Chinese government deploys coronavirus tracking app to help curb outbreak

Chinese government deploys coronavirus tracking app to help curb outbreak

According to China’s National Health Commission, close contact refers to someone who has come in close distance, with no effective protection, with confirmed cases, suspected cases or mild cases while the person was ill or showed symptoms of being ill.

In the face of password breaches, we are equal

In the face of password breaches, we are equal

I decided to survey the managers of the 11 most valuable companies in Finland and checked if I could easily find information about data breaches that they were involved in.After gathering the emails, I need to check if they were involved in public data breaches including leaked passwords.

Massive Novaestrat data leak effects over 20 million in Ecuador

Massive Novaestrat data leak effects over 20 million in Ecuador

The researchers thought that the various goldmines of data had been compiled by the Ecuadorian government from private databases – but it turned out that the government’s information was just another input in this large leak.

Hong Kong Protestors Using Mesh Messaging App China Can't Block: Usage Up 3685%

Hong Kong Protestors Using Mesh Messaging App China Can't Block: Usage Up 3685%

That's exactly what Hong Kong pro-democracy protesters are doing now, thanks to San Fransisco startup Bridgefy's Bluetooth-based messaging app.Rios: Bridgefy is a messaging app that works with or without Internet.

CLE - Google, Amazon, and Apple Digital Voice Assistants

CLE - Google, Amazon, and Apple Digital Voice Assistants

The information goes back to the company to help improve its digital voice assistant.The issue is in the private, accidental recordings received by Apple through digital voice assistants, which can be highly personal and sensitive, containing sufficient location and contact details to identify a user.

Add recipients to aliases at creation and new UUID aliases

Add recipients to aliases at creation and new UUID aliases

The above example would add the three recipients to the new alias and immediately forward the email to each of them.Another feature that was requested was the ability to create aliases that do not give away the username of the alias owner.

60M Minor Accounts Vulnerable, Instagram Exposes Kids Contact Details

60M Minor Accounts Vulnerable, Instagram Exposes Kids Contact Details

Instagram revealed to me that the contact information of these minors was already currently displayed in plain sight on their profile page in the Instagram app — meaning that over 1,000,000,000 users could view their profile and extract that person’s phone number or email address.

Instagram Shows Kids' Contact Details in Plain Sight

Instagram Shows Kids' Contact Details in Plain Sight

Stier says he estimates conservatively that 20,000 children in Australia have public contact information in their business Instagram profiles, although he's been examining the scope worldwide. Leonie Smith, a cyber safety educator based in Sydney, says children are usually unaware of the possible negative ramifications of exposing their contact information online.

'Siri, I'm getting pulled over': A shortcut for iPhones can automatically record the police

'Siri, I'm getting pulled over': A shortcut for iPhones can automatically record the police

There's a big new feature for iPhone experts this year: It's an app called Shortcuts, and with a little bit of logic and know-how, you can stitch together several apps and create a script that can be activated by pressing a button or using Siri.

Chinese database exposes 42.5 million records compiled from multiple dating apps

Chinese database exposes 42.5 million records compiled from multiple dating apps

Tens of millions of records about users of different dating apps have been discovered in a single database that doesn’t include any password protection, according to new research findings.

Mysterious Chinese Dating Apps Targeting US Customers Expose 42.5 Million Records Online

Mysterious Chinese Dating Apps Targeting US Customers Expose 42.5 Million Records Online

The dating applications logged and stored the user’s IP address, age, location, and user names. What concerns me most is that the virtually anonymous app developers could have full access to user’s phones, data, and other potentially sensitive information.

A family tracking app was leaking real-time location data

A family tracking app was leaking real-time location data

A popular family tracking app was leaking the real-time locations of more than 238,000 users for weeks after the developer left a server exposed without a password.

Report – Dalil Data Breach: 5+ Million Users’ Data Exposed by Unsecured App

Report – Dalil Data Breach: 5+ Million Users’ Data Exposed by Unsecured App

While the database does protect some data (for example, user passwords are hashed), the available information allows us to create fairly accurate user profiles.

I got a data breach alert. What next?

I got a data breach alert. What next?

With access to your email inbox, the perpetrator can reset and change your passwords to all the other online services you use, including Facebook, Netflix and Google. With access to your email inbox, the perpetrator is able to take full control of your online life.

Facebook will reveal who uploaded your contact info for ad targeting

Facebook will reveal who uploaded your contact info for ad targeting

Facebook will start to show when your contact info was uploaded, if it was by the brand or one of their agency/developer partners and when access was shared between partners.

