New York Attorney General Looks Into Zoom’s Privacy Practices

New York Attorney General Looks Into Zoom’s Privacy Practices

Last week, after an article on the news site Motherboard reported that software inside the Zoom iPhone app was sending user data to Facebook, the company said it was removing the tracking software.

Coronavirus delays the passage of the world’s most important new privacy law

Coronavirus delays the passage of the world’s most important new privacy law

However, as the Carnegie India article notes, there are some differences between the Personal Data Protection Bill 2019 and the GDPR: the bill gives India’s central government the power to exempt any government agency from the bill’s requirements.

A keyboard encryption app used to skirt coronavirus censorship was removed by Apple in China

A keyboard encryption app used to skirt coronavirus censorship was removed by Apple in China

Apple yesterday removed Boom the Encryption Keyboard, an app that allowed Chinese internet users to bypass censorship, from the China app store, according to its developer.

Formal GDPR complaint against Google’s internal data free-for-all

Formal GDPR complaint against Google’s internal data free-for-all

But Brave’s new evidence reveals that Google reuses our personal data between its businesses and products in bewildering ways that infringe the purpose limitation principle.The result is an internal data free-for-all that infringes the GDPR’s purpose limitation principle.

Famous iOS apps are snooping on the Pasteboard

Famous iOS apps are snooping on the Pasteboard

The results show that many famous iOS apps frequently snooping around and having access to the pasteboard and read its content without user consent, albeit only text-based data.

Popular iPhone and iPad Apps Snooping on the Pasteboard

Popular iPhone and iPad Apps Snooping on the Pasteboard

The results show that many apps frequently access the pasteboard and read its content without user consent, albeit only text-based data.There are games and apps that do not provide any UI that deals with text, yet they read the text content of the pasteboard every time they’re opened.

AT&T’s Ad Exchange is Overrun With Data Stealing Malware

AT&T’s Ad Exchange is Overrun With Data Stealing Malware

In the end, I analyzed about 10,000 web sessions, and found that nearly 2 out of every 100 ads from AppNexus are infected by malicious code .This is nearly double the average rate of malvertising for other ad networks, which ranges from 0.5 - 1%, depending on the source.

Everything you need to know about the “Right to be forgotten”

Everything you need to know about the “Right to be forgotten”

Of course, given competing interests and the hyper-connected nature of the Internet, the right to be forgotten is much more complicated than an individual simply requesting that an organization erase their personal data.

FCC: Big Telco Broke the Law in Selling All Customers' Location Data

FCC: Big Telco Broke the Law in Selling All Customers' Location Data

According to Axios, the Federal Communications Commission (FCC) is proposing fines against cell service providers, like AT&T and T-Mobile, for illegally selling data on the real-time location of their customers without the customers’ knowledge.

Almond

Almond

Commands in Almond can be monitored and filtered : you can specify to be notified whenever the result changes, when a certain condition is true, or only for a certain subset of the data.

Startpage replies to questions about ownership change

Startpage replies to questions about ownership change

The change raised fears and questions, especially since Startpage or System1/Privacy One Group Ltd provided little information about specifics off the deal.Startpage published an article on its site recently that attempts to answer some of these questions and reassure users of the service that the deal has no privacy implications.

How Your Cell Phone Spies on You by Edward Snowden

How Your Cell Phone Spies on You by Edward Snowden

In case of transportation, think of IoT’s implementation like a connected network of all the things you see when you hit the road—the traffic signals, street lights, the infrastructure and of course, the vehicles moving around you.

Opinion | This Article Is Spying on You

Opinion | This Article Is Spying on You

And because news organizations benefit from the surveillance economy by running advertisements targeted to reader interests, they may be less likely to report on their own tracking practices.During each page load the software kept track of data transfers made to outside companies and generated a summary of what happened.

Brain-scanning in Chinese factories probably doesn’t work — if it’s happening at all

Brain-scanning in Chinese factories probably doesn’t work — if it’s happening at all

The algorithm then interprets the data into various emotional states — for example, depression, anxiety, and rage — so managers can use the information to better plan break times and help everyone be efficient.The Chinese program uses the sensors to record electrical signals in the brain, which is called electroencephalography (EEG).

Academics steal data from air-gapped systems via a keyboard's LEDs

Academics steal data from air-gapped systems via a keyboard's LEDs

The research team behind this exfiltration method says it tested the CTRL-ALT-LED technique with various optical capturing devices, such as a smartphone camera, a smartwatch's camera, security cameras, extreme sports cameras, and even high-grade optical/light sensors.

