Private Internet Access Android App is ioXt-Certified

Private Internet Access Android App is ioXt-Certified

As part of our efforts to increase the level of security and transparency in our apps and service, Private Internet Access partnered with the ioXt Alliance to test and certify our Android mobile VPN application.

Modern traffic flows of third digital world

Modern traffic flows of third digital world

Since August 2020, the project has regularly posted videos of street protests.Probably, it was these videos or, to be more precise, the brutality of the Belarusian law enforcement officers recorded in them that caused the removal of the channel.

Encryption Has Never Been More Essential—or Threatened

Encryption Has Never Been More Essential—or Threatened

Five years ago today, WhatsApp completed our roll out of end-to-end encryption, which provides people all over the world with the ability to communicate privately and securely.

UK may compel Facebook to share users data and conversations with police

UK may compel Facebook to share users data and conversations with police

The UK parliament is considering forcing to implement backdoors to share access to messages from its chat services to the police.To compel Facebook to share the access of messages to the police, the Ministry would use a special measure, a technical capability notice.

100 points of ID to get Facebook, Tinder account

100 points of ID to get Facebook, Tinder account

The government is considering forcing users of social media platforms like Twitter, Facebook and Instagram — as well as online dating platforms like Tinder — to upload 100 points of identification in order to use them.

Whistleblower: Ubiquiti Breach “Catastrophic” — Krebs on Security

Whistleblower: Ubiquiti Breach “Catastrophic” — Krebs on Security

[NYSE:UI] — a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders and security cameras — disclosed that a breach involving a third-party cloud provider had exposed customer account credentials.

Best Practices for preventing IoT Security Camera Hacks

Best Practices for preventing IoT Security Camera Hacks

Botnets can include PCs with viruses or IoT (internet of things) devices like smart thermostats or security cameras that have malware or have such easy access to their administration accounts, that they can be collectively controlled by remote code execution.

Privacy News Online: Weekly Review | March 26, 2021

Privacy News Online: Weekly Review | March 26, 2021

The problem is, the HTTP referrer header often holds private user data, such as user account information on a website or which articles you read.Privacy News Online is brought to you by Private Internet Access, the world’s most trusted VPN service.

Hobby Lobby Exposes Customer Data in Cloud Misconfiguration

Hobby Lobby Exposes Customer Data in Cloud Misconfiguration

Arts-and-crafts retailer Hobby Lobby has suffered a cloud-bucket misconfiguration, exposing a raft of customer information, according to a report.“The Hobby Lobby incident is the latest example of why we need to take public cloud threat vectors so seriously,” said Douglas Murray, CEO at Valtix, told Threatpost.

Teen who hacked Twitter accounts of Biden, Obama, Musk, Bezos and more is sentenced to 3 years in prison

Teen who hacked Twitter accounts of Biden, Obama, Musk, Bezos and more is sentenced to 3 years in prison

Graham Ivan Clark, age 18 was sentenced to three years in prison followed by three years of probation after pleading guilty to hacking into high-profile Twitter accounts when he was 17 years old.

The Allure of Audience, The Illusion of Influence

The Allure of Audience, The Illusion of Influence

What happens when the message is not exactly what the farmer wants the audience sheep to hear?

Google Brings Live Captioning to Google Chrome

Google Brings Live Captioning to Google Chrome

A new Chrome feature called Live Caption leverages machine learning to bring captions to content across platforms on the web.“When enabled, Live Caption on Chrome uses machine learning to caption video and audio content on your browser.

Japan to probe Line after reports it let Chinese engineers access user data

Japan to probe Line after reports it let Chinese engineers access user data

TOKYO (Reuters) - Japan’s government said on Wedneseday it would investigate messaging app Line, owned by SoftBank Corp’s Z Holdings Corp, after Japanese media reports that it let Chinese engineers at a Shanghai affiliate access Japanese users’ data without informing them.

A Hacker Got All My Texts for $16

A Hacker Got All My Texts for $16

In Sakari's case, it receives the capability to control the rerouting of text messages from another firm called Bandwidth, according to a copy of Sakari's LOA obtained by Motherboard.

Hackers Publish Thousands of CCTV videos after they Breached US Verkada

Hackers Publish Thousands of CCTV videos after they Breached US Verkada

One person involved in the hack told Reuters that a small group of hackers had seen live and archived surveillance footage from hundreds of companies, including Tesla, by accessing the system administrator's accounts at the camera maker Verkada .

Consumer data protection signed into law in Virginia

Consumer data protection signed into law in Virginia

The legislation also requires businesses have written contracts with third-party vendors that include rules for the processing of data, the purpose of processing, the duration of processing and the type of data to be processed.

Daring Fireball: T-Mobile Is Automatically Enrolling Cell Phone Customers Into Ad Tracking Based on Their Online Activity

Daring Fireball: T-Mobile Is Automatically Enrolling Cell Phone Customers Into Ad Tracking Based on Their Online Activity

Drew FitzGerald, reporting for The Wall Street Journal (News+ link): T-Mobile US Inc. will automatically enroll its phone subscribers in an advertising program informed by their online activity, testing businesses’ appetite for information that other companies have restricted.

