Dutch national broadcaster saw ad revenue rise when it stopped tracking users. It's meant to work like that, right?

Dutch national broadcaster saw ad revenue rise when it stopped tracking users. It's meant to work like that, right?

Johnny Ryan, chief policy officer at privacy-focused browser biz Brave, has reported on how ad revenue increased when Dutch national broadcaster NPO stopped running third-party trackers on its online video website.

Facebook exposed user data to thousands of app developers

Facebook exposed user data to thousands of app developers

Facebook ‘Privacy Matters’ reveals 5000 app developers continued to receive previously authorized users’ data after access should have automatically expired.But in a satirical turn of events, Facebook announced via Privacy Matters that some third-party applications continued to receive previously authorized users’ data after access should have automatically expired.

Privacy-Focused OS Wants to Know How Facebook and the FBI Hacked it

Privacy-Focused OS Wants to Know How Facebook and the FBI Hacked it

The hacking tool relied on an unknown flaw—also called a zero-day in hacker lingo—in the default video player included in Tails, a well-known Linux-based operating system that’s used by journalists, dissidents, human rights activists, and security-focused users all over the world.

Zoom does 180 on encryption plans, will bring it to all users including free accounts in July

Zoom does 180 on encryption plans, will bring it to all users including free accounts in July

Now after previously planning to keep end-to-end encryption as just a feature for paying customers, the company has reversed course and says free users will see it arrive in a beta coming in July alongside paid accounts.

Be a Data Custodian, Not a Data Owner

Be a Data Custodian, Not a Data Owner

The organizations that succeed in protecting consumer data in the coming years will be those that build long-term, trusted relationships with customers by humanizing data and taking responsibility as its custodians.

Android Rookies - Everything about Tech

Android Rookies - Everything about Tech

Huawei development team mails an HKSP (Huawei Kernel Self Protection) Linux patch with a backdoor to Linux Foundation, Huawei denies involvement.It was immediately scrutinized by different people including the developers of Grsecurity, a project that provides its own set of security-hardening patches for the Linux kernel.

Public support vital to contact tracing apps: Can NHSx provide this?

Public support vital to contact tracing apps: Can NHSx provide this?

Even a newly constructed app using the Apple-Google software API (something NHSx is working on) is unlikely to solve all the issues the app has encountered, and it’s questionable whether new version will incite the public support needed.

Is it safe to use an old Android phone?

Is it safe to use an old Android phone?

As a result, Google and the phone-makers eventually have to cut support for older handsets, usually once a device gets to be two or three years old.Those handsets then will no longer receive security updates meaning that when a threat is detected on that phone, it simply won't be fixed.

Cross-signing and End-to-end Encryption by Default is HERE!!!

Cross-signing and End-to-end Encryption by Default is HERE!!!

Three years have passed since we first announced End-to-end Encryption in Matrix and started to beta test it in Riot - and after an enormous amount of polishing and refinement on its user experience, we are finally declaring it out of beta and enabling it by default for all new private conversations in Riot.

Intel Preparing Platform Monitoring Technology

Intel Preparing Platform Monitoring Technology

Intel developers are working on a new Linux feature and technology called "Intel Platform Monitoring Technology" as amounting to a hardware telemetry framework that can also be used by other hardware vendors.

India acknowledges, but brushes aside, features-not-bugs in Aarogya Setyu virus contact-tracing app

India acknowledges, but brushes aside, features-not-bugs in Aarogya Setyu virus contact-tracing app

The Indian government has acknowledged “potential security issues” in the Aarogya Setyu contact-tracing app which its opposition labels as a ‘surveillance system with no oversight,’ but says the code issues are not that big a deal.

Enterprise Security Woes Explode with Home Networks in the Mix

Enterprise Security Woes Explode with Home Networks in the Mix

The work-from-home (WFH) paradigm that has become the new normal in the age of coronavirus comes with exacerbated network security risk – as evidenced by growing a number of botnets and automated attacks that are taking advantage of known vulnerabilities in both consumer and corporate IT gear.

GitHub - tg12/bad_packets_blocklist: A blocklist based on sources from Bad Packets Report

GitHub - tg12/bad_packets_blocklist: A blocklist based on sources from Bad Packets Report

A blocklist for use in iptables, firewalls, IDS and IDP etc.THE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.

ZecOps discovers current iOS mail app vulnerability that has been exploited in the wild

ZecOps discovers current iOS mail app vulnerability that has been exploited in the wild

In the meantime, iPhone and iPad users are vulnerable as it’s impossible for the default Mail App daemon to be turned off without rooting your iOS device.

Flaw in iPhone, iPads may have allowed hackers to steal data for years

Flaw in iPhone, iPads may have allowed hackers to steal data for years

WASHINGTON/SAN FRANCISCO (Reuters) - Apple Inc (AAPL.O) is planning to fix a flaw that a security firm said may have left more than half a billion iPhones vulnerable to hackers.

