Login With Facebook, Google or AT&T? Thanks, but No Thanks

Login With Facebook, Google or AT&T? Thanks, but No Thanks

There's more: Project Verify is better than the Facebook and Google SSOs because it's going to be checked against your mobile SIM card, phone number, user credentials, account tenure and phone account type (info only your wireless carrier has).

EU member state websites laden with third-party cookies

EU member state websites laden with third-party cookies

A new report (PDF) reveals that the vast majority of EU member state websites are laden with third-party cookies that are not disclosed to visitors. Third-party service plugins and embeds are the main way in which trackers landed on government and public health sector websites according to the report.

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI If you are new to LOKI, the Australian project is self described on their landing page as a “privacy network which will allow users to transact and communicate privately over the internet, providing a suite of tools to help maintain the maximum amount of anonymity possible while browsing, transacting and communicating online”.

Google’s Nest fiasco harms user trust and invades their privacy

Google’s Nest fiasco harms user trust and invades their privacy

But, following a trust-shattering move by Google last month regarding its Nest Secure product, consensus on one issue has emerged: Companies shouldn’t ship products that can surreptitiously spy on users.

Internet providers would need permission to use consumer data under proposed MT legislation

Internet providers would need permission to use consumer data under proposed MT legislation

HELENA — Rep. Daniel Zolnikov (R-Billings) says people have a right to be asked if internet service providers can use their personal data. Zolnikov said providers will still be able to use data to create profiles of people based on their browsing history to make targeted ads.

Android Q to get a ton of new privacy features

Despite security researchers proving that they can still track devices with randomized MAC addresses, supporting this feature will reduce the efficiency of some data harvesting and user tracking operations.

UK online pornography age block triggers privacy fears

UK online pornography age block triggers privacy fears

The age block will require commercial pornography sites to show that they are taking sufficient steps to verify their users are over 18, such as by uploading a passport or driving licence or by visiting a newsagent to buy a pass only available to adults.

Android Q privacy change: User control over app access to device location

ActivityCompat.requestPermissions(this, new String[] { Manifest.permission.ACCESS_COARSE_LOCATION}, YOUR_PERMISSION_REQUEST_CODE); } Periodic checks of user's location Your app might have a use case that requires access to the user's location all the time.

Firefox Send — Free Encrypted File Transfer Service Now Available For All

Firefox Send — Free Encrypted File Transfer Service Now Available For All

Mozilla has finally launched its free, end-to-end encrypted file-transfer service, called Mozilla has finally launched its free, end-to-end encrypted file-transfer service, called Firefox Send , to the public, allowing users to securely share large files like video, audio or photo files that can be too big to fit into an email attachment.

Man arrested for selling one million Netflix, Spotify, Hulu passwords

Man arrested for selling one million Netflix, Spotify, Hulu passwords

Police in Australia have arrested a man who allegedly made AU $300,000 (US $211,000) running a website which sold the account passwords of popular online subscription services including Netflix, Spotify, Hulu, PSN, and Origin.

Federal agency looking at fitness trackers for public sector workers

Federal agency looking at fitness trackers for public sector workers

"Interactive insurance policies give consumers the opportunity to receive discounts on premiums for sharing health-related information through wearable tracking devices," says the memo.

Updates to our Terms of Service and Privacy Policy

FamilyTreeDNA’s Terms of Service and Privacy Statement have been updated to require law enforcement, as well as any authorized representative working on behalf of law enforcement, to register all genetic files through a separate process prior to uploading to the database.

New privacy bill would give parents an ‘Eraser Button’ and ban ads targeting children

New privacy bill would give parents an ‘Eraser Button’ and ban ads targeting children

If approved, the changes to the Children’s Online Privacy Protection Act (COPPA) would codify a set of parental controls and ban targeted advertising to young minors.

The best Chrome extensions to use for privacy in 2019

The best Chrome extensions to use for privacy in 2019

The best Chrome extensions to use for privacy in 2019 Alexandra Persea Mar 12 Burner Mail Burner Mail allows you to generate anonymous email addresses that protect your personal email address.

The Ten Commandments of crypto security – By Panama Crypto

The Ten Commandments of crypto security – By Panama Crypto

Two-factor authentication (2FA), keeps hackers, phishing, attempts at bay because once it is enabled on your email account, anybody that tries to break into your email would need to have physical or remote access to the device you have the 2FA app installed (either Google Authenticator or Authy) in order to produce the Time-based One-Time Passcode (TOTP) directly within the app.

The future of data ownership

The future of data ownership

Due to the centralized approach of storing user data, companies’ data centers have turned into golden trezors — a target for attackers, which leads to massive breaches. Here are the differences of storing user data locally on users’ device: It’s also better for businesses: How is this achieved?