Thousands of Android and iOS Apps Leak Data From the Cloud

Thousands of Android and iOS Apps Leak Data From the Cloud

Zimperium ran automated analysis on more than 1.3 million Android and iOS apps to detect common cloud misconfigurations that exposed data.

Tools of digital surveillance and repression

Tools of digital surveillance and repression

Justice For Myanmar has obtained Ministry of Home Affairs budget files from 2018-21 and Ministry of Transport and Communications budget files from 2019-21, which include budgeted items for the Myanmar Police Force, Bureau of Special of Investigation under the Ministry of Home Affairs and Department of IT and Cyber Security under the Ministry of Transport and Communications.

Israel adopts law allowing names of unvaccinated to be shared

Israel adopts law allowing names of unvaccinated to be shared

Israel's parliament passed a law Wednesday allowing the government to share the identities of people not vaccinated against the coronavirus with other authorities, raising privacy concerns for those opting out of inoculation.

Why hot new social app Clubhouse spells nothing but trouble

Why hot new social app Clubhouse spells nothing but trouble

Users can listen in to conversations, interviews and discussions between interesting people on various topics – it is just like tuning in to a podcast, but live and with an added layer of exclusivity.”.

Clubhouse users are teaching each other how to stay private from Instagram

Clubhouse users are teaching each other how to stay private from Instagram

So that’s what’s actually happening here: Logging of when Clubhouse requests information from Instagram; Not Instagram literally recording audio when Clubhouse accesses it.

40+ Rights Groups Urge Biden to Halt Federal Use of 'Dangerous' Facial Recognition Technology

40+ Rights Groups Urge Biden to Halt Federal Use of 'Dangerous' Facial Recognition Technology

A coalition of more than 40 advocacy groups is calling on President Joe Biden to take executive action imposing a moratorium on U.S. government use of facial recognition and other biometric technology, block state and local governments from using federal funds for such tools, and support related legislation introduced in Congress last year.

You can now access blockchain domains using any web browser

You can now access blockchain domains using any web browser

Check out our list of the best web hosting services availableHere's our list of the best crypto exchanges out thereWe've built a list of the best business web hosting services right nowWith the new system in place, however, users can enter .crypto addresses into their browser just as they would with any other domain extension (.com, .net, .org etc.

Kidnap capital Mexico eyes biometric phone registry, sparking privacy fears

Kidnap capital Mexico eyes biometric phone registry, sparking privacy fears

MEXICO CITY (Reuters) - A plan by Mexican lawmakers to put millions of cell phone users’ data in a biometric registry, billed as a tool to fight kidnapping and extortion, has sparked a backlash from telecoms companies and rights groups who warn it could lead to stolen data and higher costs.

Yandex Employee Caught Selling Access to Users' Email Inboxes

Yandex Employee Caught Selling Access to Users' Email Inboxes

Russian Dutch-domiciled search engine, ride-hailing and email service provider Yandex on Friday disclosed a data breach that compromised 4,887 email accounts of its users.The company blamed the incident on an unnamed employee who had been providing unauthorized access to the users' mailboxes for personal gain.

Clubhouse says it will improve security after researchers raise China spying concerns

Clubhouse says it will improve security after researchers raise China spying concerns

The company told SIO that it was going to roll out changes “to add additional encryption and blocks to prevent Clubhouse clients from ever transmitting pings to Chinese servers” and said it would hire an external security firm to review and validate the updates.

Clubhouse Is Suggesting Users Invite Their Drug Dealers and Therapists

Clubhouse Is Suggesting Users Invite Their Drug Dealers and Therapists

For example, say you have an ex or even a harasser you’ve tried to block from your life, but they still have your number in their phone; if they upload their contacts, Clubhouse will know you’re connected to them and make recommendations on that basis.

10 SIM Swappers Arrested for Stealing $100M in Crypto from Celebrities

10 SIM Swappers Arrested for Stealing $100M in Crypto from Celebrities

Ten people belonging to a criminal network have been arrested in connection with a series of SIM-swapping attacks that resulted in the theft of more than $100 million by hijacking the mobile phone accounts of high-profile individuals in the U.S. The Europol-coordinated year-long investigation was jointly conducted by law enforcement authorities from the U.K., U.S., Belgium, Malta, and Canada.

Can The FBI Hack Into Private Signal Messages On A Locked iPhone? Evidence Indicates Yes

Can The FBI Hack Into Private Signal Messages On A Locked iPhone? Evidence Indicates Yes

The FBI appears to have a tool that can access Signal messages, even if a device is locked.Screenshot from Department of Justice file For police to access private Signal messages from an iPhone, there are some other caveats besides a device needing to be in AFU mode.