information

Fri
26
Nov
Dennis Faas's picture

How Thieves Use The Dark Web to Steal Your Data

We live in the age of technology where every day is full of advancements that make our lives easier. At what cost, though? Our Internet security is constantly under fire by hackers and cyber criminals using these technological advances to their ... gain. Through the dark web, a virtual underworld full of criminal activity that can be accessed using specific tools, such activity is made possible. However, many people aren't sure what the dark web actually is. According to Business Insider, it's "defined as all content hosted on darknets, or online networks that require a specific browsing software ... (view more)

Thu
19
Aug
John Lister's picture

T-Mobile Allegedly Hit By Massive Breach

T-Mobile is investigating claims a hacker stole sensitive data about more than 100 million customers. It hasn't confirmed or denied claims. The haul included social security numbers and driver license information. The alleged breach was first ... reported by Motherboard, which spotted a hacker forum post from somebody attempting to steal the data. The would-be seller says it comes from multiple T-Mobile servers and contains "full customer info" on US customers. The seller claims the haul includes names, phone numbers and physical addresses, along with IMEI numbers that identify individual ... (view more)

Tue
22
Jun
John Lister's picture

Court To Examine Online Ad Privacy

One of the key ways online advertising works has led to a court case alleging a breach of Internet users' privacy. A civil liberties group is taking legal action saying current regulations are too slow to have any effect. The Irish Council for Civil ... Liberties (ICCL) says IAB Tech Lab, which operates one of the world's main ad set-ups, is sharing revealing data about online activities without user consent. IAB is based in New York, though the legal case is against its branch in Hamburg, Germany to benefit from tighter rules in Europe. (Source: reuters.com ) Real Time Bidding Relies On Data The ... (view more)

Tue
24
Nov
John Lister's picture

Google Tightens Chrome Extension Privacy Rules

Google is making Chrome extension publishers give users more details about the data they collect. They will also have to promise to follow a new policy limiting the way they use the data. Extensions are third-party tools (called plug-ins or add-ons ... with some browsers) that interact with a web browser to provide a useful function. Examples include password managers that automatically fill in log-in details on a site, and an official Amazon plug-in that can send a copy of a long web page article direct to a Kindle e-Reader. One of the main concerns about extensions is that they inherently need ... (view more)

Fri
10
Apr
John Lister's picture

WhatsApp Attempts to Slow Spread of Fake News

A messaging service owned by Facebook is to change its policies to reduce the risk of people passing on bogus information. The WhatsApp changes follow a "significant increase" in forwarded messages since the COVID-19 pandemic began. WhatsApp lets ... users form and join multiple chat groups: for example, one for work colleagues, one for personal friends and one for neighbors. One key feature is that it's relatively simple to forward a message from one group to another, which means information can spread rapidly. That's particularly problematic when it comes to false and even dangerous information ... (view more)

Fri
09
Nov
Dennis Faas's picture

How to Fix: Hackers Hacked My Phone, Demand Bitcoin (Scam)

Infopackets Reader Nathan J. writes: " Dear Dennis, I recently received an email stating that hackers have hacked my phone. As proof of their hack, they gave me the last 2 digits of my phone number. They claim to have uploaded spying software on my ... phone and have supposedly 'caught me' visiting raunchy websites. To keep this quiet, they are demanding bitcoin payment of $800 USD. How can they hack my phone like this? Can they hack my PC too? Should I be worried? " My response: This is yet another version of the same scam that is currently going around the Internet. Related: How to Fix: Hackers ... (view more)

Tue
27
Mar
John Lister's picture

Facebook Admits: We Log All Your Calls and SMS History

Facebook users have been shocked to discover it stores the phone numbers of people who've never signed up to the site, along with the SMS and voice call histories of some users. But Facebook insists that users have explicitly given permission for ... such data storage. The site's data storage and sharing policies came back under the spotlight with the recent Cambridge Analytica scandal, when a journalist revealed that information gathered about users and their friends for a psychological study was shared without permission for use in political ad targeting. Since then, many users have been taking ... (view more)

Mon
05
Mar
Dennis Faas's picture

Explained: Do I Need Norton Identity Protection and Similar Services?

Infopackets Reader Marjie H. writes: " Dear Dennis, I just received an email offer from Norton Security asking if I would like to enroll in the Norton Identity Protection. In order to do so, the form says I need to provide my social insurance ... number. The protection being offered is free, so long as I renew my Norton Antivirus subscription. From what I understand, this service includes protection against personal credit, credit cards, bank, social insurance number (SSI), etc. My question is - with all this information they are asking for, what is the possibility they could be hacked and all my ... (view more)

Wed
22
Nov
John Lister's picture

Website User Tracking 'A Major Security Risk'

More than 400 leading websites could be compromising user security by collecting everything the user types - whether or not the user is aware. A Princeton University study also found the collected information was not always adequately protected and ... anonymized. The problem highlighted by the study was the use of third-party tools that website owners can use to find out more about how people navigate their site. These tools often track precisely where the user moves a mouse cursor along with information they type in, even if they then delete it. In principle these "session replay" tools can be ... (view more)

Wed
25
Oct
John Lister's picture

New Gmail Tools Easily Merge Data with Other Apps

Gmail users can now add third-party tools to merge email messages with other programs - without the need to manually load a specific app, then copy and paste data. The idea is similar to using browser extensions on a web browser, but will likely ... raise privacy and security concerns. Google already has its own tools that connect Gmail with other services. For example, users who receive a message confirming a flight booking or restaurant reservation can often add the relevant information to their Google Calendar tool with a single click. The Google Translate tool is also built in to Gmail. Now ... (view more)

Pages

Subscribe to RSS - information