Apple sued for not disclosing that 'iCloud storage' relies on third-party cloud services

Apple sued for not disclosing that 'iCloud storage' relies on third-party cloud services

The contract doesn't mention that, in fact, Apple sometimes stores iCloud data on third-party storage services provided by the likes of Amazon Web Services or Google Cloud Platform -- as stated in the iOS security guide.

Google Chrome Incognito Mode Can Still Be Detected by These Methods

Google Chrome Incognito Mode Can Still Be Detected by These Methods

When Google made it so that Incognito mode uses a temporary filesystem using the computer's RAM, it opened up a new method of detecting it based on the amount of storage set aside for the internal filesystem used by the browser.

Hundreds of exposed Amazon cloud backups found leaking sensitive data

Hundreds of exposed Amazon cloud backups found leaking sensitive data

He said that all too often cloud admins don’t choose the correct configuration settings, leaving EBS snapshots inadvertently public and unencrypted. Morris found dozens of snapshots exposed publicly in one region alone, he said, including application keys, critical user or administrative credentials, source code and more.

Bypassing anti-incognito detection in Google Chrome

Bypassing anti-incognito detection in Google Chrome

Using this information, I came up with a simple rule for detecting incognito mode i.e if the temporary storage quota <= 120MB then its safe to say that it’s an incognito window.

Pale Moon forum

Pale Moon forum

A malicious party gained access to the at the time Windows-based archive server () which we've been renting from Frantech/BuyVM, and ran a script to selectively infect all archived Pale Moon .exe files stored on it (installers and portable self-extracting archives) with a variant of Win32/ClipBanker.

Tails - Tails 3.14.1 is out

Tails - Tails 3.14.1 is out

Fixed arbitrary code execution in Tor Browser Upgrades and changes Known issues Tails fails to start a second time on some computers (#16389) Get Tails 3.14.1 To upgrade your Tails USB stick and keep your persistent storage To install Tails on a new USB stick To download only What's coming up?

The Dawn of Robot Surveillance

The Dawn of Robot Surveillance

Still, for all those advances, the social implications of being recorded have not changed: when we walk into a store, we generally expect that the presence of cameras won’t affect us.

P410n3 - blog: Trust is good, cryptography is better

P410n3 - blog: Trust is good, cryptography is better

This is what many people refer to as a "Threat Model".What I am saying is: When choosing a cloud storage provider, we should think about our personal privacy and security, as these two things go hand in hand these days.

“We want your money, not your data” or how we wrote this [kick-ass] slogan

“We want your money, not your data” or how we wrote this [kick-ass] slogan

A slogan should quickly get your message across, so we first had to understand what’s the one thing we want people to know about Unio. That’s why we wouldn’t be able to sell to advertisers (as some tech companies do) or reveal it to authorities, even if we wanted to.

Intelligent Tracking Prevention 2.2

Intelligent Tracking Prevention 2.2

Here’s an example of when ITP 2.2 will cap cookie persistence to one day: The website social.example has been classified by ITP as having cross-site tracking capabilities.

Third-party Facebook apps expose 540 million users’ details

Third-party Facebook apps expose 540 million users’ details

The cyber risk team at security firm UpGuard found one data store originating from the Mexico-based media company Cultura Colectiva of 146GB, containing more than 540 million records, detailing comments, likes, reactions, account names, Facebook IDs and more.

Losing Face: Two More Cases of Third-Party Facebook App Data Exposure

Losing Face: Two More Cases of Third-Party Facebook App Data Exposure

A separate backup from a Facebook-integrated app titled “At the Pool” was also found exposed to the public internet via an Amazon S3 bucket. The At the Pool discovery is not as large as the Cultura Colectiva dataset, but it contains plaintext (i.e. unprotected) Facebook passwords for 22,000 users.

Why uBlock Origin requests to store unlimited data in Firefox

Why uBlock Origin requests to store unlimited data in Firefox

Why uBlock Origin requests to store unlimited data in Firefox. Firefox users who have the content blocker uBlock Origin installed receive a permission prompt currently when uBlock Origin is updating. Firefox users who have the content blocker uBlock Origin installed receive a permission prompt currently when uBlock Origin is updating.

Least Authority and Private Internet Access announce PrivateStorage.io: a secure and privacy-focused cloud storage solution.

Least Authority and Private Internet Access announce PrivateStorage.io: a secure and privacy-focused cloud storage solution.

As firm believers in protection of our customers’ privacy, we joined efforts to offer a private, secure and end-to-end encrypted solution to allow the end user — not third-parties — to determine whether and to what extent the personal data on the storage service is collected, shared, and processed.

Google intends to appeal €50 million European GDPR fine

Google intends to appeal €50 million European GDPR fine

The watchdog came to the conclusion that Google was breaking GDPR rules in transparency and lacked a legal basis for processing user data in relation to advertising.

