You could be paying more at checkout!
Shopping online could make you a victim of price discrimination. Companies can use data like your past searches or location to influence the price you pay. Anna Werner reports on how that could mean paying more at checkout.
Read more: http://www.cbsnews.com/videos/browser-history-and-location-can-change-what-you-pay-online/
You may not be aware of is that Facebook also works with several data brokers to gather information about users’ “offline life”.
The company collects data on your income level, shopping history and more. …what you may not be aware of is that the company also work with several data brokers to gather information about users’ offline life. This can include things like places that you frequent, how much money you make and the number of credit cards you have.
Read more: http://www.techspot.com/news/67588-facebook-buying-data-about-users-offline-lives.html
65 million passwords were lost in a 2013 breach of the site’s security!
The popular blogging website Tumblr was reportedly taken down by hackers for two hours last night.A group of hackers known as R.I.U. Star Patrol have since claimed that they are responsible.
Read more: http://www.dailymail.co.uk/sciencetech/article-4057780/Tumblr-hacked-Cyber-criminals-site-Europe-online-attack-just-fun.html
Yahoo says it believes hackers stole personal data from more than one billion user accounts in a cyberattack that happened in 2013!
Yahoo says it believes hackers stole personal data from more than one billion user accounts in a cyberattack that happened in 2013.
The technology giant says the data affected included “names, email addresses, telephone numbers, dates of birth, hashed passwords”, as well as security questions and answers, but it claims financial information such as card details was not compromised.
Read more: https://www.newscientist.com/article/2116392-hackers-stole-personal-data-from-1-billion-yahoo-user-accounts/
Customers claim, that they would not have purchased “the vibrator” had they known their actions would be monitored, collected, and transmitted.
From phones to children’s toys and speakers, just about everything can become a “smart” device today. Even vibrators. And just like all of the other devices, sex toys can also violate your privacy. That’s the crux of a soon-to-be settled lawsuit.
Read more: https://consumerist.com/2016/12/08/company-behind-smart-vibrator-to-settle-claims-it-violated-users-privacy/
The Navy has acknowledged the breach was the result of hackers gaining access to the laptop of an employee working for the Navy contractor Hewlett-Packard Enterprise (HPE)!
A laptop belonging to an employee of Hewlett-Packard Enterprise has been compromised by hackers exposing the sensitive information of 130,000 US Navy sailors.
Read more: http://www.itproportal.com/news/personal-data-of-130000-us-navy-sailors-exposed-by-compromised-laptop/
How private is your iPhone, and the personal data stored on it? We examine the iPhone’s built-in privacy measures, explain how to protect your iPhone privacy, and argue that Apple is more deserving of your trust – and your data – than Google.
The biggest political battle of the second half of the 2010s may well be privacy. Most of all this battle will be fought in the realm of technology, where corporate behemoths Apple and Google represent (at least in the mind of the average tech user) opposite ends of the spectrum.
Read more: http://www.macworld.co.uk/news/iphone/private-iphone-data-apple-fbi-backdoor-hack-privacy-google-hacker-3635262/
Sweden’s move is in marked contrast to many other parts of the world!
Sweden last week banned the use of camera drones without a special permit, infuriating hobby flyers and an industry group but likely pleasing privacy campaigners.
Drone pilots will now have to show that there’s a legitimate benefit that outweighs the public’s right to privacy – and there are no exemptions for journalists, nor any guarantee that a license will be granted.
Read more: https://nakedsecurity.sophos.com/2016/10/27/sweden-bans-cameras-on-drones-deeming-it-illegal-surveillance/
Wearables are increasingly faced with myriad legal challenges, the most difficult of which revolve around data privacy
In fitness, gaming, smartwatches and a host of other areas, wearable technology has found a place in consumers’ hearts. For the product manufacturers, however, it is often described as a regulatory minefield: wearables are increasingly faced with myriad legal challenges, the most difficult of which revolve around data privacy.
Read more: http://www.itproportal.com/features/wearable-tech-and-the-privacy-issue/
According to a report by Reuters, Yahoo Inc built a secret custom software program to search all of its customers’ email messages, at the request of U.S. intelligence officials.
According to a report by Reuters, Yahoo Inc built a secret custom software program to search all of its customers’ email messages for specific information, at the request of U.S. intelligence officials. The report cites three unnamed former employees and “a fourth person appraised of the events,” saying that the company scanned “hundreds of millions of Yahoo Mail accounts” at the request of the National Security Agency or the FBI.
Read more: http://www.winbeta.org/news/yahoo-undertook-mass-email-spying-for-us-government-microsoft-google-twitter-all-deny-involvement