Privacy

The Federal Trade Commission seeks to obtain information on how many users certain social media companies have, how active the users are, what the companies know about them, how they got that information, and what steps the companies take to continue to engage users. The FTC also is gathering inform...

The Big Three makers of video gaming hardware have announced a united front to make online gaming safe for all their players. "We can accomplish more when we work toward the same goal, and so we will each continue investing in, evolving, and amplifying our approaches to user safety," stated Dave McC...

The @ Company wants to give you a more secure and human-centric Internet built on providing you with true ownership and control of your personal data. To that end, the company has launched an app built on its new privacy protocol. This new standard will attempt to change how online vendors and compa...

When it comes to an appetite for data, social media outfits are the most voracious, according to a recent study released by cybersecurity company Clario Tech. The analysis of nearly 50 of the world's biggest brands found that Facebook collects more than 70 percent of all the data it can collect lega...

Healthcare records were digitized to help prevent medical errors such as misdiagnoses and mistakes with medication, but electronic health records have made it easier for bad actors to steal patients' highly personal information. Cybercriminals are further motivated by the fact that patient medical r...

RoboLinux is one of the most advanced desktop Linux distributions you can find. The latest release is even better, making it potentially THE best Linux variety available today for desktop users. The Oct. 9 release of RoboLinux 11.13 is an upgraded build of the project's Ubuntu-based distribution. Bu...

Google has taken a step toward controlling spam voice calls on Android devices with a new addition to its phone app. The "Verified Calls" feature will display a caller's name, logo, reason for calling and a verification symbol indicating a business has been verified by Google. The service will initi...

Online bandits are decreasing their schemes against businesses but increasing COVID-19 scams aimed at consumers, according to a report released Tuesday by TransUnion. Suspected fraudulent digital transactions against businesses worldwide dropped nine percent from the lockdown phase of the pandemic t...

After crashing in 2019, Dark Web markets for stolen credentials rebounded during the first half of 2020, largely due to major shifts in consumer behavior caused by the global pandemic. Hacked accounts for delivery services and physical fitness brands are some of the highest priced items on the marke...

HOW TO

Digital Security Is as Easy as PGP

Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. To be sure, there are specialized circles that make regular explicit us...

Earthquake alerts are being incorporated into Android, Google's mobile operating system. The feature will be included in a refresh of Google Mobile Services, so a full operating system upgrade won't be necessary. That means the new addition will be available to most Android users -- except those in ...

Like a lot of you, last week I watched the congressional testimony from the CEOs of Amazon, Apple, Facebook and Google -- and there were a lot of apparent things that were problematic. One is that there are folks in Congress that likely shouldn't be in Congress, and another is that each company has ...

Advertising for software and hardware designed to stalk and spy on people will soon be banned on Google. Promotion of products or services that are marketed or targeted with the express purpose of tracking or monitoring another person or their activities without their authorization will be prohibite...

Twitter had a data security problem last week that might sound trivial. Email addresses, phone numbers, and the last four digits of the credit cards used to buy ads on Twitter were left in browser cache after the transaction, and that cache was not secured. This may seem trivial, but the consequence...

Technewsworld Channels