Overthinking Data Privacy on Social Media

Overthinking Data Privacy on Social Media

Instead, they will feed your data to machine learning algorithms to offer you a good service and also to display personalized advertisements on linked platforms.

In Spain a "register" for those who refuse the vaccine: "It will be shared with EU countries"

In Spain a "register" for those who refuse the vaccine: "It will be shared with EU countries"

The vaccine will not be mandatory, said Health Minister Salvador Illa, but whoever decides not to do so will be included in a "register" which will then be shared with other European Union countries.

Hackers Stole emails from Microsoft cloud Services

Hackers Stole emails from Microsoft cloud Services

Microsoft itself stated that it did not identify any vulnerabilities and traces of hacking of the products or cloud service provided.“Our investigation of recent attacks has identified incidents of abuse of credentials to gain access.

ACLU sues to find out how the FBI is breaking into encrypted devices

ACLU sues to find out how the FBI is breaking into encrypted devices

“The FBI is secretly breaking the encryption that secures our cell phones and laptops from identity thieves, hackers, and abusive governments, and it refuses to even acknowledge that it has information about these efforts — even though some details have been filed publicly in federal court.”.

Protect Our Civil Liberties Act would repeal Patriot Act, FISA Amendments Act, and ban encryption backdoors

Protect Our Civil Liberties Act would repeal Patriot Act, FISA Amendments Act, and ban encryption backdoors

Representative Tulsi Gabbard (D-HI) and Representative Thomas Massie (R-KY) are cosponsoring a bipartisan bill titled the Protect Our Civil Liberties Act (H.R. If passed, the Act would repeal the Patriot Act and the FISA Amendment Acts – essentially ending domestic surveillance programs siphoning up AMerican’s phone calls and emails.

Former Salesforce science boss founds You.com to take on Google Search

Former Salesforce science boss founds You.com to take on Google Search

Here’s a conspiracy theory for you: According to the aforementioned TechCrunch article, Socher says he can compete with Search on account of his clever AI, nuanced approach that Google can’t just imitate and obliterate (the Innovator’s Dilemma), and the fact that Google’s embroiled in anti-trust suits.

When the GDPR goes wrong…

When the GDPR goes wrong…

The merit behind the Bradford Trigger has nothing to do with personal data; each variable of the formula is a piece of information, which a company shall record, inter alia as required under the labour laws.

Read Apple’s commitment to freedom of expression that doesn’t mention China

Read Apple’s commitment to freedom of expression that doesn’t mention China

As first reported by the Financial Times on Friday, Apple’s four-page policy document commits to “respecting the human rights of everyone whose lives we touch — including our employees, suppliers, contractors, and customers.” But it does not cite any particular country, like China, where the company has been asked to ban apps that allow users to circumvent censorship before.

Experian breach affects over 24 million customers and businesses in South Africa

Experian breach affects over 24 million customers and businesses in South Africa

ShareTweet Consumer credit reporting agency Experian has suffered a data breach at their South African branch.

Unsecured Social Data database leaks 235 million public profiles from TikTok, Instagram, and YouTube

Unsecured Social Data database leaks 235 million public profiles from TikTok, Instagram, and YouTube

These public records were scraped from these social media platforms by Deep Social, a now defunct company that seems to have sold the data to Social Data.The database has since been secured, and affected users won’t be notified because the leaked information is technically public.

The Self-Destructive Quest for Perfection

The Self-Destructive Quest for Perfection

This week I was reintroduced to a phrase I’m coming to love as I interact with the privacy community: “don’t let perfection be the enemy of good enough.” If you recommend Signal to someone for it’s security, someone else will complain that Signal uses phone numbers and AWS as a backbone.

The Garmin hack could have been a disastrous, large scale privacy breach

The Garmin hack could have been a disastrous, large scale privacy breach

Hopefully, the increased amounts of data breaches, ransomware attacks, and other cyber hacking is finally enough to force the government to pass legislation that actually holds companies accountable for letting hackers breach the privacy of their users.

Study confirms companies with poor privacy practices are more likely to suffer data breach

Study confirms companies with poor privacy practices are more likely to suffer data breach

To back up the intuitive conclusion that companies with poorer privacy practices are more likely to suffer a data breach, Osana first started by assigning a privacy score to over 11,000 companies and organizations.

Inside the NSA’s Secret Tool for Mapping Your Social Network

Inside the NSA’s Secret Tool for Mapping Your Social Network

One of those documents, the first to be made public in June 2013, revealed that the NSA was tracking billions of telephone calls made by Americans inside the US.

Hungary suspends some GDPR privacy protections as part of COVID-19 “state of emergency”

Hungary suspends some GDPR privacy protections as part of COVID-19 “state of emergency”

The ruling party doesn’t seem to understand why the entire world is upset by the overreach of power and the fact that the state of emergency doesn’t have a set date to end.

