information

Tue
24
Nov
John Lister's picture

Google Tightens Chrome Extension Privacy Rules

Google is making Chrome extension publishers give users more details about the data they collect. They will also have to promise to follow a new policy limiting the way they use the data. Extensions are third-party tools (called plug-ins or add-ons ... with some browsers) that interact with a web browser to provide a useful function. Examples include password managers that automatically fill in log-in details on a site, and an official Amazon plug-in that can send a copy of a long web page article direct to a Kindle e-Reader. One of the main concerns about extensions is that they inherently need ... (view more)

Fri
10
Apr
John Lister's picture

WhatsApp Attempts to Slow Spread of Fake News

A messaging service owned by Facebook is to change its policies to reduce the risk of people passing on bogus information. The WhatsApp changes follow a "significant increase" in forwarded messages since the COVID-19 pandemic began. WhatsApp lets ... users form and join multiple chat groups: for example, one for work colleagues, one for personal friends and one for neighbors. One key feature is that it's relatively simple to forward a message from one group to another, which means information can spread rapidly. That's particularly problematic when it comes to false and even dangerous information ... (view more)

Fri
09
Nov
Dennis Faas's picture

How to Fix: Hackers Hacked My Phone, Demand Bitcoin (Scam)

Infopackets Reader Nathan J. writes: " Dear Dennis, I recently received an email stating that hackers have hacked my phone. As proof of their hack, they gave me the last 2 digits of my phone number. They claim to have uploaded spying software on my ... phone and have supposedly 'caught me' visiting raunchy websites. To keep this quiet, they are demanding bitcoin payment of $800 USD. How can they hack my phone like this? Can they hack my PC too? Should I be worried? " My response: This is yet another version of the same scam that is currently going around the Internet. Related: How to Fix: Hackers ... (view more)

Tue
27
Mar
John Lister's picture

Facebook Admits: We Log All Your Calls and SMS History

Facebook users have been shocked to discover it stores the phone numbers of people who've never signed up to the site, along with the SMS and voice call histories of some users. But Facebook insists that users have explicitly given permission for ... such data storage. The site's data storage and sharing policies came back under the spotlight with the recent Cambridge Analytica scandal, when a journalist revealed that information gathered about users and their friends for a psychological study was shared without permission for use in political ad targeting. Since then, many users have been taking ... (view more)

Mon
05
Mar
Dennis Faas's picture

Explained: Do I Need Norton Identity Protection and Similar Services?

Infopackets Reader Marjie H. writes: " Dear Dennis, I just received an email offer from Norton Security asking if I would like to enroll in the Norton Identity Protection. In order to do so, the form says I need to provide my social insurance ... number. The protection being offered is free, so long as I renew my Norton Antivirus subscription. From what I understand, this service includes protection against personal credit, credit cards, bank, social insurance number (SSI), etc. My question is - with all this information they are asking for, what is the possibility they could be hacked and all my ... (view more)

Wed
22
Nov
John Lister's picture

Website User Tracking 'A Major Security Risk'

More than 400 leading websites could be compromising user security by collecting everything the user types - whether or not the user is aware. A Princeton University study also found the collected information was not always adequately protected and ... anonymized. The problem highlighted by the study was the use of third-party tools that website owners can use to find out more about how people navigate their site. These tools often track precisely where the user moves a mouse cursor along with information they type in, even if they then delete it. In principle these "session replay" tools can be ... (view more)

Wed
25
Oct
John Lister's picture

New Gmail Tools Easily Merge Data with Other Apps

Gmail users can now add third-party tools to merge email messages with other programs - without the need to manually load a specific app, then copy and paste data. The idea is similar to using browser extensions on a web browser, but will likely ... raise privacy and security concerns. Google already has its own tools that connect Gmail with other services. For example, users who receive a message confirming a flight booking or restaurant reservation can often add the relevant information to their Google Calendar tool with a single click. The Google Translate tool is also built in to Gmail. Now ... (view more)

Tue
03
Oct
John Lister's picture

Google Search Results Wrongly Name Man As Vegas Shooter

Google has confirmed its top search results misidentified the man responsible for the Las Vegas shootings. The automated results took the information from a controversial message board site rather than a mainstream media outlet. The information ... appeared in the results when people searched for the name of a man who was not responsible to or connected with the shooter. Instead the misidentified man shared a surname with a woman who had been named a "person of interest" by police and was in a relationship the actual shooter. Man Misidentified As Shooter When somebody searched for the innocent ... (view more)

Thu
16
Feb
Dennis Faas's picture

Report: You can be Tracked Online, even without IP or Cookies

Researchers have found a way to track web users even if they switch web browsers. It could improve security but also weaken online privacy. The researchers at Lehigh University in Pennsylvania were trying to find ways of improving fingerprinting. ... That's a way to attempt to identify an individual user (or at least their computer) without relying on single identifiers such as login details, browser cookies, or an IP address. Instead, fingerprinting involves taking multiple pieces of information provided by a user's browser such as the browser name, it's version, whether they have an ad blocker ... (view more)

Thu
02
Feb
John Lister's picture

Computer AI Masters Poker

An artificial intelligence program has beaten professional poker players for the first time. It may sound trivial but marks a major advance in technology that could have practical benefits. Computers beat human experts at chess many years ago, and ... last year a computer beat the world champion at the far more complex board game "Go" for the first time. That was significant because the sheer number of possible moves available in Go means ever the most powerful computer can't assess every possible move. Instead the program had to learn to use human tactics such as heuristics (in ... (view more)

Pages

Subscribe to RSS - information