DuckDuckGo’s Illusion of Privacy

DuckDuckGo’s Illusion of Privacy

While DuckDuckGo wants you to be able to search without being tracked, it’s irresponsible for the company to call itself a private search engine.

Facebook expands data abuse bug bounty programme to Instagram

Facebook expands data abuse bug bounty programme to Instagram

Instagram users can now report app developers they believe are misusing their data as part of an expansion to the social network’s security tools. Instagram said the security researchers would test the feature and receive bounty awards for any eligible reports which identify an issue.

Exclusive: Fearing data privacy issues, Google cuts some Android phone data for wireless carriers

Exclusive: Fearing data privacy issues, Google cuts some Android phone data for wireless carriers

NEW YORK/SAN FRANCISCO (Reuters) - Alphabet Inc’s Google has shut down a service it provided to wireless carriers globally that showed them weak spots in their network coverage, people familiar with the matter told Reuters, because of Google’s concerns that sharing data from users of its Android phone system might attract the scrutiny of users and regulators.

State-sponsored cyber spies targeting IoT - a warning from Microsoft

State-sponsored cyber spies targeting IoT - a warning from Microsoft

Back in April, Microsoft security researchers observed the infamous Russian-backed hacking group STRONTIUM (also known as Fancy Bear or APT28) compromising popular IoT devices (a VOIP phone, an office printer, and a video decoder) across multiple customer locations.

5 Encrypted Messaging Apps Doing A Better Job Than WhatsApp

5 Encrypted Messaging Apps Doing A Better Job Than WhatsApp

Loki Messenger is an open source and decentralized encrypted messaging service using blockchain technology to secure user data. The decentralized nature of blockchain technology allows the Loki Project to create a privacy suite enabling users to interact securely with the internet, encompassing encrypted messaging services, forums, online marketplaces and social media platforms.

Sites using Facebook ‘Like’ button liable for data, EU court rules

Sites using Facebook ‘Like’ button liable for data, EU court rules

Europe’s top court ruled Monday (30 July) that companies that embed Facebook’s “Like” button on their websites must seek users’ consent to transfer their personal data to the US social network, in line with the bloc’s data privacy laws.

5G Is Here—and Still Vulnerable to Stingray Surveillance

5G Is Here—and Still Vulnerable to Stingray Surveillance

Pencils Up. The researchers disclosed the issues to the telecom standards body GSMA and hopes to work with carriers to encourage 5G implementations that apply security and data protections to the cell tower connection process as early in the interaction as possible.

Haven Has Landed - Download Now for iOS and Android

Haven Has Landed - Download Now for iOS and Android

Keep your data and your financial information safe when you shop, chat, and send cryptocurrencies privately using Haven. To celebrate the launch, this week you can enjoy special 50% off deals on name-brand electronics and gift cards in the official Haven store.

The world’s most valuable resource is no longer oil, but data

The world’s most valuable resource is no longer oil, but data

Now similar concerns are being raised by the giants that deal in data, the oil of the digital era. Far from gouging consumers, many of their services are free (users pay, in effect, by handing over yet more data).

There is No Privacy. Echelon Made Privacy Obsolete.

There is No Privacy. Echelon Made Privacy Obsolete.

Originally Echelon was developed during the 1960’s cold war as a way for the USA to monitor military and political communications from Soviet Russia and it’s allies. Very few people know of it’s existence, and if they do they don’t care much about their privacy or security.

Zcash Foundation Reveals FPGA Research Results

Zcash Foundation Reveals FPGA Research Results

In May last year, after Bitmain unveiled its new Antimer Z9 Mini, the Foundation funded research into ASIC resistance, partly to appeal to the network’s strong base of GPU miners.

Studies prove once again that users are the weakest link in the security chain

Studies prove once again that users are the weakest link in the security chain

Organizations need to make sure users understand the importance of protecting sensitive data and safeguarding company assets, and that they’re aware of how their actions impact the overall security for the whole organization.

Equifax to Pay $575 Million as Part of Settlement with FTC, CFPB, and States Related to 2017 Data Breach

Equifax to Pay $575 Million as Part of Settlement with FTC, CFPB, and States Related to 2017 Data Breach

Equifax Inc. has agreed to pay at least $575 million, and potentially up to $700 million, as part of a global settlement with the Federal Trade Commission, the Consumer Financial Protection Bureau (CFPB), and 50 U.S. states and territories, which alleged that the credit reporting company’s failure to take reasonable steps to secure its network led to a data breach in 2017 that affected approximately 147 million people.

Hackers breach FSB contractor, expose Tor deanonymization project and more

Hackers breach FSB contractor, expose Tor deanonymization project and more

Hackers have breached SyTech, a contractor for FSB, Russia's national intelligence service, from where they stole information about internal projects the company was working on behalf of the agency -- including one for deanonymizing Tor traffic.

This jewelry is a brilliant shield against face-recognition intrusions

This jewelry is a brilliant shield against face-recognition intrusions

Having seen the light-up glasses invented by Japan’s National Institute of Informatics to foil face recognition, Nowak decided to move her project in a different direction, creating what she describes as face jewelry. Much to her surprise, the Prince-like design was the first one Nowak tried and the first that worked.

