Facebook waited until the Mueller report dropped to tell us millions of Instagram passwords were exposed

Facebook waited until the Mueller report dropped to tell us millions of Instagram passwords were exposed

While just about every reporter was poring over the document, Facebook updated a blog post from March indicating that passwords had been exposed, stored as readable text (as opposed to securely encrypted), for hundreds of millions of Facebook users and thousands of Instagram users.

Californians Want and Deserve Stronger Privacy Laws

Californians Want and Deserve Stronger Privacy Laws

Sen. Jackson’s bill provides tools for the Attorney General’s Office to enforce the CCPA and hold companies accountable for their actions, and grants every person the right to take companies to court for violating their privacy rights.

15 Months of Fresh Hell Inside Facebook

15 Months of Fresh Hell Inside Facebook

And so simultaneously the company mounted a huge effort, led by CTO Mike Schroepfer, to create artificial intelligence systems that can, at scale, identify the content that Facebook wants to zap from its platform, including spam, nudes, hate speech, ISIS propaganda, and videos of children being put in washing machines.

2018 Online Trust Audit and Honor Roll

2018 Online Trust Audit and Honor Roll

As in previous years, 100 baseline points can be earned in each of the three major assessment categories (consumer protection, site security and privacy).

CoinFi News - Facebook CEO Mark Zuckerberg Faces Shareholders’ Backlash, Asked to Step Down

CoinFi News - Facebook CEO Mark Zuckerberg Faces Shareholders’ Backlash, Asked to Step Down

Trillium Asset Management says:“We believe this lack of independent board Chair and oversight has contributed to Facebook missing, or mishandling, a number of severe controversies, increasing risk exposure and costs to shareholders”.The shareholders also explain how Zuckerberg controls 60% of Facebook’s voting shares thereby weakening the company’s governance.

Using Disposable Services

Using Disposable Services

These services come in the form of disposable mailboxes and phone numbers. Don’t use these for anything personal as multiple people will be able to see it.

As cashless stores grow, so does the backlash

As cashless stores grow, so does the backlash

Before this year there was only one jurisdiction that required businesses to accept cash: Massachusetts, which passed a law nearly 40 years ago.“The potential societal cost of a cashless economy I think outweighs the potential benefits for businesses,” said Ritchie Torres, a New York City councilman for the South Bronx who introduced the bill.

The Biggest Lies We Heard About Net Neutrality This Week

The Biggest Lies We Heard About Net Neutrality This Week

“I would love for anyone to have Mr. Walden point to the government takeover language, like where they think that power even resides in the text,” he said, referring to the FCC’s Open Internet Order, which was passed in the 2015 and upheld by a federal appeals court the following year.

House votes to restore net neutrality as White House threatens Trump veto

House votes to restore net neutrality as White House threatens Trump veto

Rep. Anna Eshoo (D-Calif.) said that anyone who thinks net neutrality rules aren't needed should talk to Santa Clara County firefighters, whose "unlimited data" plan was throttled by Verizon while they were fighting a wildfire last year.

New York’s mass face recognition trial on drivers has been a spectacular failure

New York’s mass face recognition trial on drivers has been a spectacular failure

Cameras attached to the bridge were supposed to capture and identify the faces of drivers through their windshields as they passed, matching them against government databases. Despite the failure, more cameras are going to be positioned on other bridges and tunnels, according to a spokesperson.

It’s Time to End the NSA’s Metadata Collection Program

It’s Time to End the NSA’s Metadata Collection Program

In 2015, Congress passed the USA Freedom Act to reform Section 215 and prohibit the nationwide bulk collection of communications metadata, like who we make calls to and receive them from, when, and the call duration.

Hacker Eva Galperin Has a Plan to Eradicate Stalkerware

Hacker Eva Galperin Has a Plan to Eradicate Stalkerware

Ahead of her talk, Galperin has notched her first win: Russian security firm Kaspersky announced today that it will make a significant change to how its antivirus software treats stalkerware on Android phones, where it's far more common than on iPhones.

Google play store: Is your smartphone safe? Google reports a 100% increase in malware installed from Play Store last year, Telecom News, ET Telecom

Google play store: Is your smartphone safe? Google reports a 100% increase in malware installed from Play Store last year, Telecom News, ET Telecom

Click-fraud apps, also called "adware " accounted for 55 per cent of all Potentially Harmful Applications (PHAs) installed through the Play Store , followed by trojans at 16 per cent, Google said in its report on Monday.

Microsoft researchers spot NSA style backdoor in Huawei laptops

Microsoft researchers spot NSA style backdoor in Huawei laptops

The Microsoft Defender Advanced Threat Protection (ATP) service featured in Windows 10 version 1809 alerted researchers to an NSA-inspired backdoor vulnerability in Huawei laptops. The PCManager software included in some Huawei’s Matebook systems allows unprivileged users to create processes with superuser privileges, according to a March 25 Microsoft security post.

Meet The New TorProject.org

Meet The New TorProject.org

Besides bringing more consistency to our visual look, which reinforces community identity and helps us to build user trust by identification, our new website is one part of our goal to ensure that everyone on the planet can use Tor. Last year, we worked hard on making important usability improvements to our browser , including bringing a version of it to Android .

