Charities Urged To Stop Sharing Data With Adtech Industry

Charities Urged To Stop Sharing Data With Adtech Industry

In an open letter, ProPrivacy and other groups say that that many charity pages dealing with extremely sensitive issues such as mental health, debt, end-of-life care, and disability contained various trackers allowing advertisers to profile vulnerable users based on the topic of the page – for example, alcohol addiction or mental health issues.

This photographer snaps the intimate texts of strangers on the NYC streets

This photographer snaps the intimate texts of strangers on the NYC streets

For several years, street photographer Jeff Mermelstein has been taking covert pictures of New Yorkers’ phones with his own iPhone.The images were initially shared on his Instagram account, but now this collection has been gathered together in a new photo book called #nyc.

'Having my identity stolen cost me £10,000'

'Having my identity stolen cost me £10,000'

"Criminals are targeting ID fraud as a lucrative business model and they're getting sophisticated in their use of social engineering [on the phone, text messages or on social media] which involves persuading people to give up personal information," Mr Haley said.

How to safely and anonymously browse the Internet

How to safely and anonymously browse the Internet

Knowing how to safely and anonymously browse the web is essential for protecting your personal privacy.A virtual private network (VPN) can help keep your internet browsing private or anonymous, but it may depend on the quality of the VPN that you choose to use.

Virgin Media data breach affects 900,000 people

Virgin Media data breach affects 900,000 people

Image copyright Getty Images A Virgin Media database containing the personal details of 900,000 people was left unsecured and accessible online for 10 months, the company has admitted.

GitHub - HarryJamesRobson/VernamTool: An encryption and decryption tool inspired by Vernam ciphers and one time pads.

GitHub - HarryJamesRobson/VernamTool: An encryption and decryption tool inspired by Vernam ciphers and one time pads.

An encryption and decryption tool inspired by Vernam ciphers and one time pads. August 3rd, 2019: This is my first ever Github repository. I'm 16 and obiously still learning and would really appreciate tips and advice. Any support is greatly appreciated.

Samsung TVs should be regularly virus-checked, the company says

Samsung TVs should be regularly virus-checked, the company says

Samsung's recent smart TVs run off a version of its proprietary operating system, Tizen, and often come pre-loaded with McAfee's Security for TV anti-virus software. One security adviser had described the tweet as being "pointless advice" that would be a "waste of time" to follow.

Chernobyl, Iodine and the DarkNet

Chernobyl, Iodine and the DarkNet

This was before the internet, but people had their means of getting underground information — my grandfather for example was an avid HAM radio fan and would listen to Radio Free Europe and others.

Social Media Posts Reveal NATO Soldiers’ Activities, Report Says

Social Media Posts Reveal NATO Soldiers’ Activities, Report Says

An article published by the independent organization, which provides NATO with advice and expertise and is based in Riga, Latvia, said that during another recent exercise (not Trident Juncture) in a NATO nation, researchers were able to collect sensitive information , track troop movements and find soldiers’ approximate location via social media.

As many as 11,543 Microsoft employees got swept up in a reply-all email apocalypse

As many as 11,543 Microsoft employees got swept up in a reply-all email apocalypse

It all started when an employee sent a message to everyone who helps manage Microsoft's GitHub account, we hear. An employee noticed that they were in the Bedlam DL3 group and sent a message to the list asking to be removed.

Schneier on Security

Schneier on Security

To remain anonymous and secure on the Internet, invest in a Virtual Private Network account, but remember, the bad guys are very smart, so by the time this column runs, they may have figured out a way to hack into a VPN.

What Prevents Good Cybersecurity and Privacy Behaviors?

What Prevents Good Cybersecurity and Privacy Behaviors?

From a close reading of much of this prior work, my colleagues and I identified three inter-related high level barriers that may explain why advice about security and privacy is often ignored and why many security and privacy tools go largely unused: awareness, motivation, and knowledge.