Facebook asks users about coronavirus symptoms, releases friendship data to researchers

Facebook asks users about coronavirus symptoms, releases friendship data to researchers

SAN FRANCISCO (Reuters) - Facebook Inc said on Monday it would start surveying some U.S. users about their health as part of a Carnegie Mellon University research project aimed at generating “heat maps” of self-reported coronavirus infections.

Linux Security: Chinese State Hackers May Have Compromised ‘Holy Grail’ Targets Since 2012

Linux Security: Chinese State Hackers May Have Compromised ‘Holy Grail’ Targets Since 2012

Decade of Chinese RATs. This new research adds to that concern, claiming that a concerted effort involving five Chinese advanced persistent threat (APT) groups has been focused on the Linux servers that "comprise the backbone of the majority of large data centers responsible for the some of the most sensitive enterprise network operations."

Warning: Zoom Sends Encryption Keys To China (Sometimes)

Warning: Zoom Sends Encryption Keys To China (Sometimes)

When Citizen Lab looked at where their U.S.- and Canada-based Zoom conversations were being routed, the researchers discovered encryption keys were sometimes sent to Beijing, though would be handled by servers in other countries, too.

Revealed: Saudis suspected of phone spying campaign in US

Revealed: Saudis suspected of phone spying campaign in US

Saudi Arabia appears to be exploiting weaknesses in the global mobile telecoms network to track its citizens as they travel around the US, according to a whistleblower who has shown the Guardian millions of alleged secret tracking requests.

>4,000 Android apps silently access your installed software

>4,000 Android apps silently access your installed software

More than 4,000 Google Play apps silently collect a list of all other installed apps in a data grab that allows developers and advertisers to build detailed profiles of users, a recently published research paper found.

Hackers are targeting your kids to infect Android and Chromebook devices with malware

Hackers are targeting your kids to infect Android and Chromebook devices with malware

Security investigators from Check Point Research discovered 56 malware-infected Google Play apps.Before Google had a chance to pull them down, users already downloaded the apps one million times; 24 of those apps, Check Point Research discovered, targeted children.Hazum told Laptop Mag how Google Play users can protect themselves from Tekya malware.

Web Cache Deception Attacks are Still Around, Says New Research

Web Cache Deception Attacks are Still Around, Says New Research

Web Cache Deception Attacks are Still Around, Says New Research.Web Cache Deception attacks are still impacting many popular websites, says new research.Researchers noticed that 25 of the Alexa Top 5,000 websites were impacted by the Web Cache Deception attack.

Document --fingerprinting-client-rects-noise and change explanation · Eloston/ungoogled-chromium@7cb9c1c

Document --fingerprinting-client-rects-noise and change explanation · Eloston/[email protected]

`--enable-stacked-tab-strip` is also configurable in `chrome://flags` Please note that they are not well tested, so proceed with caution.* `--set-ipv6-probe-false` - (Not in `chrome://flags`) Forces the result of the browser's IPv6 probing (i.e. IPv6 connectivity test) to be unsuccessful.

Study ranks the privacy of major browsers. Here are the findings

Study ranks the privacy of major browsers. Here are the findings

The study found the default Brave settings provided the most privacy, with no collection of identifiers allowing the tracking of IP addresses over time and no sharing of the details of webpages visited with backend servers.

Researchers expose vulnerabilities of password managers

Researchers expose vulnerabilities of password managers

Senior author of the study, Dr. Siamak Shahandashti from the Department of Computer Science at the University of York, said: "Vulnerabilities in password managers provide opportunities for hackers to extract credentials, compromising commercial information or violating employee information.

Research Finds Microsoft Edge Has Privacy-Invading Telemetry

Research Finds Microsoft Edge Has Privacy-Invading Telemetry

While Microsoft Edge shares the same source code as the popular Chrome browser, it offers better privacy control for users.This list is the checked by the browser and if any data needs to be sent to Google's servers, will only send a hashed partial URL fingerprint that can be used to track browsing behavior.

Google says it is developing a nationwide coronavirus website

Google says it is developing a nationwide coronavirus website

President Donald Trump had thanked Google on Friday for developing a website that he said would help people determine whether they needed a coronavirus test, saying that 1,700 engineers were working on it.

Vermont attorney general is suing Clearview AI over its controversial facial recognition app

Vermont attorney general is suing Clearview AI over its controversial facial recognition app

Vermont’s Attorney General alleges that this database violates the Vermont Consumer Protection Act, as well as the Data Broker Law. Clearview AI built its controversial app by scraping billions of publicly available images of individuals from the internet without their knowledge or consent.

Microsoft Edge has more privacy-invading telemetry than other browsers

Microsoft Edge has more privacy-invading telemetry than other browsers

Concluding the paper, Leith writes: From a privacy perspective Microsoft Edge and Yandex are qualitatively different from the other browsers studied.Edge also sends the hardware UUID of the device to Microsoft and Yandex similarly transmits a hashed hardware identifier to back end servers.