Everything we know about the 'track and trace' app that could be the key to ending lockdown.

Everything we know about the 'track and trace' app that could be the key to ending lockdown.

In order for restrictions to be eased, however, there are a number of strategies involving tracking and tracing cases of COVID-19, that may be implemented to allow for greater public movement.

Twitter takes away twits' ability to limit ad data sharing – after telling investors its own privacy settings hurt revenue

Twitter takes away twits' ability to limit ad data sharing – after telling investors its own privacy settings hurt revenue

"We’re updating a data sharing setting that relates to sharing additional information with business partners, specifically to measure the effectiveness of mobile app ads on Twitter," a spokesperson said in an email to The Register .

Facebook asks users about coronavirus symptoms, releases friendship data to researchers

Facebook asks users about coronavirus symptoms, releases friendship data to researchers

SAN FRANCISCO (Reuters) - Facebook Inc said on Monday it would start surveying some U.S. users about their health as part of a Carnegie Mellon University research project aimed at generating “heat maps” of self-reported coronavirus infections.

Unpatched bug in iOS 13.3.1 and later stops VPNs from encrypting all connections

Unpatched bug in iOS 13.3.1 and later stops VPNs from encrypting all connections

The VPN bypass bug in iOS 13.3.1 and later causes some internet connections to continue with their original, unencrypted connection – which is a security and privacy concern.Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization.

Microsoft discloses new Windows vulnerability that’s being actively exploited

Microsoft discloses new Windows vulnerability that’s being actively exploited

Microsoft disclosed a new remote code execution vulnerability today that can be found in all supported versions of Windows and is currently being exploited in “limited targeted attacks” (via TechCrunch).Microsoft patches Windows 10 security flaw discovered by the NSA.

KrØØk WiFi vulnerability affected WiFi encryption on over a billion devices

KrØØk WiFi vulnerability affected WiFi encryption on over a billion devices

A vulnerability in Broadcom and Cypress WiFi chips makes it possible for attackers on your local WiFi network to decrypt your WPA2 encrypted internet traffic.

The EARN IT Act Is a Sneak Attack on Encryption

The EARN IT Act Is a Sneak Attack on Encryption

A bipartisan pair of US senators today introduced long-rumored legislation known as the EARN IT Act. Meant to combat child sexual exploitation online, the bill threatens to erode established protections against holding tech companies responsible for what people do and say on their platforms.

5 years of Intel CPUs and chipsets have a concerning flaw that’s unfixable

5 years of Intel CPUs and chipsets have a concerning flaw that’s unfixable

While Intel has issued patches to lessen the damage of exploits and make them harder, security firm Positive Technologies said the mitigations may not be enough to fully protect systems.

Critical Bluetooth Vulnerability in Android (CVE-2020-0022)

Critical Bluetooth Vulnerability in Android (CVE-2020-0022)

If you have no patch available yet or your device is not supported anymore, you can try to mitigate the impact by some generic behavior rules: Only enable Bluetooth if strictly necessary.

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

The Graham-Blumenthal bill would finally give Barr the power to demand that tech companies obey him or face overwhelming liability from lawsuits based on their users’ activities.

Telegram Founder on WhatsApp Hacks: Backdoors Are Camouflaged as Security Flaws

Telegram Founder on WhatsApp Hacks: Backdoors Are Camouflaged as Security Flaws

Durov says that despite iOS devices having “loads of privacy-related issues,”, WhatsApp is the culprit here, as the corrupt video vulnerability exposes not only iPhones, but also Android and Windows Phone devices.

A new bill could punish web platforms for using end-to-end encryption

A new bill could punish web platforms for using end-to-end encryption

If companies don’t follow these rules, they could lose some protection under Section 230 of the Communications Decency Act, which largely shields companies from liability over users’ posts.Under the EARN IT Act, though, a committee could require Facebook and other companies to add a backdoor for law enforcement.

Privacy Day – Yes it Matters More than You Might Think

Privacy Day – Yes it Matters More than You Might Think

Privacy Day promotes the fundamental principles of being able to control your personal information and to raise awareness of the risks in our digital society.People are recognizing the importance of protecting their private information.

Data privacy benefits outweigh spend, says Cisco

Data privacy benefits outweigh spend, says Cisco

“With this study, we now have empirical evidence of privacy investments paying off for companies – particularly with improved customer relationships, revenue impact and real bottom-line results,” said Cisco vice-president and chief privacy officer Harvey Jang.

The Secret History of Facial Recognition

The Secret History of Facial Recognition

When his son Lance arrived at the house in Austin, Texas, that morning in early 1995, Woody immediately began to issue instructions in dry-erase ink.When Lance got back, Woody motioned to two large file cabinets inside the garage.