The Safest Ways to Buy a VPN Anonymously

The Safest Ways to Buy a VPN Anonymously

While Bitcoin is still the most popular anonymous payment method, some VPN providers are now accepting other altcoins, like Ripple, as well. Not all providers accept this type of payment, so be sure you double check before you purchase your card.

Australia passes controversial encryption law, raising serious privacy and legal concerns

Australia passes controversial encryption law, raising serious privacy and legal concerns

Technical capability notice: A notice issued by the attorney general, requiring tech companies to “build a new capability” to decrypt communications for law enforcement.

How to Delete Your Google Photos

How to Delete Your Google Photos

If the Backup and Sync settings on your Android phone are turned on, your photos will automatically be uploaded to Google Photos. If you don’t have backup and sync on your phone, your photos will not be automatically uploaded to the cloud.

The Man Making Art From Government Surveillance

The Man Making Art From Government Surveillance

He wrote about booking hotel rooms in Las Vegas to photograph airplanes bringing people to and from work at secret military bases; about learning how to track secret satellites in the sky from online amateur communities; about climbing mountains and ridges with telescopes to see what military installations look like.

Leave Gmail in 10 steps

Leave Gmail in 10 steps

Important edit: As many commenters pointed out, this analogy is actually not correct anymore, as Google stopped reading your emails for ad-personalization in 2017, sorry I missed that news. All the mails received during the migration, and the future incoming ones to Gmail will now be synchronized to your new account.

An Eye-Scanning Lie Detector Is Forging a Dystopian Future

An Eye-Scanning Lie Detector Is Forging a Dystopian Future

In January 2017, Alan McCarty, a sergeant at the Columbus, Georgia, Police Department, wrote to Converus’ vice president of marketing and operations, Russ Warner, about an applicant who had admitted to using marijuana within the previous two years but still passed the EyeDetect test, which normally asks about illicit drug use.

2018: The Year Privacy Took Center Stage

2018: The Year Privacy Took Center Stage

There is no doubt that new privacy laws in Europe dominated tech and security magazine headlines – especially in the first half of the year. Many people around the world predicted that privacy would be the top story along with more hacking and data breaches.

What are Static, Dynamic, Dedicated, and Shared IP Addresses

What are Static, Dynamic, Dedicated, and Shared IP Addresses

You might have heard of terms like static, dynamic, dedicated and shared IP addresses. With static and dynamic IPs explained, let’s see what shared and dedicated addresses are. If you’re an individual user who uses the internet and VPN for home use, a dynamic and shared IP will work for you.

How Plus Addressing Can Prevent Spam

How Plus Addressing Can Prevent Spam

For example, if my email address is kevquirk@fakemail.com and I’m signing up for a new Spotify account, I could enter kevquirk+spotify@fakemail.com and mail sent to that address will be delivered to my inbox.

Walmart patents biometric shopping cart to track your vitals

Walmart patents biometric shopping cart to track your vitals

It’s one thing if you want to track the speed of a cart or its route through a store for marketing purposes but a desire to collect a user’s vital signs under the guise that you’re doing so to help sick or elderly shoppers or otherwise improve customer service is outright disturbing.

Infographic: How to Become Invisible on the Internet

Infographic: How to Become Invisible on the Internet

More people want to opt out of this data collection, but aside from disconnecting entirely or taking ludicrous measures to safeguard information, there aren’t many great options available to limit what is seen and known about you online. The simple actions that can be taken fall into three major realms: internet browsers, social networks, and mobile phones.

Congress should dig in on Google's China and data issues, not just bias

Congress should dig in on Google's China and data issues, not just bias

The question is will they use their time to actually query one of the most powerful companies on the planet about some of the big issues -- like data privacy, China and censorship -- facing Google.

NHS told to ditch 'absurd' fax machines

NHS told to ditch 'absurd' fax machines

The Department of Health said a change to more modern communication methods was needed to improve patient safety and cyber security. In place of fax machines, the Department of Health said secure email should be used.

O que você prefere: privacidade ou comodidade?

O que você prefere: privacidade ou comodidade?

Tanto que começamos a ver, em termos práticos, o surgimento de uma segunda fase, uma tentativa de Apple e Google de dar mais destaque a iOS e Android como fim em vez de servirem apenas de palco para apps de terceiros.

In the New Fight for Online Privacy and Security, Australia Falls: What Happens Next?

In the New Fight for Online Privacy and Security, Australia Falls: What Happens Next?

Both countries now claim the right to secretly compel tech companies and individual technologists, including network administrators, sysadmins, and open source developers – to re-engineer software and hardware under their control, so that it can be used to spy on their users.

