Facebook, Google, and Oracle cloud are tracking the porn you watch in private

Facebook, Google, and Oracle cloud are tracking the porn you watch in private

“The sites Jack visits, as well as any third-parties trackers, may observe and record his online action,” the study reads.“These third-parties may even infer Jack’s sexual interests from the URLs of the sites he visits.

Why You Should Never Borrow Someone Else's Charging Cable

Why You Should Never Borrow Someone Else's Charging Cable

For the moment, Henderson says, a bigger threat than malicious charging cables is USB charging stations you see in public places like airports.Many travelers know that, in a pinch, the hotel front desk will often have a drawer of charging cables that were left behind by guests.

These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer

These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer

Instead, it had been modified to include an implant; extra components placed inside the cable letting the hacker remotely connect to the computer.

Netflix’s new documentary “The Not So Surprising Hack”

Netflix’s new documentary “The Not So Surprising Hack”

Earlier this month, Facebook got fined with 5 billion dollars.“The Great Hack” unfolds the true story of the data and privacy scandal in a narrative that is thrilling, but foremost frightening.Will they actually listen when, as mentioned in the documentary, data has surpassed oil in value?

Pearson data breach: details of hundreds of thousands of U.S. students hacked

Pearson data breach: details of hundreds of thousands of U.S. students hacked

Pearson says that to its knowledge none of the accessed student data has been misused and the chances of the data being misused are low since no financial data was accessed. The company says it has already contacted all the people who had their data breached and is offering complimentary credit-monitoring services to affected victims.

Clothing marketplace Poshmark confirms data breach

Clothing marketplace Poshmark confirms data breach

The company said in a brief blog post that user profile information, including names and usernames, gender and city data was taken by an “unauthorized third party.” Email addresses, size preferences and scrambled passwords were also taken.

5 big questions to ask companies before entrusting them with your personal data

5 big questions to ask companies before entrusting them with your personal data

Given the number of data breaches and privacy violations in recent years involving companies from Equifax EFX, -0.67% to Facebook FB, -0.77%, some people might only be surprised if their personal data was not hacked, said Britt Siedentopf, vice president of services at Global Asset, a cybersecurity and IT support firm in the Dallas, Texas metro area.

Massive Capital One breach exposes personal info of 100 million Americans

Massive Capital One breach exposes personal info of 100 million Americans

Banking institution Capital One has just revealed that it’s suffered a data breach that exposed the names, addresses, phone numbers, emails, dates of birth, and self-reported incomes of approximately 100 million Americans, and 6 million in Canada, due to a “configuration vulnerability” in the servers of an unnamed cloud computing company hosting the bank’s data.

Is someone watching me? — Webcam Security

Is someone watching me? — Webcam Security

People worldwide are encountering cyberattacks like getting their computers infected by malware and letting others access their webcams or microphones. With a malicious code a hacker can easily control your computer and perform many different actions like access your webcam.

How To Tell If Someone is Watching You: Is Your Webcam Hacked?

How To Tell If Someone is Watching You: Is Your Webcam Hacked?

Basic malware will run as a process on your computer without you noticing (until, that is, pictures from your webcam appear on the internet). One more tell-tale sign that your webcam has been hacked is if the security settings for it are a bit screwy.

Israeli spyware used in WhatsApp hack 'can secretly snoop on your Apple, Facebook and Google data'

Israeli spyware used in WhatsApp hack 'can secretly snoop on your Apple, Facebook and Google data'

Potential customers of the Israeli company NSO's hacking software have allegedly been told that the technology can now "surreptitiously scrape all of an individual's data from the servers of Apple, Google, Facebook, Amazon and Microsoft".

Hackers breach FSB contractor, expose Tor deanonymization project and more

Hackers breach FSB contractor, expose Tor deanonymization project and more

Hackers have breached SyTech, a contractor for FSB, Russia's national intelligence service, from where they stole information about internal projects the company was working on behalf of the agency -- including one for deanonymizing Tor traffic.

Before Being Hacked, Border Surveillance Firm Lobbied to Downplay Security and Privacy Concerns About Its Technology

Before Being Hacked, Border Surveillance Firm Lobbied to Downplay Security and Privacy Concerns About Its Technology

Yet while photos of faces and license plates of some 100,000 U.S. drivers are now freely available online, the CEO of Perceptics, John Dalton, claimed in an email a few years ago that “CBP has none of the privacy concerns at the border that all agencies have inland.”.

Data of Nearly Every Adult in Bulgaria Likely Stolen in Cyberattack

Data of Nearly Every Adult in Bulgaria Likely Stolen in Cyberattack

The Bulgarian public first caught light of the hack on Monday, after someone claiming to be the hacker behind the attack contacted several local media outlets to say that they had stolen the personal information of more than five million citizens (in a country with a population of 7 million), and shared some of the data they had stolen.

Attack by Chinese hacker group targeted high-profile individuals around the world

Attack by Chinese hacker group targeted high-profile individuals around the world

A hacker attack of impressive magnitude targeted specific individuals of interest to the Chinese government as they moved around the world, in what appears to be the first such operation in the history of cyberespionage.

