Infographic: How to Become Invisible on the Internet

Infographic: How to Become Invisible on the Internet

More people want to opt out of this data collection, but aside from disconnecting entirely or taking ludicrous measures to safeguard information, there aren’t many great options available to limit what is seen and known about you online. The simple actions that can be taken fall into three major realms: internet browsers, social networks, and mobile phones.

Electric vehicles are sending real-time location and diagnostic data to Chinese government monitoring centers

Electric vehicles are sending real-time location and diagnostic data to Chinese government monitoring centers

Global carmakers are feeding real-time location information and dozens of other data points from electric vehicles to Chinese government monitoring centres, potentially adding to China’s rich kit of surveillance tools as President Xi Jinping steps up the use of technology to track Chinese citizens.

Big tech has your kid’s data — and you probably gave it to them

Big tech has your kid’s data — and you probably gave it to them

The report calls on parents and schools to examine the type of gadgets children play with, like smart speakers, wifi-powered toys, and gaming apps, all of which are collecting data on kids.

Data privacy issues may be capturing more attention in China

Data privacy issues may be capturing more attention in China

"In China, the medical industry, also the technology industry, the technology companies that are working with AI and also with a lot of data, we all have a common agreement that the symptom data can be collected in a big chunk for big data analysis and also AI training," said Jim Wang, chairman and founder of Nova Vision.

Tech's invasion of our privacy made us more paranoid in 2018

Tech's invasion of our privacy made us more paranoid in 2018

"We think it's a good thing that people are more interested in using privacy controls and managing their information online," a Facebook spokesperson said in a statement. Its traffic had steadily been growing since, but it boomed in 2018 as Facebook's privacy issues blew up, said Gabriel Weinberg, CEO and founder of DuckDuckGo.

‘Black box’ devices could be fitted to all new cars

‘Black box’ devices could be fitted to all new cars

The European Council is proposing that every new car has the data-logging device, which would record the vehicle’s speed, state of safety assistance features and “crash-related parameters and information before, during and after a collision”.

How To Be Invisible On The Internet

How To Be Invisible On The Internet

The simple actions that can be taken fall into three major realms: internet browsers, social networks, and mobile phones.

Your Digital Footprint Looks A Lot Like You

Your Digital Footprint Looks A Lot Like You

We collect information to provide better services to all our users — from figuring out basic stuff like which language you speak, to more complex things like which ads you’ll find most useful

TSA’s Roadmap for Airport Surveillance Moves in a Dangerous Direction

TSA’s Roadmap for Airport Surveillance Moves in a Dangerous Direction

The ink wasn’t even dry on that bill when the Transportation Security Administration (TSA) published their Biometrics Roadmap for Aviation Security and the Passenger Experience, detailing TSA’s plans to work with Customs and Border Protection (CBP) to roll out increased biometric collection and screening for all passengers, including Americans traveling domestically.

Looking Down Under for a Back Door

Looking Down Under for a Back Door

The Australian government is working to enact legislation to make it easier for law enforcement and intelligence agencies to access electronic communications information, including data protected by encryption, by forcing companies to weaken the security of their products.

Senator slams Google's censored search engine work in China

Senator slams Google's censored search engine work in China

Google's creation of a censored search engine for China, known as "Project Dragonfly," is proof China has made "successful efforts to recruit Western companies to their information control efforts," said Senator Mark Warner (D-VA) in Washington D.C. Friday.

New Documents Show That Facebook Has Never Deserved Your Trust

New Documents Show That Facebook Has Never Deserved Your Trust

Company executives proposed several different schemes, from charging certain developers for access per user to requiring that apps “[Facebook] doesn’t want to share data with” spend a certain amount of money per year on Facebook’s ad platform or lose access to their data.

Zash (ZEC) - All You Need to Know

Zash (ZEC) - All You Need to Know

This construction allows two users to transact on the blockchain by obfuscating the information of both the sender and receiver along with the amount. Below is the list of exchanges that allow buying/exchanging of Zcash using various fiat or crypto coins.

Subject Access Requests – tapmydata – Medium

Subject Access Requests – tapmydata – Medium

Tap provides a secure two way street between both organisations and individuals when it comes to access requests.

Opinion | The End of Privacy Began in the 1960s

Opinion | The End of Privacy Began in the 1960s

American companies remained free to gather data on the people who used their products. Congress is again wrestling with the balance between freedom of information and the right to privacy.

Yes, You Should Delete Facebook – Member Feature Stories – Medium

Yes, You Should Delete Facebook – Member Feature Stories – Medium

Netflix doesn’t make more money the more time you spend on it (they make less, actually), so they have no incentive to addict you to the platform (beyond keeping you from switching to a competitor).

