Leaked Reports Show EU Police Are Planning a Pan-European Network of Facial Recognition Databases

Leaked Reports Show EU Police Are Planning a Pan-European Network of Facial Recognition Databases

If previous data-sharing arrangements are a guide, the new facial recognition network will likely be connected to similar databases in the U.S., creating what privacy researchers are calling a massive transatlantic consolidation of biometric data.

New Mexico AG sues Google for collecting school kids' personal data

New Mexico AG sues Google for collecting school kids' personal data

SAN FRANCISCO (Reuters) - New Mexico Attorney General Hector Balderas on Thursday sued Alphabet Inc’s (GOOGL.O) Google search engine, alleging that its educational software collects young students’ personal information without the required parental consent.

Social Security numbers stolen in defense agency data breach

Social Security numbers stolen in defense agency data breach

Department of Defense spokesperson Charles Prichard confirmed Thursday the agency had detected a breach of personally identifiable information on a system it hosts, and was in the process of notifying those affected by letter.

Forcing us to get consent before selling browser histories violates our free speech, US ISPs claim

Forcing us to get consent before selling browser histories violates our free speech, US ISPs claim

The case was brought this month by four telco industry groups in response to a new state-level law aimed at providing Maine residents with privacy protections killed at the federal level by the FCC just days before they were due to take effect.

Details of 10 million MGM hotel guests leaked online

Details of 10 million MGM hotel guests leaked online

The data was acquired in the summer after attackers gained access to MGM servers, though the breach went under the radar at the time.Though no financial information was leaked, the information made available on a public hacking forum is sufficient for cybercriminals to perform other varieties of attack, including spear-phishing emails and SIM jacking.

EU’s new digital strategy targets data-hoarding tech firms

EU’s new digital strategy targets data-hoarding tech firms

The proposed plan, as released by the European Commission this week, names no names but still makes quite clear that the biggest US tech titans—especially Facebook and Google—would be squarely in the sights of any new legislation.

Exclusive: Google users in UK to lose EU data protection - sources

Exclusive: Google users in UK to lose EU data protection - sources

SAN FRANCISCO (Reuters) - Google is planning to move its British users’ accounts out of the control of European Union privacy regulators, placing them under U.S. jurisdiction instead, sources said.

Private Internet Access refund policy extended to 30 days

Private Internet Access refund policy extended to 30 days

Effective immediately, Private Internet Access subscribers will be covered under our new 30 day money back guarantee.The new Private Internet Access money back guarantee is simple: you can get a full refund within 30 days of your purchase.

What Canada can learn from this Michigan city's use of doorbell cameras to catch criminals

What Canada can learn from this Michigan city's use of doorbell cameras to catch criminals

Ron Taig, with the Livonia Police Department in Michigan, shows the Neighbors portal made available to law enforcement agencies who sign agreements with Amazon's Ring subsidiary.Last year, Livonia PD signed a partnership with the Amazon subsidiary allowing citizens using Ring's Neighbors app to report suspicious activity caught on surveillance.

Amazon: How Bezos built his data machine

Amazon: How Bezos built his data machine

Once a week they too delved into individuals' behaviour.“We had to make it actionable,” Selinger continues.“So to do that, we would project on the wall this view [of a] single customer and try to understand who she was.Weigend and Selinger moved on, but Amazon continued to hire talent to find innovative ways to turn data into dollars.

Automated facial recognition breaches GDPR, says EU digital chief

Automated facial recognition breaches GDPR, says EU digital chief

The EU’s digital and competition chief has said that automated facial recognition breaches GDPR, as the technology fails to meet the regulation’s requirement for consent.Vestager told reporters that the Commission will further investigate automated facial recognition before introducing legislation, allowing member states to make their own domestic decisions in the meantime.

US military's 'Jetson' laser can ID your unique heartbeat hundreds of feet away

US military's 'Jetson' laser can ID your unique heartbeat hundreds of feet away

And unlike some types of identification techniques that rely on biometrics (unique anatomical or behavioral traits), the subjects of Jetson's heartbeat-detecting infrared laser can be far away from the scanner.

Massive data leak exposes medical records, mugshots and IDs of more than 36,000 US inmates

Massive data leak exposes medical records, mugshots and IDs of more than 36,000 US inmates

JailCore was left unsecure and unencrypted on an Amazon server, impacting locations in Florida, Kentucky, Missouri, Tennessee and West Virginia The bucket was discovered by vpmMentor on January 3rd, but was not closed until nearly two weeks later.

How To Prevent Facial Recognition Technology From Identifying You

How To Prevent Facial Recognition Technology From Identifying You

The first goal in this regard is to utilize hair or makeup in ways that substantially block portions of your face (especially your the eyes, nose, and forehead and the location where these features intersect), and that, thereby, cause many facial recognition systems not to realize that your face is a face – so they don’t even try to match and identify it.

Congress, Not the Attorney General, Should Decide the Future of Encryption

Congress, Not the Attorney General, Should Decide the Future of Encryption

The EARN IT Act puts that question front and center by giving the attorney general the ultimate say in setting the “best practices” that will give Section 230 immunity for child exploitation suits.

