First Amendment

FCC Republican claims municipal broadband is threat to First Amendment

O'Rielly said that broadband providers run by local governments "have engaged in significant First Amendment mischief." But O'Rielly's only evidence to support his claim was the networks' Acceptable Use Policies, which contain boilerplate language similar to the policies used by private ISPs such as Comcast and AT&T.

How Cheap Mobile Ads Tell Hackers Your Location

How Cheap Mobile Ads Tell Hackers Your Location

Geolocated mobile ads can be used as inexpensive spy tools to track and locate individuals or groups of people, a security researcher said at the DerbyCon security conference in Louisville, Kentucky, earlier this month.

An evolution in private messaging | Networks Asia

An evolution in private messaging | Networks Asia

The potential applications of distributed messaging networks, where users own their data, and privacy and security are in-built by design, are worthy of exploration.

Fork Over Passwords or Pay the Price, New Zealand Tells Travelers

Fork Over Passwords or Pay the Price, New Zealand Tells Travelers

Travelers entering New Zealand who refuse to disclose passwords for their digital devices during forced searches could face prosecution and fines of more than $3,000, a move that border officials said Tuesday made the country the first to impose such penalties.

As many feared, Google’s ambitious Sidewalk Toronto “smart city” project turns out to be a “surveillance city”

As many feared, Google’s ambitious Sidewalk Toronto “smart city” project turns out to be a “surveillance city”

The chairman of Alphabet, the parent company of both Google and Sidewalk Labs, Eric Schmidt, said the project was “all the things you could do if someone would just give us a city and put us in charge.” Alphabet insisted it needed “full autonomy from city regulations so it can build without constraint” and use Sidewalk Toronto as a testbed for new technologies that will monitor and measure urban activity on an unprecedented scale.

When Trump Phones Friends, the Chinese and the Russians Listen and Learn

When Trump Phones Friends, the Chinese and the Russians Listen and Learn

And since becoming president, Mr. Trump has agreed to a slightly cumbersome arrangement of having two official phones: one for Twitter and other apps, and one for calls.

Will the EU Copyright Directive ‘break the internet’?

Will the EU Copyright Directive ‘break the internet’?

In a landmark case, NLA v Meltwater, heard in the UK’s Supreme Court and which resulted in questions referred on to the Court of Justice of the European Union, it was determined that on-screen and cached copies of websites generated by users while browsing may be created without authorisation from copyright holders.

How to encrypt your entire life in less than an hour

How to encrypt your entire life in less than an hour

Hackers were then able to use his email and password to gain access to his Twitter and Pinterest accounts. Tip #5: Send private text messages with Signal If you want reasonably private browsing (no system can ever be 100% secure), you should use Tor.

5 Reasons Privacy and IoT Are Incompatible

5 Reasons Privacy and IoT Are Incompatible

It’s in the wake of this heightened awareness of data privacy issues that we look at some of the IoT-based privacy violations of recent times. Data auditing can also offer the potential for abusive behavior tracking, however, auditing also has privacy implications.

4 Anonymous Web Browsers That Are Completely Private

4 Anonymous Web Browsers That Are Completely Private

The network aims to protect a user’s location, browser history, personal data, and online messages from any person or bot that’s performing network traffic analysis. Comodo doesn’t come close to Tor Browser, but it does have some built-in tools that’ll make browsing the web a safer experience.

Signal Desktop Leaves Message Decryption Key in Plain Sight

Signal Desktop Leaves Message Decryption Key in Plain Sight

As the encryption key will be required each time Signal Desktop opens the database, it will store it in plain text to a local file called %AppData%\Signal\config.json on PCs and on a Mac at ~/Library/Application Support/Signal/config.json.

Why the NSA Called Me After Midnight and Requested My Source Code

Why the NSA Called Me After Midnight and Requested My Source Code

Maybe people would die, or at least Dave instilled that impression on me as he politely asked if I would be willing to give him my source code; all the while, apologizing for not being able to tell me anything more about the situation.

A new ‘smart firewall’ iPhone app promises to put your privacy before profits

A new ‘smart firewall’ iPhone app promises to put your privacy before profits

For weeks, a small team of security researchers and developers have been putting the finishing touches on a new privacy app, which its founder says can nix some of the hidden threats that mobile users face — often without realizing.

ASUS Z390 Motherboards Automatically Push Software into Your Windows Installation

ASUS Z390 Motherboards Automatically Push Software into Your Windows Installation

Our Windows 10 image is based on Windows 10 April 2018 Update and lacks in-built drivers for the integrated network controllers.Upon first boot, with the machine having no LAN or Internet connectivity, we were greeted by an ASUS-specific window in the bottom right corner of our screen, asking whether we'd like to install the network drivers and download "Armoury Crate".

Industry Group Representing Apple, Google, Amazon and Others Releases User Privacy Framework to Guide Policymakers

The purpose of this framework is to inform the development of legislation or the promulgation of rules that enhance personal data protection, further the trust relationship between companies and their customers, and enable innovation while also avoiding regulatory fragmentation that undermines all three goals.

This SIM Card Forces all of Your Mobile Data Through Tor

This SIM Card Forces all of Your Mobile Data Through Tor

With that in mind, one UK grassroots internet service provider is currently testing a data only SIM card that blocks any non-Tor traffic from leaving the phone at all, potentially providing a more robust way to use Tor while on the go.

More