A new browser extension blocks any websites that use Google, Facebook, Microsoft, or Amazon

A new browser extension blocks any websites that use Google, Facebook, Microsoft, or Amazon

The Economic Security Project is trying to make a point about big tech monopolies by releasing a browser plugin that will block any sites that reach out to IP addresses owned by Google, Facebook, Microsoft, or Amazon.

Chinese spyware code was copied from America's NSA: researchers

Chinese spyware code was copied from America's NSA: researchers

WASHINGTON (Reuters) - Chinese spies used code first developed by the U.S. National Security Agency to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software developed by governments can boomerang against their creators.

Google Finally Adds App Privacy Labels to Gmail App

Google Finally Adds App Privacy Labels to Gmail App

Google today quietly added App Privacy labels to its Gmail app, marking the first of its major apps to receive the privacy details aside from YouTube.

Microsoft Teams AI could tell you who is most enjoying your video call

Microsoft Teams AI could tell you who is most enjoying your video call

Microsoft has developed an artificial intelligence for its Teams videoconferencing software that aims to put people presenting a remote talk more at ease by highlighting the most positive audience reactions.

Many users will move from Google to DuckDuckGo due to privacy

Many users will move from Google to DuckDuckGo due to privacy

The moment people started to realize how their private data should be saved they started to use the DuckDuckGo search engine.Finally, if you privacy-minded person, this is the time to move to DuckDuckGo private search engine.

New browser-tracking hack works even when you flush caches or go incognito

New browser-tracking hack works even when you flush caches or go incognito

Researchers from the University of Illinois, Chicago said in a new paper that most browsers cache the images in a location that’s separate from the ones used to store site data, browsing history, and cookies.

Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Using the "quantum annealing" method, the company said its research found that even the strongest versions of the advanced encryption standard may be decodable by quantum computers that could be available a few years from now.

The US Government can search your phone at the border without a warrant

The US Government can search your phone at the border without a warrant

Now that the government officially doesn’t need a warrant to do a digital search on your phone or other devices whenever you cross the United States border, remember to be extra vigilant when crossing the border.

Computer-stored encryption keys are not safe from side-channel attacks

Computer-stored encryption keys are not safe from side-channel attacks

In the paper Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (PDF), the researchers explain how they determine decryption keys for mathematically-secure cryptographic schemes by capturing information about secret values inside the computation taking place in the computer.

New details emerge about Google’s payments to link to French news sites

New details emerge about Google’s payments to link to French news sites

Google will pay $76 million over three years to 121 French news organizations to comply with a new French law requiring Google to pay when it uses "snippets" from news articles, Reuters reports.In effect, the law required Google to use snippets from French news sites and to pay for that use.

Federal judge rules warrantless phone searches of anyone at US border are fine

Federal judge rules warrantless phone searches of anyone at US border are fine

A First Circuit US judge has found that phone searches at US borders without a warrant are constitutional.“The bottom line is that basic border searches of electronic devices do not involve an intrusive search of a person,” she wrote in her ruling.

Browser ‘Favicons’ Can Be Used as Undeletable ‘Supercookies’ to Track You Online

Browser ‘Favicons’ Can Be Used as Undeletable ‘Supercookies’ to Track You Online

According to a researcher, though, these icons can also be a security vulnerability that could let websites track your movement and bypass VPNs, incognito browsing status, and other traditional methods of cloaking your movement online.

Police used geofence warrant to make Google to identify George Floyd protestors

Police used geofence warrant to make Google to identify George Floyd protestors

We’re only aware of the search warrant because an individual who had their information given to the police by Google, Said Abdullahi, received an email from Google letting him know that the information had been handed over.In this particular reverse location search warrant, Google handed over information on hundreds of individuals.

Neeva Search Engine by Two IIT Alumni Hopes to Take on Google by Ensuring Ad-Free Results, More Privacy

Neeva Search Engine by Two IIT Alumni Hopes to Take on Google by Ensuring Ad-Free Results, More Privacy

Although there are some alternatives to Google Search such as DuckDuckGo, which also promises data safety, Neeva hopes to provide a tailor-made search experience specifically for the end-user.

Privacy-focused search engine DuckDuckGo grew by 62% in 2020

Privacy-focused search engine DuckDuckGo grew by 62% in 2020

The search engine also told BleepingComputer that high-profile privacy news, such as the recent concerns regarding data sharing between WhatsApp and Facebook, lead to increased traffic for the search engine.

Telegram feature exposes your precise address to hackers

Telegram feature exposes your precise address to hackers

Advertisement A proof-of-concept video the researcher sent to Telegram showed how he could discern the address of a People Nearby user when he used a free GPS spoofing app to make his phone report just three different locations.