Can the Government Buy Its Way Around the Fourth Amendment?

Can the Government Buy Its Way Around the Fourth Amendment?

If you’ve been following privacy issues at all in recent years, you know that websites and smartphone apps are sharing your detailed location information with data brokers and advertisers.

The U.S. Needs a Data Protection Agency

The U.S. Needs a Data Protection Agency

You have the right to know if companies are using your information for profit.You need a way to protect yourself, and you deserve a place that will look out for you.

What happens to privacy when China has personal data and the social graph of nearly everyone in the US?

What happens to privacy when China has personal data and the social graph of nearly everyone in the US?

But buried within its business-like announcement of the indictment of four Chinese military hackers, there is the following statement, which has huge implications for privacy: For years, we have witnessed China’s voracious appetite for the personal data of Americans, including the theft of personnel records from the U.S. Office of Personnel Management, the intrusion into Marriott hotels, and Anthem health insurance company, and now the wholesale theft of credit and other information from Equifax.

A man walked down a street with 99 phones in a wagon. Google Maps thought it was a traffic jam.

A man walked down a street with 99 phones in a wagon. Google Maps thought it was a traffic jam.

Apps such as Google Maps provide real-time traffic data through crowdsourcing, monitoring the location and speed of phones traveling along on a roadway.He said “Google Maps Hacks” is meant to raise questions about the level of trust people have put in technology, as well as the ways society has adapted to it.

The industry is looking to first-party data to replace cookies, but the open web may lose out

The industry is looking to first-party data to replace cookies, but the open web may lose out

At the Interactive Advertising Bureau’s Annual Leadership Meeting in Palm Springs, California, on Feb. 10, the IAB Tech Lab proposed developing a new identifier based on people’s email addresses or phone numbers, which provide a more consistent, deterministic way of recognizing someone than the third-party cookie ever did.

Google Removes Dashlane Password Manager from Chrome Web Store

Google Removes Dashlane Password Manager from Chrome Web Store

Google has removed the Dashlane password manager extension used by over 3 million users from the Chrome Web Store due to issues with 'User Data Privacy/ Use of Permissions'.

Russia's security service tells internet firms to hand over user data: The Bell

Russia's security service tells internet firms to hand over user data: The Bell

MOSCOW (Reuters) - Russia’s Federal Security Service (FSB) has ordered some of the country’s major internet companies to give it continuous access to their systems, The Bell investigative website reported late on Tuesday, citing three sources at the firms.

Column: Equifax left unencrypted data open to Chinese hackers. Most big U.S. companies are just as negligent

Column: Equifax left unencrypted data open to Chinese hackers. Most big U.S. companies are just as negligent

Shackelford noted that the growing use of cloud-based data storage services run by the likes of Google and Amazon makes encryption more accessible to smaller companies.

App Used by Netanyahu's Likud Leaks Israel's Entire Voter Registry

App Used by Netanyahu's Likud Leaks Israel's Entire Voter Registry

The voter registry was uploaded by Likud to the Elector app, which is used by the party to manage Election Day. The firm that developed the application, Feed-b, commented that the vulnerability was a “one-off incident that was immediately dealt with," and that security measures have since been boosted.

Say Goodbye to most Desktop and Mobile Adwares

Say Goodbye to most Desktop and Mobile Adwares

Thus, once you connected your device to the latter—note that you have to do this process on each WiFi network which you want to change the DNS values of — , just go in the WiFI settings and long press on “MyPrettyWiFi”.

Every Click You Make: Data Tracking, Consumer Privacy In The Age Of Surveillance Capitalism

Every Click You Make: Data Tracking, Consumer Privacy In The Age Of Surveillance Capitalism

In the age of the Internet-of-things, every digital device you own collects information about you, while websites, corporations and social media platforms use different techniques to surveil and track your personal data.

Health Data Breach Not Reported for Seven Months

Health Data Breach Not Reported for Seven Months

While HIPAA covered entities and business associates are required to investigate all security incidents, a '"breach" is not determined until the entities confirm that "acquisition, access, use or disclosure of PHI in a manner not permitted [under the regulations] which compromises the security or privacy of the PHI" occurred, she notes.

Everything you need to know about the “Right to be forgotten”

Everything you need to know about the “Right to be forgotten”

Of course, given competing interests and the hyper-connected nature of the Internet, the right to be forgotten is much more complicated than an individual simply requesting that an organization erase their personal data.

A dark web tycoon pleads guilty. But how was he caught?

A dark web tycoon pleads guilty. But how was he caught?

“Perhaps the greatest overarching question related to the investigation of this case is how the government was able to pierce Tor’s veil of anonymity and locate the IP address of the server in France,” Marques’s defense lawyers wrote in a recent filing.

Coronavirus brings China's surveillance state out of the shadows

Coronavirus brings China's surveillance state out of the shadows

Facial recognition firm Megvii said on Tuesday it had developed a new way to spot and identify people with fevers, with support from the industry and science ministries.

More