Woman uses DNA test, finds sperm donor — and pays a "devastating" price

Woman uses DNA test, finds sperm donor — and pays a "devastating" price

When Teuscher wanted to know more about her daughter's ancestry and possible health issues, she and other family members decided to get DNA tests from 23andMe and added one for Zoe. What turned up appeared to be one of the anonymous donor's immediate relatives.

Blocking Unwanted Connections with a Hosts File

Blocking Unwanted Connections with a Hosts File

Select a Tip HostsNews blog & Updates To contribute a listing for our resources, or any other comments: Contact If you find the MVPS HOSTS file useful ... These updates are posted to most major security related sites, Newsgroups, and mailing lists, blogs etc.

Animal rights group creates online map showing farm locations and contact details

Animal rights group creates online map showing farm locations and contact details

Animal rights group creates online map showing farm locations and contact details By Glen Moret Updated Photo: Each icon on the Aussie Farms map is clickable and provides more information on each listed property. Farmers' Federation says site will encourage trespassing Photo: National Farmers' Federation president Fiona Simson said the website was a "huge breach of privacy".

“Change Encryption Laws Or We'll Pay Zero Tax Elsewhere" Says Tech Giants — The Betoota Advocate

“Change Encryption Laws Or We'll Pay Zero Tax Elsewhere" Says Tech Giants — The Betoota Advocate

LOUIS BURKE | Culture | CONTACT Multinational tech companies are threatening to leave the country after the passing of the Access and Assistance Bill, which could cost the government up to $0 in taxes if they make good on their threat.

Signal Has a Clever New Way to Shield Your Identity

Signal Has a Clever New Way to Shield Your Identity

Since the mechanism removes Signal's ability to validate senders, the service is adding workarounds that still let users verify who sent incoming messages, and reduce their chance of receiving abusive content.

The Release of the – MaidSafe – Medium

The Release of the – MaidSafe – Medium

Crust supports hole punching so nodes can connect directly when they might otherwise not be able to. Put simply, this describes the way that Crust itself stores a dynamic list of directly-accessible peers that a node can contact if it wants to join the Network.

Schneier on Security

Schneier on Security

It is also using contact information you handed over for security purposes and contact information you didn't hand over at all, but that was collected from other people's contact books, a hidden layer of details Facebook has about you that I've come to call "shadow contact information." I managed to place an ad in front of Alan Mislove by targeting his shadow profile.

Facebook Confirms Giving Advertisers Access to User Phone Numbers

Facebook Confirms Giving Advertisers Access to User Phone Numbers

“We are clear about how we use the information we collect, including the contact information that people upload or add to their own accounts.” In a Gizmodo report published Wednesday, two studies found that the social network was giving advertisers access to data sources that users did not explicitly permit could be used.

What The Heck, Facebook? – The Startup – Medium

What The Heck, Facebook? – The Startup – Medium

Hill ran a Facebook ad specifically targeting a single user, a computer science professor named Alan Mislove. Hill used a phone number that Mislove had never given to Facebook, so in theory they shouldn’t have that number.

You Gave Facebook Your Number For Security. They Used It For Ads.

You Gave Facebook Your Number For Security. They Used It For Ads.

They found that Facebook harvests user phone numbers for targeted advertising in two disturbing ways: two-factor authentication (2FA) phone numbers, and “shadow” contact information. However, until just four months ago, Facebook required users to enter a phone number to turn on any type of 2FA, even though it offers its authenticator as a more secure alternative.

Facebook Is Giving Advertisers Access to Your Shadow Contact Information

Facebook Is Giving Advertisers Access to Your Shadow Contact Information

One of the many ways that ads get in front of your eyeballs on Facebook and Instagram is that the social networking giant lets an advertiser upload a list of phone numbers or email addresses it has on file; it will then put an ad in front of accounts associated with that contact information.

Why You Might Not Want Your Watch Calling 911

Why You Might Not Want Your Watch Calling 911

But no matter what age you are, you should be aware of the legal ramifications: You’re allowing police into your home without a warrant, and you may not actually want that.

FBI Looking For Tech to Foil Fingerprint Obliteration

FBI Looking For Tech to Foil Fingerprint Obliteration

“The [Criminal Justice Information Services] Division has identified a growing trend in which criminals intentionally alter their fingerprints to defeat identification within the NGI System,” officials wrote in a request for information.