Unsecured Databases Leak 60 Million Records of Scraped LinkedIn Data

Unsecured Databases Leak 60 Million Records of Scraped LinkedIn Data

Between all eight databases, there was a combined total of approximately 60 million records that contained what appeared to be scraped public information of LinkedIn users.

Californians Want and Deserve Stronger Privacy Laws

Californians Want and Deserve Stronger Privacy Laws

Sen. Jackson’s bill provides tools for the Attorney General’s Office to enforce the CCPA and hold companies accountable for their actions, and grants every person the right to take companies to court for violating their privacy rights.

Canadian Cops Will Scan Social Media to Predict Who Could Go Missing

Canadian Cops Will Scan Social Media to Predict Who Could Go Missing

Israel said that the risk of false positives increases when predictive models use data of “questionable fidelity” such as social media posts.

SecurityWatch: Make Corporations, Not Customers, Suffer for Data Breaches

SecurityWatch: Make Corporations, Not Customers, Suffer for Data Breaches

On March 29, Earl Enterprises announced that visitors to its chain restaurants may have had their credit card information stolen. If you ate out at specific Buca di Beppo, Chicken Guy!, Earl of Sandwich, Mixology, Planet Hollywood, or Tequila Taqueria, you may have had your credit or debit card information stolen.

Startpage privacy search engine eclipses Google

Startpage privacy search engine eclipses Google

Stiftung Warentest, which is Germany’s equivalent to U.S. Consumer Reports, has awarded top honors in an unbiased search engine comparison based on quality of search results, cross-platform usability and privacy. Stiftung Warentest tested the search engines and discovered that Google provided the best search results.

Utah Bans Police From Searching Digital Data Without A Warrant, Closes Fourth Amendment Loophole

Utah Bans Police From Searching Digital Data Without A Warrant, Closes Fourth Amendment Loophole

Under the Electronic Information or Data Privacy Act (HB 57), state law enforcement can only access someone’s transmitted or stored digital data (including writing, images, and audio) if a court issues a search warrant based on probable cause.

Google’s Infinite Reach – How Google Builds a Profile on Everyone

Google’s Infinite Reach – How Google Builds a Profile on Everyone

This article breaks down some of the services that Google uses to build profiles about users, and discusses how these servers threaten the privacy of users without their consent .

New York City’s algorithm task force is fracturing

New York City’s algorithm task force is fracturing

The city says specific examples are forthcoming As the first plan of its kind in the United States, the New York law established a model, and other local governments have launched similar programs in the time since.

Ad Industry Slams Texas Privacy Proposal

Ad Industry Slams Texas Privacy Proposal

by Wendy Davis @wendyndavis, Yesterday The ad industry is weighing in against a new privacy proposal in Texas that would require companies to obtain consumers' opt-in consent before drawing on data about them, including information used for ad targeting.

Lyft tightens employee access to rider data, but it may not be enough

Lyft tightens employee access to rider data, but it may not be enough

That said, Lyft did set up an anonymous tip line for complaints about employees misusing data after its investigation in 2018.The ride-hailing service's new security measures are similar to Uber's, which also issues warnings on employees' dashboard tools and trains staff on the proper ways to access user data.

When you get online – get paranoid

When you get online – get paranoid

OPSEC is your online footprint – it reaches from the furthest corners of the internet to the devices that you use and takes into account the things that you do every day.

Hey, remember that California privacy law? Big Tech is trying to ram a massive hole in it

Hey, remember that California privacy law? Big Tech is trying to ram a massive hole in it

The change to the California Consumer Protection Act (CCPA) – in Senate Bill 753 – will be reviewed by the Senate Judiciary Committee next week and effectively adds Google and Facebook's entire business models to an exemption list, meaning consumers would not be able to sue tech giants for misusing their personal data.

How to Stop Google’s Sensorvault From Sharing Your Location With Law Enforcement

How to Stop Google’s Sensorvault From Sharing Your Location With Law Enforcement

Google gathers that location history data you’ve provided into a database named “Sensorvault,” and law enforcement can query it with a warrant: For years, police detectives have given Google warrants seeking location data tied to specific users’ accounts.

Senate Bill Bans ‘Dark Patterns’ Trickery in Social Media Data Collection

Senate Bill Bans ‘Dark Patterns’ Trickery in Social Media Data Collection

Some of the most nefarious strategies rely on ‘dark patterns’ — deceptive interfaces and default settings, drawing on tricks of behavioral psychology, designed to undermine user autonomy and push consumers into doing things they wouldn’t otherwise do, like hand over all of their personal data to be exploited for commercial purposes,” said U.S. Sen. Mark Warner (D-Va.), a former technology executive who is vice chairman of the Senate Select Committee on Intelligence.

23 Tech Companies Back CCPA Amendment to Make It Stronger: Privacy for All Act of 2019

23 Tech Companies Back CCPA Amendment to Make It Stronger: Privacy for All Act of 2019

The pro-privacy law sets a new standard of trust online in the U.S., requiring companies doing business in California with revenues over $25 million or who process information from over 50,000 residents a year to comply with a new set of personal information rights.

“Blockchain in Cybersecurity: The future?” (From our Forums.)

“Blockchain in Cybersecurity: The future?” (From our Forums.)