Facebook: The future is private! So private, we designed some handy new fingercams for y'all!

Facebook: The future is private! So private, we designed some handy new fingercams for y'all!

Facebook, whose CEO in April declared, "The future is private," has applied to patent a system of coordinated finger-affixed cameras that allow wearers to live stream a panoramic view of their surroundings.

Facebook isn’t listening to you, but through tracking what you do, it can serve up ads like it is

Facebook isn’t listening to you, but through tracking what you do, it can serve up ads like it is

Most of us know that every time we like a post, leave a comment and tag a friend, that gives Facebook even more ammunition to serve us ads. “There are many other ways for Facebook to target you with ads based on data they’ve collected and put through algorithms,” privacy advocate Paul Bischoff says.

If you did the Mannequin Challenge, you are now advancing robotics research

If you did the Mannequin Challenge, you are now advancing robotics research

The data: To approach this problem, a team at Google AI turned to an unexpected data set: thousands of YouTube videos of people performing the Mannequin Challenge. The method: The researchers converted 2,000 of the videos into 2D images with high-resolution depth data and used them to train a neural network.

These are the sneaky new ways that Android apps are tracking you

These are the sneaky new ways that Android apps are tracking you

Egelman added that the workings of these apps often made the deception obvious to researchers: “There are many apps that we observed which try to access the data the right way through the Android API, and then, failing that, try and pull it off the file system.”.

How Facebook Makes it Nearly Impossible For You To Quit

How Facebook Makes it Nearly Impossible For You To Quit

In an attempt to assuage a growing range of critics and prove that it’s not deliberately or exploitively trapping users in its service, Facebook advertises the availability of this export in a format that "allows another service to more easily import it.” That’s Facebook's exact text.

Democrats on the House Financial Services Committee are asking Facebook to put its cryptocurrency plans on hold

Democrats on the House Financial Services Committee are asking Facebook to put its cryptocurrency plans on hold

Maxine Waters, Carolyn Maloney, Lacy Clay, Al Green, and Stephen Lynch wrote to the $556 billion social network's top executives to ask it to impose a moratorium on Libra until regulators and Congress have had time to explore concerns, including the risk of hacking, data security, and global financial security.

China cracks down on popular social media apps

China cracks down on popular social media apps

SHANGHAI -- China's cyberspace regulator has blocked access to 26 podcast sharing or voice-based social apps, citing subversive content including "historical nihilism" and pornography. In a statement, Soul said it will work with the CAC to rectify its network.

TikTok under investigation over child data use

TikTok under investigation over child data use

The video-sharing app TikTok is under investigation in the UK for how it handles the personal data of its young users, and whether it prioritises the safety of children on its social network.

YaCy - The Peer to Peer Search Engine: Home

YaCy - The Peer to Peer Search Engine: Home

When contributing to the world-wide peer network, the scale of YaCy is limited only by the number of users in the world and can index billions of web pages. The resulting decentralized web search currently has about 1.4 billion documents in its index (and growing - download and install YaCy to help out!)

Five Eyes

Five Eyes

BERLIN/WASHINGTON/BEIJING (Own report) - In the dispute over boycotting the Chinese Huawei corporation, the German government is considering joining a campaign of the "Five Eyes" intelligence-sharing network, it was reported in Canada and Australia.

The Salmon Project: How To Effectively Fight Online Censorship Using A Proxy With Trust Levels

The Salmon Project: How To Effectively Fight Online Censorship Using A Proxy With Trust Levels

The main idea behind the method is that censors might have agents that use the circumvention system in the same way that regular users do in order to find out the IP addresses of proxy servers so as to easily block them.

Facebook Libra: Great Message, Wrong Messenger

Facebook Libra: Great Message, Wrong Messenger

Depending on what you read or hear, Libra is one or all of: a great act of enterprise social good that will change the lives of millions of people for the better; a nightmare for American and European regulators; a desperate attempt to rehabilitate the reputation and declining readership of Facebook and its increasingly unpopular CEO, Mark Zuckerberg; or a pipedream based on a shaky premise and a yet-to-be-built infrastructure that probably won’t be built.

AI Proving to Be an Integral Part of Cryptocurrency High Volume Transaction Security

AI Proving to Be an Integral Part of Cryptocurrency High Volume Transaction Security

Crypto mining | Image source: PixabayBlockchain technology can decentralize the process of transferring money by making transactions transparent and allowing the community of users to verify them.

The League of Entropy Forms to Offer Acts of Public Randomness

The League of Entropy Forms to Offer Acts of Public Randomness

Cloudflare, along with a group of individual and academic partners, is forming a new coalition that will provide truly random, unpredictable numbers for a variety of applications, including election systems and lotteries.

Facebook urged to pause Libra crypto-currency project

Facebook urged to pause Libra crypto-currency project

"Given the company's troubled past, I am requesting that Facebook agree to a moratorium on any movement forward on developing a crypto-currency until Congress and regulators have the opportunity to examine these issues and take action," said Democratic congresswoman Maxine Waters.

More