Amazon says police demands for customer data have gone up

Amazon says police demands for customer data have gone up

Amazon has said the number of demands for user data made by U.S. federal and local law enforcement have increased more during the first half of 2020 than during the same period a year earlier.

What Are Stingrays and Dirtboxes?

What Are Stingrays and Dirtboxes?

But a security researcher named Roger Piqueras Jover found that the authentication on 4G doesn’t occur until after the phone has already revealed its IMSI number, which means that stingrays can still grab this data before the phone determines it’s not communicating with an authentic cell tower and switches to one that is authenticated.

Privacy & Security 101: Compartmentalization

Privacy & Security 101: Compartmentalization

Most people might prefer a more partial compartmentalization: a VoIP number from work that’s different from their personal number, a separate email for their banking institutions, utilities, rent portal, and other important matters, a different name and number for online dating, etc.

Exclusive: More than 1,000 people at Twitter had ability to aid hack of accounts

Exclusive: More than 1,000 people at Twitter had ability to aid hack of accounts

SAN FRANCISCO (Reuters) - More than a thousand Twitter employees and contractors as of earlier this year had access to internal tools that could change user account settings and hand control to others, two former employees said, making it hard to defend against the hacking that occurred last week.

GitHub - upmasked/number-verifier: Number Verifier is a SMS verification tool that makes it easy to get a disposable SMS number and bypass SMS number verifications on any site.

GitHub - upmasked/number-verifier: Number Verifier is a SMS verification tool that makes it easy to get a disposable SMS number and bypass SMS number verifications on any site.

Automatically refreshing of latest messages (5s delay) Easy switching between providers Usage.We currently support the following providers: smsreceivefree - Support for free SMS numbers, currently 14 numbers available from the USA.Upmasked - Support for free SMS numbers, currently 2 numbers available from US & UK.

FreePN - 4 Tips to Stay Private While Job Hunting

FreePN - 4 Tips to Stay Private While Job Hunting

Sharing information such as your mailing address and phone number on a publicly available online resume is a bad idea; scammers sometimes use public resumes to look for identifying information and use that to employ phishing scams, blackmail, or identity theft.

Erdoğan seeks to shut, control social media platforms in Turkey

Erdoğan seeks to shut, control social media platforms in Turkey

President Recep Tayyip Erdoğan has said that he seeks to shut social media platforms in Turkey, a day after his daughter Esra Albayrak was insulted on Twitter.

TikTok Reverse Engineered: What Was Discovered Will Make You Delete It ASAP

TikTok Reverse Engineered: What Was Discovered Will Make You Delete It ASAP

And here's food for thought; Bangorlol alleges that reverse engineering other popular social media apps like Facebook, Instagram and Twitter didn't find nearly as much data collection going on -- there was absolutely no comparison.

Darknet forum leaks Telegram database with millions of Russian users’ information

Darknet forum leaks Telegram database with millions of Russian users’ information

A darknet forum has released a database with the telephone numbers and unique identifiers of millions of users of the messaging app Telegram, reports the IT news site .

Number Protector

Number Protector

This is important, because some services, like Twitter, will reject phone numbers not classified as mobile even if the number is SMS-enabled!We want our customers to choose to renew their Number Protector service, so we strive to always offer a fair price for our service.

Coronavirus: Scam warning over NHS test and trace

Coronavirus: Scam warning over NHS test and trace

Local councils in England and Wales have issued alerts following reports of bogus calls and messages asking for money to cover the cost of coronavirus testing kits.However, a number of fraudsters are using this to their advantage and posing as contact tracers to deceive people into parting with money or personal details.

Privacy News Online | Weekly Review: June 19th, 2020

Privacy News Online | Weekly Review: June 19th, 2020

A report by the International Digital Accountability Council (IDAC) examined 108 global COVID-19 tracing and tracking apps to examine data protection levels.Norway to stop Covid-19 track and trace app following warning from data protection watchdog.

Whatsapp blamed own users for failure to keep phone number repo off Google searches

Whatsapp blamed own users for failure to keep phone number repo off Google searches

Athul Jayaram, a self-described “full time bug bounty hunter”, published a blog post earlier this week highlighting that a large number of Whatsapp users’ mobile numbers could easily be found by searching Google for the domain “”.

How to Get the Most Out of Signal and Encrypted Chat

How to Get the Most Out of Signal and Encrypted Chat

By doing so, they can now take advantage of Signal’s end-to-end encryption, which means that no one—not the government, your phone company, or Signal itself—can read the contents of messages as they pass between devices.

Using this WhatsApp feature will land your phone number in Google search results

Using this WhatsApp feature will land your phone number in Google search results

Users of WhatsApp’s Click to Chat feature could see their personal phone numbers exposed via public Google search results, according to a new discovery made by a security researcher.