NASA has decided to use blockchain technology as a way of enhancing security and minimizing denial of service and other different traffic service attacks. Also, blockchain security means there is no centralized authority in control of the network to verify the data going through it which makes it hard for hackers to orchestrate an attack.

Fighting The Citadels That Own Our Data: How Web3 Empowers Us To Take Back Control

Fighting The Citadels That Own Our Data: How Web3 Empowers Us To Take Back Control

In the face of myriad privacy breaches as a result of the ownership of our data by big corporations, Web 3.0 – otherwise known as a decentralised internet based on true peer-to-peer interaction – represents a beacon of hope to enable individuals to take back control from the current generation of internet behemoths.

Wirecutter Weekly: How safe is your privacy in a smart home?

Wirecutter Weekly: How safe is your privacy in a smart home?

This great CNET piece reports that facial recognition in devices like the Nest Cam IQ, Honeywell Smart Home Security, and even the Sony Aibo robot dog don’t comply with Illinois’s Biometric Information Privacy Act, which “defines ‘biometric identifiers’ as retina scans, iris scans, fingerprints, hand scans, face scans and voiceprints.” As reported in the New York Times, cameras have been installed (but not yet activated, so they say) on planes.

Four Steps Facebook Should Take to Counter Police Sock Puppets

Four Steps Facebook Should Take to Counter Police Sock Puppets

Despite Facebook’s repeated warnings that law enforcement is required to use “authentic identities” on the social media platform, cops continue to create fake and impersonator accounts to secretly spy on users.

How to delete your voice recordings from Google Assistant

How to delete your voice recordings from Google Assistant

It has a recording of my voice — or my wife's — asking Google Assistant everything — such as playing music, turning off the bedroom lights, getting directions. I don't mind if it saves a few commands for the sake of creating a better product.

IT grids case: Aadhaar data of 7.8 crore with IT firm, FIR filed

IT grids case: Aadhaar data of 7.8 crore with IT firm, FIR filed

HYDERABAD: The Cyberabad police has filed an FIR on the complaint of UIDAI stating that information technology firm IT Grids (India) was in possession of Aadhaar data of over 7.8 crore residents of Telangana and Andhra Pradesh.

Tracking Phones, Google Is a Dragnet for the Police

Tracking Phones, Google Is a Dragnet for the Police

Often, Google employees said, the company responds to a single warrant with location information on dozens or hundreds of devices. After receiving a warrant, Google gathers location information from its database, Sensorvault, and sends it to investigators, with each device identified by an anonymous ID code.

Amazon staff listen to customers' Alexa recordings, report says

Amazon staff listen to customers' Alexa recordings, report says

Amazon employees around the world regularly listen to recordings from the company’s smart speakers as part of the development process for new services, Bloomberg News reports.

Whois Lookup | Website Hacking #1

Whois Lookup | Website Hacking #1

is a very famous website help to perform Whois lookup just by entering the IP address or domain name. To perform Whois lookup open your terminal in your Kali Linux and type the whois following with IP address or domain name like.

'A More Just and Equitable Future': Advocates Welcome Markey's Privacy Bill of Rights

'A More Just and Equitable Future': Advocates Welcome Markey's Privacy Bill of Rights

Dylan Gilbert, a policy fellow at the nonprofit Public Knowledge, said that "Senator Markey's Privacy Bill of Rights Act sets a strong, rights-based standard for consumer privacy protection under federal law that goes beyond mere notice and choice.".

A Researcher Needed Three Hours to Identify Me From My DNA

A Researcher Needed Three Hours to Identify Me From My DNA

I’d previously sent a DNA sample to the genetic testing company 23andMe Inc. and then uploaded my data anonymously to a genealogy website. Genetic genealogists then look for DNA relatives of anonymous suspects, scouring public records and social media until they arrive at a likely name.

Dr. A. Estwick: Safety of Your Personal Data Online Is a Life-And-Death Issue

Dr. A. Estwick: Safety of Your Personal Data Online Is a Life-And-Death Issue

‘Until we get serious, until we get to a point where there’s enough education [...], unfortunately, we’ll keep hearing about data breaches, but there won’t be too much action afterward’, - says Dr. Amelia Estwick, the Program Director at the National Cybersecurity Institute at Excelsior College (NCI).Dr. Estwick has an impressive 20-year long career, she entered the industry before the term ‘cybersecurity’ appeared in our lexicon.

Impact of 5G on Location technology

Impact of 5G on Location technology

In the modern world, it means that 5G is stepping up, bringing entirely new techniques that improve and speed the location technology. The fifth generation of mobile connectivity brings everyone the chance to see the exact routes and up-to-date location information.

Are You Afraid of Google? BlackBerry Cofounder Jim Balsillie Says You Should Be

Are You Afraid of Google? BlackBerry Cofounder Jim Balsillie Says You Should Be

It’s likely to be a multiyear process, but Balsillie expects it will yield sweeping legislation similar to the EU’s recently enacted General Data Protection Regulation, which gives Europeans unprecedented control over how their personal information is collected and used, including the power to force companies to delete it.

The Full Guide to Securing Your Data Over Wi-Fi

The Full Guide to Securing Your Data Over Wi-Fi

The hacker then connects to a real access point using a different wireless card, effectively funneling all of the information through their system before moving it along to the second network.

More