Personal Security & Privacy Tools I Recommend

Personal Security & Privacy Tools I Recommend

It uses client side encryption, default email encryption between proton mail users, and claims all their code is open source and they do no logging. Backups I use a custom script that uses duplicity on Linux to locally encrypt files and then back up to BackBlaze B2 storage.

Security/Anti tracking policy

Security/Anti tracking policy

Examples include, but are not limited to: While this type of tracking is not currently blocked in Firefox, we may apply additional restrictions to the third parties engaged in this type of tracking in the future.

Out of Commission: How the Oklahoma Department of Securities Leaked Millions of Files

Out of Commission: How the Oklahoma Department of Securities Leaked Millions of Files

The UpGuard Data Breach Research team can now disclose that it has discovered, reported, and secured a storage server with exposed data belonging to the Oklahoma Department of Securities, preventing any future malicious exploitation of this data.

Bitcoin Banks Are Coming. Wave Goodbye to Your Privacy

Bitcoin Banks Are Coming. Wave Goodbye to Your Privacy

Bitcoin banking: trends so far Here are just a few of the reasons for this prediction: Fidelity (one of the biggest asset management companies on the planet) is launching a crypto custody service .

Guardzilla Home Cameras Open to Anyone Wanting to Watch Their Footage

Guardzilla Home Cameras Open to Anyone Wanting to Watch Their Footage

The GZ501W model camera contains a shared, hard-coded Amazon S3 credential used for storing saved video data in the Amazon cloud – so all users of the Guardzilla All-In-One Video Security System have the same password, and thus can access each other’s saved home video.

Security flaws let anyone snoop on Guardzilla smart camera video recordings

Security flaws let anyone snoop on Guardzilla smart camera video recordings

Guardzilla were given three months to fix the security lapse and roll out new firmware to affected devices after the researchers privately reached out, but the company neither acknowledged nor patched the issue, prompting the researchers to go public with their findings.

How to Manage and Protect Your Cloud Data

How to Manage and Protect Your Cloud Data

Instead of storing files locally on a hard drive, external drive, or flash drive, cloud storage allows you to save and access files on the internet. When it comes to choosing a CSP, make sure to take several factors into consideration if you want to successfully manage and protect your cloud data.

Consumer groups, NGOs and industry call jointly for the Council of the EU to advance ePrivacy reform

Consumer groups, NGOs and industry call jointly for the Council of the EU to advance ePrivacy reform

The letter was sent prior to yesterday's (4 December) meeting in the TTE Council, with signatories sharing concerns over the slow progress of the negotiations in the Council of the EU despite the repeated scandals that demonstrate the clear and urgent need to strengthen privacy and security of electronic communications in the online environment.

This Week in Data Breaches: Amazon, Uber, USPS, and More

This Week in Data Breaches: Amazon, Uber, USPS, and More

Bloom: Take Back Control of Your Data At Bloom, we are giving you the tools to take back control of your data. Bloom enables you to own, authorize the use of, and protect your data using the latest advancements in blockchain technology. More on Privacy and Data Security from Bloom

How to Securely Wipe Your Devices So You Can Recycle or Resell Them

How to Securely Wipe Your Devices So You Can Recycle or Resell Them

Third-party tools for executing the ATA Secure Erase command on both HDDs and SSDs include Parted Magic, a previously free bootable CD for partition management that now costs $11 to download, and HDDerase, a bootable DOS-based utility originally developed at the University of California San Diego’s Center for Memory and Recording Research, but which hasn’t been updated since 2008 and might not work with some drives or some configurations.

Privacy Heroes

Privacy Heroes

From search engines, browsers, and email providers to cloud storage, chat apps, and social media, you’re being exploited and exposed online. To make the Internet a safe place to conduct business, browse the web, and store sensitive data.

Ledger Nano S Limited Edition Review – CryptoLauren

Ledger Nano S Limited Edition Review – CryptoLauren

This company has created software devices specially designed for the safe storage of popular cryptocurrencies. Ledger provides the most robust devices for the secure storage of your cryptocurrency. They have developed a remarkably secure structure, placing themselves at the top of the digital wallet options.

Smile! Border Security Bots Are Reading Your Face - October 15, 2018

Smile! Border Security Bots Are Reading Your Face - October 15, 2018

Machine learning tools predicting human behavior have been found to be racially biased, and privacy advocates worry about government collection and storage of traveler data. But polls show Americans are just as worried about terrorism as they were after 9/11, so privacy and fairness may not survive the screening process.

Firefox 65: New Cookie Jar Policy to block tracking

Firefox 65: New Cookie Jar Policy to block tracking

Firefox users may have a couple of questions when it comes to the new "Cookie Jar Policy" and how it differs from using the built-in Tracking Protection feature or third-party extensions to block certain types of connections or content in the browser by default.

Data Custody Is A Massive Issue

Data Custody Is A Massive Issue

It refers to the process of having the legal right and authentic control over particular set(s) of data elements which are then authorized for storage and use by any particular custodian(s) of that data.

More