Pentagon Says All of Google’s Work on Drones Is Exempt From the Freedom of Information Act

Pentagon Says All of Google’s Work on Drones Is Exempt From the Freedom of Information Act

According to a Pentagon memo signed last year, however, no one at Google needed worry: All 5,000 pages of documents about Google’s work on the drone effort, known as Project Maven, are barred from public disclosure, because they constitute “critical infrastructure security information.”.

A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments

A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments

Within a year, the Emirati government was caught installing NSO spyware on the mobile phone of Ahmed Mansoor, a prominent human rights activist.

South Korea spycam: hundreds of motel guests secretly filmed and live-streamed online

South Korea spycam: hundreds of motel guests secretly filmed and live-streamed online

Seoul (CNN)About 1,600 people have been secretly filmed in motel rooms in South Korea, with the footage live-streamed online for paying customers to watch, police said Wednesday.

Facebook admits storing unencrypted user passwords on its server, says issue fixed

Facebook admits storing unencrypted user passwords on its server, says issue fixed

Brian Krebs of security news website cited an unnamed Facebook source as saying the internal investigation had so far indicated that as many as 600 million users of the social network had account passwords stored in plain text files searchable by more than 20,000 employees.

Exploding sneakers are only one reason for passing IoT cyber-security regulations

Exploding sneakers are only one reason for passing IoT cyber-security regulations

Sometimes shipped with factory-set, hardcoded passwords and often unable to be updated or patched, IoT devices can represent a weak point in a network’s security, leaving the rest of the network vulnerable to attack Hacker-created IoT botnets can direct enormous swarms of connected sensors like thermostats or sprinkler controllers to cause damaging and unpredictable spikes in infrastructure use, leading to things like power surges or reduced availability of critical infrastructure on a city or state-wide level.

Facebook is helping Intel design their next processor

Facebook is helping Intel design their next processor

Facebook is working with Intel to improve its upcoming Copper Lake processors. The company is helping Intel add a touch of deep learning to the Copper Lake processors to improve the performance. Intel is expected to release the Copper Lake processors later this year.

Robocalls about your bills can pour in every day, all day

Robocalls about your bills can pour in every day, all day

In an effort to end the calls, Hanson agreed at one point to make a onetime payment of $50 to Discover, though she had less than $200 in her bank account.

WhatsApp founder warns world to ‘delete Facebook’ immediately

WhatsApp founder warns world to ‘delete Facebook’ immediately

Both Mr Acton and Mr Koum had tried to find a way to monetise WhatsApp without bombarding users with adverts (file photo) FACEBOOK'S PRIVACY DISASTERS December 2018: Facebook comes under fire after a bombshell report discovered the firm allowed over 150 companies, including Netflix, Spotify and Bing, to access unprecedented amounts of user data, such as private messages.

Zuckerberg's so-called revelations about privacy are old news, and deeply ironic

Zuckerberg's so-called revelations about privacy are old news, and deeply ironic

Mark Zuckerberg's recent blog discussing Facebook's vision to become a 'privacy-focused' platform comes just over a month after he announced its merger with Instagram and WhatsApp. The merger has raised concerns (from, amongst others, Ireland's DPC who regulate Facebook in the EU) for users' privacy across the three platforms and the sharing of data between them.

Tim Berners-Lee on 30 years of the web: 'If we dream a little, we can get the web we want'

Tim Berners-Lee on 30 years of the web: 'If we dream a little, we can get the web we want'

Photograph: 1994-2017 CERN It is a minor regret, but one he has had for years about the way he decided to “bootstrap” the web up to something that could handle a lot of users very quickly: by building on the pre-existing service for assigning internet addresses, the domain name system ( DNS ), he gave up the chance to build something better.

Trump Administration Aims To Use Facebook To Spy On People Collecting Disability

Trump Administration Aims To Use Facebook To Spy On People Collecting Disability

The aim is to use a form of federal surveillance to monitor social media posts of Social Security disability payment recipients to see whether they’re really disabled.

John Oliver says he’s going to ‘unleash hell’ on FCC by creating his own robocalls

John Oliver says he’s going to ‘unleash hell’ on FCC by creating his own robocalls

Let’s dance, you and I.” Don’t miss: Here’s why you’re getting so many spam phone calls This isn’t the first time Oliver has slammed AT&T or the FCC.

'Save the Internet Act of 2019' Aims to Restore Net Neutrality

'Save the Internet Act of 2019' Aims to Restore Net Neutrality

Democrats in the House and Senate introduced companions bills aimed at reinstating the Obama-era net neutrality rules that prohibited broadband providers from blocking or throttling websites or offering preferred businesses higher-quality service for additional fees.

U.S. Democrats unveil legislation to reinstate net neutrality rules

U.S. Democrats unveil legislation to reinstate net neutrality rules

REUTERS/Yuri Gripas/File Photo The bill mirrors an effort last year to reverse the FCC’s December 2017 order repealing landmark rules approved in 2015 that barred internet providers from blocking or slowing content or offering paid “fast lanes.” “It is a fight that we can win,” said Senator Ed Markey, a bill sponsor, at a Capitol Hill news conference.

Stalkers and Debt Collectors Impersonate Cops to Trick Big Telecom Into Giving Them Cell Phone Location Data

Stalkers and Debt Collectors Impersonate Cops to Trick Big Telecom Into Giving Them Cell Phone Location Data

The practice is ongoing according to the sources, and court documents and an audio recording obtained by Motherboard also detail a previously prosecuted case in which one debt collector tricked T-Mobile by fabricating cases of child kidnapping to convince the telco to hand over location data.

More