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

The research was conducted by Palo Alto Networks , a cybersecurity firm, it revealed that 83% devices ran on outdated services that can’t even be updated even when it contains several loopholes that hackers can easily bypass and exploit.

Do You Own Your Data?

Do You Own Your Data?

Discussion Questions: Since some entities (like corporations) do treat personal data as a commodity, for now, should we still demand that individuals be given a way to share in the distribution of the material benefits from the use/selling of such data?

GoodRx Saves Money on Meds—It Also Shares Data With Google, Facebook, and Others

GoodRx Saves Money on Meds—It Also Shares Data With Google, Facebook, and Others

To determine how GoodRx shares data, we monitored traffic using a data packet-capturing tool to observe the company's Android mobile app and website as we searched for deals on a number of prescription medications.

Here’s the File Clearview AI Has Been Keeping on Me, and Probably on You Too

Here’s the File Clearview AI Has Been Keeping on Me, and Probably on You Too

Scott, senior counsel at the Electronic Privacy Information Center, wrote in an email "The face search results show exactly why we need a moratorium on face surveillance.

Many WhatsApp private groups are indexed in Google and open to the public

Many WhatsApp private groups are indexed in Google and open to the public

He noticed that the “Invite to Group via Link” function for WhatsApp private groups creates a link that, when posted on the public internet, ends up being indexed by search engines such as Google, DuckDuckGo, and Bing.

Removing a GPS tracking device from your car isn’t theft, court rules

Removing a GPS tracking device from your car isn’t theft, court rules

The search warrant was based on the idea that the man had "stolen" a GPS tracking device belonging to the government.Last Thursday, Indiana's highest court made it official, ruling that the search warrant that allowed police to recover Heuring's meth was illegal.

Britain First leader Paul Golding charged under the Terrorism Act

Britain First leader Paul Golding charged under the Terrorism Act

The leader of far-right political group Britain First has been charged with an offence under the Terrorism Act after refusing to give police access to his phone.Golding was later charged with refusing to comply with a duty under Schedule 7 of the act.

3 reasons to avoid biased search results

3 reasons to avoid biased search results

Here are three reasons why you’ll want to avoid biased search results.When you avoid biased search results you help alternative search engines compete in a market dominated by Google.

Street-Level Surveillance

Street-Level Surveillance

EFF’s “Street-Level Surveillance” project shines light on the advanced surveillance technologies that law enforcement agencies routinely deploy in our communities.Every day, the threats to our rights expand as police use surveillance technologies to compile enormous databases filled with our personal information.

Waterfox has joined System1

Waterfox has joined System1

Throughout the years people have always asked about Waterfox and privacy, and if they’ve ever wanted more than it can afford, I’ve always pushed them to use Tor. Waterfox was here for customisations and speed, with a good level of privacy.

Conservative News Sites Track You Lots More Than Left-Leaning Ones

Conservative News Sites Track You Lots More Than Left-Leaning Ones

Popular right-leaning outlets analyzed by the researchers placed 227 cookies in a user's browser, versus 131 for the median popular left-leaning counterparts., the most popular right-leaning site, placed around 4 percent more cookies in women's browsers than , the most popular left-leaning site as categorized by BuzzFeed.

Chinese government deploys coronavirus tracking app to help curb outbreak

Chinese government deploys coronavirus tracking app to help curb outbreak

According to China’s National Health Commission, close contact refers to someone who has come in close distance, with no effective protection, with confirmed cases, suspected cases or mild cases while the person was ill or showed symptoms of being ill.

How Big Companies Spy on Your Emails

How Big Companies Spy on Your Emails

Motherboard has also obtained documentation that provides more specifics about how two other popular apps—Cleanfox and Slice—sell products based on users' emails to corporate clients.

Mental health websites don't have to sell your data. Most still do.

Mental health websites don't have to sell your data. Most still do.

For example, the page dedicated to treatments for depression on French health website Eurekasante contacts an astounding 71 third parties (compared to 36 in our first research) as soon as you open the page.

A Court Tried To Force Ancestry.com To Open Up Its DNA Database To Police. The Company Said No.

A Court Tried To Force Ancestry.com To Open Up Its DNA Database To Police. The Company Said No.

For months, legal experts who follow investigative genetic genealogy have expected search warrants to be issued to Ancestry and its main competitor, 23andMe, which has about 10 million DNA profiles in its database.

Google Ads Targeted at Literally One Person Could Be the Future of Doxxing

Google Ads Targeted at Literally One Person Could Be the Future of Doxxing

Every day, thousands of Mexican migrants tell Google about their intent to cross the border into the U.S. Nevertheless, throughout 2019, I ran various experiments, trying to achieve this “one-to-one” ad targeting — the ability to serve just you an ad, and get just your data, disaggregated.