Company agreed that a closed source module wasn’t a good fit for an open source browser.
Source: Not OK, Google: Chromium voice extension pulled after spying concerns
Company agreed that a closed source module wasn’t a good fit for an open source browser.
Source: Not OK, Google: Chromium voice extension pulled after spying concerns
The NSA and its British counterpart the GCHQ have put extensive effort into hacking popular security software products to “track users and infiltrate networks,” according to the latest…
Source: NSA Has Reverse-Engineered Popular Consumer Anti-Virus Software In Order To Track Users | TechCrunch
If you’re the type of person to upload photos to Facebook in huge batches, you know just how useful automatic tagging can be. But Facebook’s constantly improving its facial recognition,…
Source: Facebook is getting so good at recognizing people it doesn’t even need to see your face anymore
A privacy advocacy group is urging federal regulators to investigate Uber’s planned changes to its privacy policy.
Source: Feds Urged to Investigate Uber’s Plan to Track Users – NationalJournal.com
Your computer is leaking information. It’s not from the usual suspects: WiFi, Bluetooth or ethernet, but from radio waves originating from your processor
Source: The $300 ‘PITA’ steals encryption keys with radio waves
Researchers sneak password-stealing app into Apple Store to demonstrate threat.
Source: Serious OS X and iOS flaws let hackers steal keychain, 1Password contents
Those moments between Wi-Fi connect and VPN launch can give away a lot.
Source: Even with a VPN, open Wi-Fi exposes users | Ars Technica
Successful hack attacks often happen not because of tricky coding, but plain old “social engineering” — ie, conning people. A Github researcher called “
Source: iOS flaw tricks you into giving up your iCloud password (updated)