Artificial intelligence senses people through walls

Artificial intelligence senses people through walls

The researchers use a neural network to analyze radio signals that bounce off people’s bodies, and can then create a dynamic stick figure that walks, stops, sits, and moves its limbs as the person performs those actions.

The Spy Equipment On Sale to Dictatorships at the UK's Secret Security Trade Fair

The Spy Equipment On Sale to Dictatorships at the UK's Secret Security Trade Fair

Image from Gamma Group’s sales brochures from the Security and Policing exhibition Britain’s biggest arms firm, BAE Systems, have also become the UK’s leading "lawful interception" company.

Mark Zuckerberg lays out his vision for a new Facebook

Mark Zuckerberg lays out his vision for a new Facebook

What that means for users Earlier this year, the New York Times reported that Facebook planned to integrate its messaging platforms, WhatsApp, Instagram and Messenger.

Alternatives to Google: Mojeek believes a truly independent and tracking-free search engine must be built from scratch

Alternatives to Google: Mojeek believes a truly independent and tracking-free search engine must be built from scratch

But there’s something quite admirable about the dedication to crawler-based search while other competitors opt for the metasearch route, i.e. paying to use information from other, often more-established, crawlers to bolster results in the SERPs. Mojeek might have its work cut out in ever matching the size of an index that Google and the metasearch engines have access to.

'Save the Internet Act of 2019' Aims to Restore Net Neutrality

'Save the Internet Act of 2019' Aims to Restore Net Neutrality

Democrats in the House and Senate introduced companions bills aimed at reinstating the Obama-era net neutrality rules that prohibited broadband providers from blocking or throttling websites or offering preferred businesses higher-quality service for additional fees.

Read Mark Zuckerberg’s letter on Facebook’s privacy-focused future

Read Mark Zuckerberg’s letter on Facebook’s privacy-focused future

We plan to build this the way we’ve developed WhatsApp: focus on the most fundamental and private use case — messaging — make it as secure as possible, and then build more ways for people to interact on top of that, including calls, video chats, groups, stories, businesses, payments, commerce, and ultimately a platform for many other kinds of private services.

Accessibility vs Security: Breaking CAPTCHAs by exploiting their accessibility features

Accessibility vs Security: Breaking CAPTCHAs by exploiting their accessibility features

We built an automated system that solves audio captchas using existing speech recognition services. In the paper, we also discussed that all other audio captchas can be solved by leveraging existing speech recognition services.

Some major Android apps are still sending data directly to Facebook

Some major Android apps are still sending data directly to Facebook

Major Android mobile apps from companies including Yelp and Duolingo send data that could be used to personally identify you for ad tracking straight to Facebook immediately upon logging in, according to a new report from the London-based UK charity and watchdog group Privacy International (PI) .

ProtonMail vs Mailbox.org comparison

ProtonMail vs Mailbox.org comparison

It’s the method you can use with Mailbox.org’s webmail and with any standard PGP capable email client. To enable inbox encryption, you’ll need to set a public PGP key which Mailbox.org will use to encrypt all incoming emails before storing them in your inbox.

Your iPhone keeps a detailed list of every location you frequent — here's how to delete your history and shut the feature off for good

Your iPhone keeps a detailed list of every location you frequent — here's how to delete your history and shut the feature off for good

There's a little-known feature built into your iPhone that keeps a history of every location you've been — and how many times you've been there.

Google disables Android TV photo sharing for all users after account privacy issue

Google disables Android TV photo sharing for all users after account privacy issue

Until the bug is resolved, Android TV owners won’t be able to set Google Photo albums as their screensaver or view pictures with Google Assistant on their set-top devices or smart TVs, as reported by Android Police .

Pelosi says Democrats to introduce bill to bring back net neutrality this week

Pelosi says Democrats to introduce bill to bring back net neutrality this week

Speaker Nancy Pelosi Nancy Patricia D'Alesandro PelosiTrump accuses Dems of 'presidential harassment' as investigations ramp up House Democrats ramp up investigations of Trump Biden's experience is his greatest asset and biggest liability MORE (D-Calif.) announced Monday that Democrats will introduce a net neutrality bill to replace the open internet rules that were repealed in 2017.

The Cybersecurity Industry Makes Millions, But Is It Keeping Us Safe?

The Cybersecurity Industry Makes Millions, But Is It Keeping Us Safe?

Kelly Shortridge, vice president of product strategy at Capsule8, a New York City-based security startup, joined CYBER to talk about the cybersecurity industrial complex, and about her piece: The Infosec Reckoning Has Arrived .

Facebook secretly allows you to be looked up via your 2FA phone number and you can't opt out

Facebook secretly allows you to be looked up via your 2FA phone number and you can't opt out

Facebook has already admitted to using phone numbers collected under the guise of two-factor authentication in order to target ads, and now it turns out you can't opt-out of the service once you're committed.

More