Google job search service draws antitrust complaint

Google job search service draws antitrust complaint

Budrul Chukrut/SOPA Images/LightRocket via Getty Images Google faces another antitrust allegation in the European Union -- this time focused on its job search service. "We confirm we have received the letter and we will assess it," a European Commission spokesperson wrote an emailed statement.

Apple contractors 'regularly hear confidential details' on Siri recordings

Apple contractors 'regularly hear confidential details' on Siri recordings

Apple contractors regularly hear confidential medical information, drug deals, and recordings of couples having sex, as part of their job providing quality control, or “grading”, the company’s Siri voice assistant, the Guardian has learned.

In Defense of Privacy

In Defense of Privacy

Media coverage of the threat to personal privacy from technology tends to follow a narrative in which privacy is a virtue, Big Tech its evil predator and government the good knight capable of protecting it.".

The Challenges of Ethical Hacking – A Minefield of Legal and Ethical Woes

The Challenges of Ethical Hacking – A Minefield of Legal and Ethical Woes

Depending on the organization that you’re dealing with, responses can be as positive as interested engagement and proactively fixing an issue, to dismissive and uninterested, to actively hostile and ready to pursue legal action.

This App Will Manage Your Privacy Settings Across All Devices and Accounts, Because Alexa Is Always Listening

This App Will Manage Your Privacy Settings Across All Devices and Accounts, Because Alexa Is Always Listening

Jumbo, which launched on iOS this month and has an Android version on the way, makes it simple to track all your privacy settings across various accounts in one place, clean out old social media posts and even delete previous Google searches and Alexa voice recordings (because she's always listening, folks).

Who and what do you depend on in your everyday life?

Who and what do you depend on in your everyday life?

The interesting thing however, is the often cryptic ingredient list in the products I buy as well as the odd nutrition value. People come to the store to buy gasoline so they can get to places.

Confessions of a private spy

Confessions of a private spy

Of course, Weinstein hired Black Cube - an organisation staffed by ex-Mossad operatives and a favoured plaything of some of the less savoury individuals stalking the planet - to spy on McGowan.

Another Facebook data row. But who to blame?

Another Facebook data row. But who to blame?

Data from App Events is used to power Facebook’s advertising algorithms, though the company insists it wouldn’t use sensitive data for this (we can’t verify that, of course). The company has a standard list of App Events that it provides to every developer that wants to use them.

What to Do When You Want to Delete Yourself From the Internet

What to Do When You Want to Delete Yourself From the Internet

Social media platforms are where you've likely shared the most about yourself; WD Storage , which published the study this visually infographic is based on, says that 350 million photos are added to Facebook each day.

Privacy Analyst Job in Montreal, QC

Privacy Analyst Job in Montreal, QC

The successful candidate will support the Data Privacy group on a wide range of assigned and special projects, such as the execution of routine privacy audits, data-infrastructure risk management, security controls, policies and research reports.

Tech skills in most demand this year: data, cloud and cybersecurity

Tech skills in most demand this year: data, cloud and cybersecurity

Almost every job in tech now requires security awareness and basic know-how." The Hays report, based on 2,000 companies, finds that 70 percent of IT employers say they face a moderate-to-extreme skills shortage of IT professionals.

Timothy C. May, Early Advocate of Internet Privacy, Dies at 66

Timothy C. May, Early Advocate of Internet Privacy, Dies at 66

On graduating he took a job at Intel, the world’s largest maker of computer chips, which had been founded a few years earlier. But people who successfully fought to integrate cryptography into the internet in its early days, to protect the privacy of individuals, hailed Mr. May’s writing as an inspiration.

The Real Cost of Technology – Step 1: Quantify Technology Costs

The Real Cost of Technology – Step 1: Quantify Technology Costs

At times they are sufficient processes done in ways driven more by job security and less by a desire to help the organization grow and succeed. In other cases, they are just the wrong tool and process for the wrong job.

NSA IG looks to make agency ‘transparent where we can be’

NSA IG looks to make agency ‘transparent where we can be’

“Because so much of the stuff can’t be disclosed, I think it really is critically important that we be transparent where we can be, so that the public knows at least that there is effective, independent oversight going on, even if we can’t disclose everything that we’re looking at,” Storch said.

‘I Don’t Really Want to Work for Facebook.’ So Say Some Computer Science Students.

‘I Don’t Really Want to Work for Facebook.’ So Say Some Computer Science Students.

Chad Herst, a leadership and career coach based in San Francisco since 2008, said that now, for the first time, he had clients who wanted to avoid working for big social media companies like Facebook or Twitter.