How To Blow Your Online Cover With URL Previews

How To Blow Your Online Cover With URL Previews

The difference with URL previews in messaging applications is that you are broadcasting to the website owner that you are discussing the website, as opposed to just browsing to it.

Research: Some Android apps share your data with Facebook without consent

Research: Some Android apps share your data with Facebook without consent

A worrying number of popular Android apps share user data with Facebook without user consent, new research from Privacy International shows (via Financial Times). In a response to Privacy International, Facebook acknowledged that developers didn't have the option to disable transmission of the "SDK initialized" data before June.

Alexa's advice to 'kill your foster parents' fuels concern over Amazon Echo

Alexa's advice to 'kill your foster parents' fuels concern over Amazon Echo

The odd command is one of many hiccups that have happened as Amazon tries to train its machine to act something like a human, engaging in casual conversations in response to its owner’s questions or comments.

Facebook Used Data Access as Competitive Weapon, Documents Reveal – Variety

Facebook Used Data Access as Competitive Weapon, Documents Reveal – Variety

Zuckerberg, in a response he posted on Facebook after the documents were released, said the change to limit data access to third-party developers was to counter “shady apps that abused people’s data.” “This was an important change to protect our community, and it achieved its goal,” he wrote.

A New Google+ Blunder Exposed Data From 52.5 Million Users

A New Google+ Blunder Exposed Data From 52.5 Million Users

On Monday, Google announced that an additional bug in a Google+ API, part of a November 7 software update, exposed user data from 52.5 million accounts. Some of the exposed data overlaps with information that was at risk through the other Google+ bug that impacted 500,000 users.

Marriott’s breach response is so bad, security experts are filling in the gaps — at their own expense

Marriott’s breach response is so bad, security experts are filling in the gaps — at their own expense

In fact, there’s no easy way to check that the domain is real, except a buried note on Marriott’s data breach notification site that confirms the domain as legitimate. “Hopefully this is one less site used to confuse victims.” Had Marriott just sent the email from its own domain, it wouldn’t be an issue.

Tumblr will start blocking adult content on December 17th

Tumblr will start blocking adult content on December 17th

"As Tumblr continues to grow and evolve, and our understanding of our impact on our world becomes clearer, we have a responsibility to consider that impact across different age groups, demographics, cultures and mindsets," the company said in a statement about its decision to ban adult content.

Tim Cook defends multibillion-dollar Google search deal despite Apple’s privacy focus

Tim Cook defends multibillion-dollar Google search deal despite Apple’s privacy focus

The comments, which were broadcast as part of an interview on Axios on HBO, came in response to Cook being asked why he was comfortable taking billions of dollars from Google to make it Apple’s default search engine, despite wanting to protect user privacy.

Mark Zuckerberg reportedly ordered all Facebook executives to use Android phones

Mark Zuckerberg reportedly ordered all Facebook executives to use Android phones

“We’ve long encouraged our employees and executives to use Android because it is the most popular operating system in the world,” said Facebook in response to the New York Times article.

Data breach: Microsoft shared Indian bank customers’ financial details with US intelligence agencies

Data breach: Microsoft shared Indian bank customers’ financial details with US intelligence agencies

In response to the RBI risk assessment observation, seen by DNA Money, a bank acknowledged that they have agreed with Microsoft, and according to the deal, Microsoft will only share the bank customers’ data if the order was issued by the government of India or an Indian court.

I’m an Amazon Employee. My Company Shouldn’t Sell Facial Recognition Tech to Police.

I’m an Amazon Employee. My Company Shouldn’t Sell Facial Recognition Tech to Police.

Amazon, where I work, is currently allowing police departments around the country to purchase its facial recognition product, Rekognition, and I and other employees demand that we stop immediately.

The Good Censor - GOOGLE LEAK

The Good Censor - GOOGLE LEAK

From elections and political propaganda, trolls and gendered bigotry, to hate speech and religious extremism, Bots and troll farms lash out at free thought and controversial opinion, while faceless users attack each other without empathy. Free speech becomes a social, economic and political weapon.

I wish I could quit you, but cookies find a way: How to sidestep browser tracking protections

I wish I could quit you, but cookies find a way: How to sidestep browser tracking protections

Modern browsers will place cookie files in response to both first- and third-party requests and they do so in a way that's open to security risks, like cross-site request forgery and cross-site script inclusion, and to privacy abuse, like third-party tracking.

Statement of Principles on Access to Evidence and Encryption

Providers of information and communications technology and services - carriers, device manufacturers or over-the-top service providers -– are subject to the law, which can include requirements to assist authorities to lawfully access data, including the content of communications.