New Report: Unknown Data Scraper Breach

New Report: Unknown Data Scraper Breach

It did not contain any sensitive personal data such as credit card details or passwords but they did contain a lot of private information like an individual’s professional background, name, phone number, email address, address, and even their IP.

How Does a Firewall Work?

How Does a Firewall Work?

A firewall is software or hardware that uses predetermined rules to monitor incoming and outgoing network traffic. Traditional firewalls, known as packet filters, examine data for information such as its source and destination IP address.

A complete guide to Internet privacy

A complete guide to Internet privacy

When you use online services, like email or web browsing, your data travels across the network and gets stored on servers that belong to those companies. Almost all online services and Internet-connected devices have privacy settings you can update to restrict the amount of information collected and/or posted publicly online.

Shocking extent of how big firms harvest your data

Shocking extent of how big firms harvest your data

We want it to be easy for people to understand and control their data and make the privacy choices that are right for them.' A Morrisons spokesman said: 'We do record what customers buy from us and their marketing preferences so that we can provide them with offers and coupons that are useful to them.' Facebook declined to formally comment, but denied using sensitive data to target adverts at users.

Uncle Sam Wants to Snoop on Your Monero Transactions

Uncle Sam Wants to Snoop on Your Monero Transactions

According to the document, blockchain monitoring frameworks geared toward Zcash and Monero are of special interest to the DHS because its existing Bitcoin-focused analytics capabilities “cover only a limited scope within the realm of cryptocurrencies.” The expansion into the privacy cryptocurrency area is intended to keep pace with newer blockchain implementations and demonstrate that the DHS possesses sufficient extensibility to deal with the threat posed by illegal hidden transactions.

Facebook Wielded Data to Reward, Punish Rivals, Emails Show

Facebook Wielded Data to Reward, Punish Rivals, Emails Show

Facebook Inc. wielded user data like a bargaining chip, providing access when that sharing might encourage people to spend more time on the social network — and imposing strict limits on partners in cases where it saw a potential competitive threat, emails show.

Why Using HTTPS is so Important for Your Website

Why Using HTTPS is so Important for Your Website

Domain Validation (DV), Organization Validation (OV) and Extended validation (EV) are types of Secure Socket Layer (SSL) Certificates that must be obtained to enable HTTPS on your website. HTTPS will prevent ISPs from gathering information and injecting advertisements into your website.

Could Your Ad Tracking Put You Out of Business?

Could Your Ad Tracking Put You Out of Business?

A business that uses tracking is tracked and just as much data is grabbed about the company trying to drum up more business than gets snagged in the drag net of online consumer information.

GDPR and Your Remote Team

GDPR and Your Remote Team

One aspect of the GDPR that information security teams are going to have to think carefully about in respect of a distributed workforce, considering the way our personal and professional lives are now so blended, is that your team have enhanced privacy rights now as individuals.

Verizon/AOL helped advertisers track kids online, must now pay $5M fine

Verizon/AOL helped advertisers track kids online, must now pay $5M fine

Verizon-owned AOL helped advertisers track children online in order to serve targeted ads, in violation of a federal children's privacy law, and has agreed to pay a fine of $4.95 million, New York Attorney General Barbara Underwood announced today.

Homeland Security Will Let Computers Predict Who Might Be a Terrorist on Your Plane — Just Don’t Ask How It Works

Homeland Security Will Let Computers Predict Who Might Be a Terrorist on Your Plane — Just Don’t Ask How It Works

According to the technical overview, DHS’s predictive software contract would “complement the GTAS rule engine and watch list matching features with predictive models to enhance identification of high risk passengers.” In other words, the government has decided that it’s time for the world to move beyond simply putting names on a list of bad people and then checking passengers against that list.

How to Delete Facebook Account Permanently and Temporarily

How to Delete Facebook Account Permanently and Temporarily

Before you leave Facebook temporarily (deactivation) or permanently (deletion), you should know these things. If you’re mad at a friend and want to go off Facebook, account deactivation is a better option. Before you delete your account, it’s best to have a copy of your data.

How to Be Forgotten If You Are in the EU

How to Be Forgotten If You Are in the EU

As a result, the European Court ruled that people’s data is controlled by search engines and they must consider requests related to outdated or irrelevant information that appears in search results. If you’re requesting information removal on behalf of someone else, you’ll need to upload their identification data.

How To Protect Your Personal Information On Social Media

How To Protect Your Personal Information On Social Media

Social media is a great way to express opinions, read news, keep in touch with family and friends, and watch the world burn in real time on Twitter.

More