Time to embrace federated analytics – it’s no privacy panacea, but probably the closest we will get to one for many situations

Time to embrace federated analytics – it’s no privacy panacea, but probably the closest we will get to one for many situations

It gets across well the idea of how sending data in a particular form allows it to be useful in aggregate, but immune to further interrogation about each separate source: Let’s say that Rakshita wants to know how often her friends Emily and Zheng have listened to a particular song.

I Shared My Phone Number. I Learned I Shouldn’t Have.

I Shared My Phone Number. I Learned I Shouldn’t Have.

She added that when a user set up two-step verification with a phone number, the company would not use the information to serve targeted ads.

Exclusive: Hacker selling 500 million Facebook user data from 82 countries

Exclusive: Hacker selling 500 million Facebook user data from 82 countries

Now, a hacker or call them a threat actor is claiming to have access to a database with 500 million Facebook user data from 82 countries.Remember, third-party firms can use data scrapping, a fairly common practice to extract the personal information of users from websites like Facebook or Twitter.

Ron Wyden Hints at How the Intelligence Community Hides Its Web Tracking Under Section 215

Ron Wyden Hints at How the Intelligence Community Hides Its Web Tracking Under Section 215

An order in which an IP address used by multiple people is the target An order collecting all the people who visit a particular website An order collecting all the web browsing and internet searches of a single user The government is required to report:.

Privacy in the Workplace

Privacy in the Workplace

Whether you go the networking route or sign up for job-hunting sites, from a privacy perspective, I would approach it the same way: get a work email and a work phone number.Generally speaking, it is illegal for an employer to force you to download company programs to your personal devices.

April Extensions for Firefox Preview

April Extensions for Firefox Preview

We’d like to thank the developers of these add-ons for supporting Firefox Preview.While we’re pleased to offer these six highly recommended add-ons as a starting point, it’s clear that add-on developers have more great ideas for extensions that can enhance the mobile browsing experience.

It's Not Just Zoom. Google Meet, Microsoft Teams, and Webex Have Privacy Issues, Too.

It's Not Just Zoom. Google Meet, Microsoft Teams, and Webex Have Privacy Issues, Too.

A single privacy policy governs Google's three videoconferencing services, and Teams and Skype share the same Microsoft privacy policy.Consumer Reports is writing to Cisco, Google, and Microsoft with a number of recommendations on how to improve their privacy policies, and publishing a complete report on what we found.

So I reverse engineered two dating apps...

So I reverse engineered two dating apps...

In this post I show some of my findings during the reverse engineering of the apps Coffee Meets Bagel and The League.It would be best if the developers make sure the app only attaches authorization bearer header in requests to The League API.

Nine million logs of Brits' road journeys spill onto the internet from password-less number-plate camera dashboard

Nine million logs of Brits' road journeys spill onto the internet from password-less number-plate camera dashboard

Exclusive In a blunder described as "astonishing and worrying," Sheffield City Council's automatic number-plate recognition (ANPR) system exposed to the internet 8.6 million records of road journeys made by thousands of people, The Register can reveal.

RSA Cryptography Behind the Scenes

RSA Cryptography Behind the Scenes

Meeting the definition of a cipher, RSA follows the consistency equation being expressed as:This just means that after encrypting a message m with a public key (e, n), the message can then only be decrypted with the corresponding private key (d, n) to recover the message.

India blocks more webpages than Pakistan, Bahrain and UAE combined: Chilling details emerge

India blocks more webpages than Pakistan, Bahrain and UAE combined: Chilling details emerge

As per Citizen Lab, a combination of publicly available "IP scanning, network measurement data, and other technical tests" were used to identify Netsweeper installations first in 30 countries, and then the list was narrowed down to 10 countries where the filter of content was taking place at a country-wide level by ISPs. Censorship attempts in India worse than Pakistan, Bahrain and UAE combined.

My identity was stolen. This is what I learned.

My identity was stolen. This is what I learned.

Using my cellphone number, this person had received text codes as part of a two-factor authentication to access my accounts.Having an online account text an authorization code was supposed to be an added security measure.

NASA under 'significantly increasing' hacking, phishing attacks

NASA under 'significantly increasing' hacking, phishing attacks

NASA has seen "significantly increasing" malicious activity from both nation-state hackers and cybercriminals targeting the US space agency's systems and personnel working from home during the COVID-19 pandemic.

Iran Launched an App That Claimed to Diagnose Coronavirus. Instead, It Collected Location Data on Millions of People.

Iran Launched an App That Claimed to Diagnose Coronavirus. Instead, It Collected Location Data on Millions of People.

The government has already boasted that millions of citizens have shared this information with them at a time when most Iranians are completely in the dark about the threat from coronavirus.Screen shots of visual prompts from Iran's tracking app AC19, which claims to diagnose coronavirus but actually collects location data.

'More scary than coronavirus': South Korea's health alerts expose private lives

'More scary than coronavirus': South Korea's health alerts expose private lives

As the number of coronavirus cases in South Korea exceeded 6,000 this week, there was a rise, too, in complaints about information overload in the form of emergency virus text alerts that have included embarrassing revelations about infected people’s private lives.