Étiquette : privacy (Page 14 of 46)

https://no-flux.beaude.net/wp-content/uploads/2020/03/1582126936038-credit-card.jpeg

“Yodlee, the largest financial data broker in the U.S., sells data pulled from the bank and credit card transactions of tens of millions of Americans to investment and research firms, detailing where and when people shopped and how much they spent. The company claims that the data is anonymous, but a confidential Yodlee document obtained by Motherboard indicates individual users could be unmasked.”

Source : Leaked Document Shows How Big Companies Buy Credit Card Data on Millions of Americans – VICE

“Sensor Tower, a popular analytics platform for tech developers and investors, has been secretly collecting data from millions of people who have installed popular VPN and ad-blocking apps for Android and iOS, a BuzzFeed News investigation has found. These apps, which don’t disclose their connection to the company or reveal that they feed user data to Sensor Tower’s products, have more than 35 million downloads.”

Source : Sensor Tower Secretly Owns Ad Blocker And VPN Apps That Collect User Data

“Cette atteinte à la vie privée d’un personnage politique va nécessairement nourrir les différents textes en cours de discussion au Parlement. La proposition de loi Avia veut obliger les plateformes à retirer en moins de 24 heures les contenus pornographiques lorsqu’ils sont susceptibles d’être vu par un mineur. La proposition de loi contre les violences conjugales entend-elle rendre applicable cette même infraction même si les contenus sont précédés d’un disclaimer « interdit aux moins de 18 ans ».”

Source : Le revenge porn visant Benjamin Griveaux déjà dédoublé sur Internet Archive

“The Swiss firm made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran, military juntas in Latin America, nuclear rivals India and Pakistan, and even the Vatican.But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages.”

Source : How the CIA used Crypto AG encryption devices to spy on countries for decades – Washington Post

Hackers examining a voting machine at the DefCon cybersecurity conference in Las Vegas in 2017.

“The programmer who revealed the breach, explained that visitors to the Elector app’s website could right-click to “view source,” an action that reveals the code behind a web page. That page of code included the user names and passwords of site administrators with access to the voter registry, and using those credentials would allow anyone to view and download the information. Mr. Bar-Zik, a software developer for Verizon Media who wrote the Sunday article in Haaretz, said he chose the name and password of the Likud party administrator and logged in. “Jackpot!” he said in an interview on Monday. “Everything was in front of me!””

Source : Israeli Voters: Data of All 6.5 Million Voters Leaked – The New York Times

Image

“Google this evening began alerting Takeout users about the “technical issue.” From November 21-25, 2019, those that requested backups could have had videos in Google Photos “incorrectly exported to unrelated users’ archives.” In requesting a backup, some of your videos — but not pictures — might be visible to random users that were also downloading their data through Google Takeout.”

Source : Google Photos video backups sent to strangers last year – 9to5Google

https://no-flux.beaude.net/wp-content/uploads/2020/01/1580082517166-avast.jpg

“The documents, from a subsidiary of the antivirus giant Avast called Jumpshot, shine new light on the secretive sale and supply chain of peoples’ internet browsing histories. They show that the Avast antivirus program installed on a person’s computer collects data, and that Jumpshot repackages it into various different products that are then sold to many of the largest companies in the world. Some past, present, and potential clients include Google, Yelp, Microsoft, McKinsey, Pepsi, Home Depot, Condé Nast, Intuit, and many others. Some clients paid millions of dollars for products that include a so-called « All Clicks Feed, » which can track user behavior, clicks, and movement across websites in highly precise detail.”

Source : Leaked Documents Expose the Secretive Market for Your Web Browsing Data – VICE

https://no-flux.beaude.net/wp-content/uploads/2020/01/02_home_final-900_x2.jpg

“Companies and governments are gaining new powers to follow people across the internet and around the world, and even to peer into their genomes. The benefits of such advances have been apparent for years; the costs — in anonymity, even autonomy — are now becoming clearer. The boundaries of privacy are in dispute, and its future is in doubt. Citizens, politicians and business leaders are asking if societies are making the wisest tradeoffs. The Times is embarking on this monthslong project to explore the technology and where it’s taking us, and to convene debate about how it can best help realize human potential.”

Source : Opinion | The Privacy Project – The New York Times

“Hackers are tapping in to cameras intended for home security, talking to children through the devices and even dropping racist remarks, according to multiple news reports. The intended purpose of a two-way talk function on the devices is to allow parents to check in on their children. But hackers are using them to wake people up in the middle of the night, and watch unsuspecting children.”

Source : Ring hackers are reportedly watching and talking to strangers via in-home cameras | Technology | The Guardian

« Older posts Newer posts »

© 2025 no-Flux

Theme by Anders NorenUp ↑