information

Mon
14
Nov
John Lister's picture

Fujitsu: 'Trustable Internet' Could tackle Fake News

Fujitsu has proposed an "endorsement layer" on top of the Internet to tackle bogus information. It's an idea that would certainly face both technological and societal challenges. The idea comes in a white paper (a report designed to provoke ... discussion) written alongside Keio University in Japan. It explores the idea of a "trustable Internet in which people can use information securely." (Source: kaeio.ac.jp ) The concept is simple, if abstract. The writers propose a system that "overlays a layer on the Internet, which has a mechanism to confirm the credibility of the ... (view more)

Tue
17
May
John Lister's picture

Google Rethinks Removal Policy

Google is making it easier for people to remove web pages with their personal contact details from search results. It won't remove them from web pages, but may make it less likely people will come across them. The policy makes information less ... visible in two ways. Firstly, it stops it appearing on the search results page through the extracts from the relevant pages. Secondly, it may make it less likely the page that hosts the content will appear in a search result. While Google is legally required to remove some personal information from search results under European privacy laws, it goes a ... (view more)

Mon
09
May
John Lister's picture

Google Play Store Adds Privacy Info

Google has started including detailed privacy information about the Android apps in the official Play Store. It's up to developers to fill out the details and Google won't be checking them in advance. The listings page for each app will now have a ... summary box listing key data privacy and security details. Users can then click or tap through to see more detailed information. The box will note how many types of data the app collects, whether it is stored in encrypted form, and whether user can easily delete it. It will also list if the developer has put the app through an independent privacy ... (view more)

Thu
30
Dec
John Lister's picture

Alexa Tells Child to Play With Power Outlet

Amazon has apologized after its digital assistant Alexa told a 10-year old to connect a coin to a power socket. While there's a simple explanation, it raises even more questions. The girl's mother said she had previously been watching YouTube videos ... with a variety of safe physical challenges, then used voice control to ask an Alexa-enabled device for a "challenge to do." To the mother's shock, the device replied "The challenge is simple: plug in a phone charger about halfway into a wall outlet, then touch a penny to the exposed prongs." Fortunately the mother heard the reply, though she says ... (view more)

Fri
26
Nov
Dennis Faas's picture

How Thieves Use The Dark Web to Steal Your Data

We live in the age of technology where every day is full of advancements that make our lives easier. At what cost, though? Our Internet security is constantly under fire by hackers and cyber criminals using these technological advances to their ... gain. Through the dark web, a virtual underworld full of criminal activity that can be accessed using specific tools, such activity is made possible. However, many people aren't sure what the dark web actually is. According to Business Insider, it's "defined as all content hosted on darknets, or online networks that require a specific browsing software ... (view more)

Thu
19
Aug
John Lister's picture

T-Mobile Allegedly Hit By Massive Breach

T-Mobile is investigating claims a hacker stole sensitive data about more than 100 million customers. It hasn't confirmed or denied claims. The haul included social security numbers and driver license information. The alleged breach was first ... reported by Motherboard, which spotted a hacker forum post from somebody attempting to steal the data. The would-be seller says it comes from multiple T-Mobile servers and contains "full customer info" on US customers. The seller claims the haul includes names, phone numbers and physical addresses, along with IMEI numbers that identify individual ... (view more)

Tue
22
Jun
John Lister's picture

Court To Examine Online Ad Privacy

One of the key ways online advertising works has led to a court case alleging a breach of Internet users' privacy. A civil liberties group is taking legal action saying current regulations are too slow to have any effect. The Irish Council for Civil ... Liberties (ICCL) says IAB Tech Lab, which operates one of the world's main ad set-ups, is sharing revealing data about online activities without user consent. IAB is based in New York, though the legal case is against its branch in Hamburg, Germany to benefit from tighter rules in Europe. (Source: reuters.com ) Real Time Bidding Relies On Data The ... (view more)

Tue
24
Nov
John Lister's picture

Google Tightens Chrome Extension Privacy Rules

Google is making Chrome extension publishers give users more details about the data they collect. They will also have to promise to follow a new policy limiting the way they use the data. Extensions are third-party tools (called plug-ins or add-ons ... with some browsers) that interact with a web browser to provide a useful function. Examples include password managers that automatically fill in log-in details on a site, and an official Amazon plug-in that can send a copy of a long web page article direct to a Kindle e-Reader. One of the main concerns about extensions is that they inherently need ... (view more)

Fri
10
Apr
John Lister's picture

WhatsApp Attempts to Slow Spread of Fake News

A messaging service owned by Facebook is to change its policies to reduce the risk of people passing on bogus information. The WhatsApp changes follow a "significant increase" in forwarded messages since the COVID-19 pandemic began. WhatsApp lets ... users form and join multiple chat groups: for example, one for work colleagues, one for personal friends and one for neighbors. One key feature is that it's relatively simple to forward a message from one group to another, which means information can spread rapidly. That's particularly problematic when it comes to false and even dangerous information ... (view more)

Fri
09
Nov
Dennis Faas's picture

How to Fix: Hackers Hacked My Phone, Demand Bitcoin (Scam)

Infopackets Reader Nathan J. writes: " Dear Dennis, I recently received an email stating that hackers have hacked my phone. As proof of their hack, they gave me the last 2 digits of my phone number. They claim to have uploaded spying software on my ... phone and have supposedly 'caught me' visiting raunchy websites. To keep this quiet, they are demanding bitcoin payment of $800 USD. How can they hack my phone like this? Can they hack my PC too? Should I be worried? " My response: This is yet another version of the same scam that is currently going around the Internet. Related: How to Fix: Hackers ... (view more)

Pages

Subscribe to RSS - information