Netflix documentary The Great Hack turns the Cambridge Analytica scandal into high drama

Netflix documentary The Great Hack turns the Cambridge Analytica scandal into high drama

The Great Hack covers one of 2018’s biggest tech controversies: the revelation that political consulting firm Cambridge Analytica secretly collected 87 million Facebook users’ data. The film is more interested in Cambridge Analytica than data policy Brittany Kaiser’s story is by far the most interesting part of The Great Hack.

Exclusive: Western intelligence hacked 'Russia's Google' Yandex to spy on accounts - sources

Exclusive: Western intelligence hacked 'Russia's Google' Yandex to spy on accounts - sources

WASHINGTON/LONDON/SAN FRANCISCO (Reuters) - Hackers working for Western intelligence agencies broke into Russian internet search company Yandex in late 2018 deploying a rare type of malware in an attempt to spy on user accounts, four people with knowledge of the matter told Reuters.

Tokyo 2020 will be the first Olympic Games to use facial recognition

Tokyo 2020 will be the first Olympic Games to use facial recognition

Select attendees of the games — including athletes, media, staff, and volunteers — will have their identities verified via a face scan to enter venues, the Tokyo Organizing Committee said in an announcement.

The U.S. Government Is Utterly Inept at Keeping Your Data Secure

The U.S. Government Is Utterly Inept at Keeping Your Data Secure

The revelations that NSA hackers and Border Patrol data-trackers had played themselves came on the heels of potentially worse news for wired Americans: An Israeli coding firm also admitted last month that its spyware was being deployed by hackers to attack WhatsApp users and gain access to their phones.

Cyberstalking Techniques: What Stalkers Can Do If They Have Your Name & Surname (Part I)

Cyberstalking Techniques: What Stalkers Can Do If They Have Your Name & Surname (Part I)

Your stalker can simply enter name/surname to Maltego’s database, and see what contact information is available about his victim online: what emails, what domains have a person by the same name are registered.

Maker of US border's license-plate scanning tech ransacked by hacker, blueprints and files dumped online

Maker of US border's license-plate scanning tech ransacked by hacker, blueprints and files dumped online

On Thursday this week, however, an individual using the pseudonym "Boris Bullet-Dodger" contacted The Register , alerting us to the hack, and provided a list of files exfiltrated from Perceptics' corporate network as proof.

Most popular types of cyber attacks against individual users, part I

Most popular types of cyber attacks against individual users, part I

My prediction is that phishing attacks will become more sophisticated because of substantial data leaks that exposed private information to hackers. The three cyber attacks that I mentioned above benefit from such leaks, and it will take some time to train the required number of cybersecurity specialists.

The Trade Secret: Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers

The Trade Secret: Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers

Siegel refers to a handful of firms globally, including Proven Data and MonsterCloud, as “ransomware payment mills.” They “demonstrate how easily intermediaries can prey on the emotions of a ransomware victim” by advertising “guaranteed decryption without having to pay the hacker,” he said in a blog post.

How Hackers Broke WhatsApp With Just a Phone Call

How Hackers Broke WhatsApp With Just a Phone Call

But a new Financial Times report alleges that the notorious Israeli spy firm NSO Group developed a WhatsApp exploit that could inject malware onto targeted phones—and steal data from them—simply by calling them.

Privacy International Wins Historic Victory at UK Supreme Court

Privacy International Wins Historic Victory at UK Supreme Court

Privacy International's case stems from a 2016 decision by the IPT that the UK government may use sweeping 'general warrants' to engage in computer hacking of thousands or even millions of devices, without any approval from by a judge or reasonable grounds for suspicion.

Chinese hackers were using NSA malware a year before Shadow Brokers leak

Chinese hackers were using NSA malware a year before Shadow Brokers leak

Per a graphic released by Symantec, the Buckeye group had used a version of the DoublePulsar backdoor since March 2016, more than 13 months before a mysterious group of hackers known as the Shadow Brokers leaked it online in April 2017, as part of a larger cache of NSA hacking tools.

Strong password dilemma: tips on securing your data online

Strong password dilemma: tips on securing your data online

The biggest problem is that a lot of companies consider that hashing passwords is enough, so if their security systems have been breached — a whole array of usernames (that are stored in original text form), e-mails, and other sensitive data is linked to a particular hash.

The Challenges of Ethical Hacking – A Minefield of Legal and Ethical Woes

The Challenges of Ethical Hacking – A Minefield of Legal and Ethical Woes

Depending on the organization that you’re dealing with, responses can be as positive as interested engagement and proactively fixing an issue, to dismissive and uninterested, to actively hostile and ready to pursue legal action.

5 Brain-Boosting Podcast Episodes About Online Privacy and Security

5 Brain-Boosting Podcast Episodes About Online Privacy and Security

#2 Security, privacy and the internet of things – with Steve Lord, Cybersecurity Sauna podcast. In this Cybersecurity sauna podcast episode, Steve Lord speaks about the security and privacy issues of the devices used in IoT today.

Microsoft discloses security breach that impacted some Outlook accounts

Microsoft discloses security breach that impacted some Outlook accounts

Chinese companies have leaked over 590 million resumes via open databases Over 540 million Facebook records found on exposed AWS servers According to Microsoft, between January 1, 2019, and March 29, 2019, a hacker, or group of hackers, compromised the account of a Microsoft support agent, one of the company's customer support representatives that handles technical complaints.

More