Germany responds to Trump: Huawei has no back door, but Cisco has 10

Germany responds to Trump: Huawei has no back door, but Cisco has 10

This article reveals a very important fact that no backdoors were found in Huawei's products, and 10 vulnerabilities were discovered on Cisco products in the United States.

Why I don't like smartphones

Why I don't like smartphones

Smartphones have powerful CPUs and fast network connections, except that you aren't actually allowed to use these resources in any meaningful sense, because doing so consumes battery power, and people don't want the precious battery life of their phones drained unnecessarily.

Letter: Does Apple respect the privacy of iPhone users?

Letter: Does Apple respect the privacy of iPhone users?

We are told by Apple that it will keep our data secure, but the company doesn’t seem to respect our privacy and has decided to share our information with other companies.

Russia exposed: How Putin’s henchmen are ALREADY manipulating the internet

Russia exposed: How Putin’s henchmen are ALREADY manipulating the internet

“They are not the only government to use information control on the internet as a weapon against a population, but they are one of the most aggressive.” In November 2018, Russian website Sputnik published a news story about the Kerch incident with Ukraine, which resulted in the arrest by Russia of 24 Ukrainian soldiers, blaming the incident on Russian negligence or hostility, Mr Williams said.

Right to object: How do I make a right to object request?

Right to object: How do I make a right to object request?

Before you exercise the right to object you need to ask and understand how an organisation is processing your data. Remember you should outline in your request what it is you are objecting to, so the organisation can take the necessary steps to stop processing your personal data.

Researchers show smartwatches can figure out exactly what you are up to all day

Researchers show smartwatches can figure out exactly what you are up to all day

People usually wear such devices on their passive arm which is less engaged in everyday activity. “A wide variety of apps could be made smarter and more context-sensitive if our devices knew the activity of our bodies and hands.”.

Only a small percentage of users buys stuff through Alexa, report claims

Only a small percentage of users buys stuff through Alexa, report claims

with 85 posters participating Analysts have been aggressively optimistic in their predictions about the growth of consumer shopping via virtual assistants like Amazon's Alexa, but a new report claims that only a small fraction of Alexa device owners shop with voice commands.

EU Quietly Ramps Up Preparations To Re-introduce Blanket Data Retention After Top Court Threw It Out In 2014

EU Quietly Ramps Up Preparations To Re-introduce Blanket Data Retention After Top Court Threw It Out In 2014

In the second version, the Council of the EU is much more assertive: The rulings of the European Court of Justice in the cases Digital Rights Ireland and Tele 2, which set out the criteria for the lawful retention of data and access thereof are of fundamental importance in this context.

EU2019: Which MEPs voted in favour of digital rights?

EU2019: Which MEPs voted in favour of digital rights?

It's more interesting to observe that 10 member states have no MEPs consistently voting for digital rights. Despite the clear public message, many MEPs consistently voted against digital rights. Despite the clear public message, many MEPs voted against digital rights.

OSINT: How to find information on anyone

OSINT: How to find information on anyone

Since the article is about legally obtained information I’m not going to show how to get an unauthorized access, however, you can explore Google Hacking Database with a thousand of different queries.

Google and Privacy, a Trust Issue | One Step Closer to the Black Mirror.

Google and Privacy, a Trust Issue | One Step Closer to the Black Mirror.

Now that you can access my activity page here you can see how much Google has kept track of your data. As explained earlier the only possible answer to the question is that Google uses all this data to cater to businesses.

EU countries back copyright overhaul that threatens to hit YouTube and Facebook

EU countries back copyright overhaul that threatens to hit YouTube and Facebook

European Union countries approved sweeping reforms to the bloc's copyright laws on Monday, marking a symbolic end to a political battle that has pitted tech giants against high-profile media figures.

MEPs accidentally vote wrong way on copyright law

MEPs accidentally vote wrong way on copyright law

Several MEPs have said they accidentally voted the wrong way on a key amendment of a new European copyright directive, meaning the most controversial aspects of the law might have been removed had they not erred.

ADAMANT Puts Privacy Back In Your Hands

ADAMANT Puts Privacy Back In Your Hands

The main point of the article is that none of these messengers use E2EE to secure the group chats. With this in mind, let us look closer at the main key points of the article: Supporting apps running both on smartphones and computers request various permissions excessively and sometimes contain Trojan, however, many users continue to trust their devices’ operating system.

EU’s Parliament Signs Off on Disastrous Internet Law: What Happens Next?

EU’s Parliament Signs Off on Disastrous Internet Law: What Happens Next?

Whatever Internet companies and organizations do to comply with twenty-seven or more national laws – from dropping links to European news sites entirely, to upping their already over-sensitive filtering systems, or seeking to strike deals with key media conglomerates – will be challenged by one rightsholder faction or another.