Transparency, Openness, and Our 2016 and 2017 Financials

Transparency, Openness, and Our 2016 and 2017 Financials

And the layer above that is publishing design documents and research papers to explain why we chose to build it that way, including analyzing the security implications and the trade-offs of alternate designs.

Ads Following You Around? Here’s How You Can Stop Them

Ads Following You Around? Here’s How You Can Stop Them

When you use incognito or privacy mode on your browser, it automatically deletes the cookies that are stored in a temporary folder. If you don’t want any advertisers to track you, use a secure browser.

GCHQ boosts powers to launch mass data hacking

GCHQ boosts powers to launch mass data hacking

“The bulk equipment interference power permits the UK intelligence services to hack at scale by allowing a single warrant to cover entire classes of property, persons or conduct,” explained Scarlet Kim, legal officer at Privacy International, which has taken the government to court over GCHQ’s hacking activities abroad.

Email Security: What Is It, And How Do You Improve It?

Email Security: What Is It, And How Do You Improve It?

Using only a password to access your email account is not considered MFA, it is defined as single factor authentication (SFA) but using your password and a one-time code sent to your device is considered MFA.

Electric vehicles are sending real-time location and diagnostic data to Chinese government monitoring centers

Electric vehicles are sending real-time location and diagnostic data to Chinese government monitoring centers

Global carmakers are feeding real-time location information and dozens of other data points from electric vehicles to Chinese government monitoring centres, potentially adding to China’s rich kit of surveillance tools as President Xi Jinping steps up the use of technology to track Chinese citizens.

How to Review Permissions Given to Your Mobile Apps

How to Review Permissions Given to Your Mobile Apps

Whenever you download an app, it requests certain permissions from you, like being able to access your contact list or your camera. For example, a person who never uses voice to text features may want to revoke permissions granted to Facebook Messenger for access to the microphone.

Big tech has your kid’s data — and you probably gave it to them

Big tech has your kid’s data — and you probably gave it to them

The report calls on parents and schools to examine the type of gadgets children play with, like smart speakers, wifi-powered toys, and gaming apps, all of which are collecting data on kids.

Senator blasts FTC for failing to crack down on Google's ad fraud problems

Senator blasts FTC for failing to crack down on Google's ad fraud problems

"The FTC's failure to act has had the effect of allowing Google to structure its own market," said Sen. Warner in a letter sent to the FTC yesterday.

UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have 'evolved'...

UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have 'evolved'...

During the passage of the Investigatory Powers legislation, he said, the government anticipated bulk EI warrants would be "the exception", and "be limited to overseas 'discovery' based EI operations".

German Neo-Nazis Fell for Art Project and Outed Themselves

German Neo-Nazis Fell for Art Project and Outed Themselves

A leftist art collective in Germany said they were launching a project to identify neo-Nazi rioters. Eventually ZPS identified approximately 1,500 of the estimated 7,000 far-right marchers, Ruch said. The site received a traffic boost after a far-right website linked to it, Ruch said.

UK Supreme Court considers whether spy court should be immune to legal probes

UK Supreme Court considers whether spy court should be immune to legal probes

The campaign group wants to launch a judicial review at the Investigatory Powers Tribunal (IPT) over a 2016 decision in a case probing the legalities of the UK spy agencies' computer hacking.

Industrial espionage fears arise over Chrome extension caught stealing browsing history

Industrial espionage fears arise over Chrome extension caught stealing browsing history

Valid arguments about a possible industrial espionage campaign are being raised surrounding a Google Chrome extension that was caught collecting browsing history, ZDNet has learned from ExtraHop, a real-time IT analytics firm.

Data privacy issues may be capturing more attention in China

Data privacy issues may be capturing more attention in China

"In China, the medical industry, also the technology industry, the technology companies that are working with AI and also with a lot of data, we all have a common agreement that the symptom data can be collected in a big chunk for big data analysis and also AI training," said Jim Wang, chairman and founder of Nova Vision.

Facebook app permissions skirted rules to gather call logs

Facebook app permissions skirted rules to gather call logs

The troubles for Facebook continued this week with a trove of internal emails as part of an investigation in the U.K. Parliament revealing questionable data practices, including Facebook's Android app permissions being designed to gather data without users knowing.

Tech's invasion of our privacy made us more paranoid in 2018

Tech's invasion of our privacy made us more paranoid in 2018

"We think it's a good thing that people are more interested in using privacy controls and managing their information online," a Facebook spokesperson said in a statement. Its traffic had steadily been growing since, but it boomed in 2018 as Facebook's privacy issues blew up, said Gabriel Weinberg, CEO and founder of DuckDuckGo.

More