Why Don’t We Just Ban Targeted Advertising?

Why Don’t We Just Ban Targeted Advertising?

Republican senator Orrin Hatch, then 84 years old, asked how Facebook could make any money by offering a free service.Above all, they’ve tried to browbeat the companies into adopting better policies around things like fact-checking, content moderation, and political ads.

Privacy is Cybersecurity for People

Privacy is Cybersecurity for People

Some people still imagine that companies Cybersecurity is about protecting assets like film footage from movies, or studio production tracks from recording sessions with music artists, or secret plans for the next Apple computer (duh, its another iPhone).

Wearable Microphone Jamming

Wearable Microphone Jamming

Furthermore, by arranging the transducers in a ring layout, our wearable jams in multiple directions and protects the privacy of its user’s voice, anywhere and anytime, without requiring its user to manually point the jammer to the eavesdropping microphones.

Toy Commercials Are Being Replaced by Something More Nefarious

Toy Commercials Are Being Replaced by Something More Nefarious

“It’s great that you’re cutting out the toy commercials,” Golin said.But the fact that screens now go with us everywhere means that you’re always available to marketers,” Golin said.

TSA: Making Woman Take Down Pants & Underwear “Not a Strip Search”

TSA: Making Woman Take Down Pants & Underwear “Not a Strip Search”

Their attempt to try the same justification — essentially that the TSA screeners who violated Mrs. Mengert were not interested in looking at her body; rather, she was just incidentally exposed as they searched her clothes — is a bit curious since the case they cited told the police to pound sand:.

Law enforcement is using a facial recognition app with huge privacy issues

Law enforcement is using a facial recognition app with huge privacy issues

Read – Emotion-Detecting Technology Should be Banned, Says AI Now. In fact, the software is already noted to be violating the policies of a lot of the websites that it collects the images from.

FBI tells people to put black tape over smart TV cameras to protect against hackers

FBI tells people to put black tape over smart TV cameras to protect against hackers

According to the intelligence agency's Portland, Oregon, bureau, which issued a reminder last week, the useful features of a smart TV, such as internet connection, microphones and cameras, are also means that hackers can use to gain access to your home.

Opinion | We Hate Data Collection. That Doesn’t Mean We Can Stop It.

Opinion | We Hate Data Collection. That Doesn’t Mean We Can Stop It.

And does it even matter that we do not want to be watched — or is it of no consequence, because they know we’re trapped, and so do we.And more than 80 percent feel like they have very little or no control over the data being collected about them.

Australia's regulator to take Google to court over data privacy

Australia's regulator to take Google to court over data privacy

The Australian Competition and Consumer Commission (ACCC) filed a lawsuit against the local unit of Alphabet Inc's Google on Tuesday, alleging that the company misled smartphone users on how it collected, kept and used personal location data.

You Got a Brain Scan at the Hospital. Someday a Computer May Use It to Identify You.

You Got a Brain Scan at the Hospital. Someday a Computer May Use It to Identify You.

The only privacy protection for subjects so far has been the fact that researchers who want to access data from the study have to sign agreements saying that they will not try to identify participants.

Buying a cheap smartphone? 7 things you need to know

Buying a cheap smartphone? 7 things you need to know

Academic research on pre-installed apps has concluded that “the supply chain around Android’s open source model lacks transparency” and that this “has facilitated potentially harmful behaviours and backdoored access to sensitive data and services without user consent or awareness”.We think that Google could do more to address the privacy and security concerns with pre-installed apps, for instance by banning pre-installed apps that can’t be deleted, by increasing transparency around the Android certification process and by better enforcing their own rules.

These 4 Gmail alternatives put your privacy first

These 4 Gmail alternatives put your privacy first

Most major free email providers, including Yahoo, scan user emails for ad targeting and data-gathering purposes.And yep, no one likes paying for an email account when the likes of Yahoo and Google offer them for free.

Fearing ‘Spy Trains,’ Congress May Ban a Chinese Maker of Subway Cars

Fearing ‘Spy Trains,’ Congress May Ban a Chinese Maker of Subway Cars

A Chinese state-owned company called CRRC Corporation, the world’s largest train maker, completed the $100 million facility this year in the hopes of winning contracts to build subway cars and other passenger trains for American cities like Chicago and Washington.

Over half a million active GPS trackers have ‘123456’ as default password

Over half a million active GPS trackers have ‘123456’ as default password

Back in May, UK cybersecurity firm Fidus Information Security revealed a vulnerability in a popular GPS tracker used by elderly patients that can be tricked into sending its real-time location simply by sending it a text message with a specific command.

Amazon will not tell me what happens to their hard drives.

Amazon will not tell me what happens to their hard drives.

In fact even though it was clearly my fault for waiting so long and I was outside the return period, amazon still stated Return the hard drive for a full refund.There are hard drives for purchase on amazon.Until I get some answers, I’m not returning my hard drive that failed,.