The company that processes payments for Amazon and Swiggy has reported a data leak of over 100 million debit and credit cardholders

The company that processes payments for Amazon and Swiggy has reported a data leak of over 100 million debit and credit cardholders

In what could be a major data breach, information of over 100 million debit and credit card users from payments processor Juspay has leaked on the dark web.

Where next for ethical data and data privacy? (Includes interview)

Where next for ethical data and data privacy? (Includes interview)

Kingston begins his analysis by focusing on the importance of data privacy and its continuing trajectory, noting: “Driven by the number of data breaches and the continued systematic misuse of personal data from large corporations, consumer data privacy and its control will be a major focus in 2021.

Exfiltrating Remaining Private Information from Donated Devices

Exfiltrating Remaining Private Information from Donated Devices

Here is a breakdown of all the devices I purchased: Device Type Number of Devices Bought Desktop or laptop computer 41 Removable media (such as flash drives and memory cards) 27 Hard disk 11 Cell phone 6 After buying the devices, I took them to my command center (a cool name for my basement) and began the data extraction process.

As a result of Covid-19, virtual classrooms have become the norm for many: what are the privacy implications?

As a result of Covid-19, virtual classrooms have become the norm for many: what are the privacy implications?

Instead, universities should recognize that significant user issues tend to surface only after educators and students have used the platforms and create processes to collect those issues and have the software developers rapidly fix the problems.

BMW Will Publicly Shame Out-of-Warranty Drivers with Smart Billboards and License Plate Readers

BMW Will Publicly Shame Out-of-Warranty Drivers with Smart Billboards and License Plate Readers

New smart billboards in the United Kingdom will read BMW owners' license plates and broadcast to the world if they think your BMW's warranty has expired, reports Motoring Research .When a stopped BMW that's older than 35 months is detected, the billboard will call out that car with a "personalized" message that just happens to be broadcast to everyone within sight of the billboard.

DHS warns of data theft risk when using Chinese products

DHS warns of data theft risk when using Chinese products

The US Department of Homeland Security (DHS) warned American businesses of the data theft risks behind using equipment and data services provided by companies linked with the People’s Republic of China (PRC).

Menstruation apps store excessive information, privacy charity says

Menstruation apps store excessive information, privacy charity says

Eva Blum-Dumontet, a senior researcher at Privacy International, who used five apps and then asked what information was held about her using a data subject access request, said reading the findings was “chilling” and “it makes us realise just how much data those apps actually collect, store and sometimes share with others.”.

Google told its scientists to 'strike a positive tone' in AI research - documents

Google told its scientists to 'strike a positive tone' in AI research - documents

A senior Google manager reviewing a study on content recommendation technology shortly before publication this summer told authors to “take great care to strike a positive tone,” according to internal correspondence read to Reuters.

Alibaba facial recognition tech specifically picks out Uighur minority: Report

Alibaba facial recognition tech specifically picks out Uighur minority: Report

Advertisement Advertisement An archived record of the technology shows it can perform such tasks as "glasses inspection", "smile detection", whether the subject is "ethnic" and, specifically, "Is it Uighur".Consequently, if a Uighur livestreams a video on a website signed up to Cloud Shield, the software can detect that the user is Uighur and flag the video for review or removal, IPVM researcher Charles Rollet told Reuters.

Revealed: China suspected of spying on Americans via Caribbean phone networks

Revealed: China suspected of spying on Americans via Caribbean phone networks

The alleged attacks appear to be enabling China to target, track, and intercept phone communications of US phone subscribers, according to research and analysis by Gary Miller, a Washington state-based former mobile network security executive.

U.S. and States Say Facebook Illegally Crushed Competition

U.S. and States Say Facebook Illegally Crushed Competition

WASHINGTON — The Federal Trade Commission and more than 40 states accused Facebook on Wednesday of buying up its rivals to illegally squash competition, and they called for the deals to be unwound, escalating regulators’ battle against the biggest tech companies in a way that could remake the social media industry.

Former Salesforce science boss founds You.com to take on Google Search

Former Salesforce science boss founds You.com to take on Google Search

Here’s a conspiracy theory for you: According to the aforementioned TechCrunch article, Socher says he can compete with Search on account of his clever AI, nuanced approach that Google can’t just imitate and obliterate (the Innovator’s Dilemma), and the fact that Google’s embroiled in anti-trust suits.

IPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever

IPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever

Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device—over Wi-Fi, with no user interaction required at all.

The ones who brought you Let's Encrypt, bring you: Tools for gathering anonymized app usage metrics from netizens

The ones who brought you Let's Encrypt, bring you: Tools for gathering anonymized app usage metrics from netizens

The Internet Security Research Group (ISRG) has a plan to allow companies to collect information about how people are using their products while protecting the privacy of those generating the data.