privacy

Uber asks to track your location even when you’re not using the app

The last update for the Uber app raises great concerns because it asks to track users' location even when they’ve…

8 years ago

The Most Secure Smartphones – Holiday Edition

Unfortunately, many smartphones have never been designed with security in mind, which are the most secure smartphones? Enjoy it! In…

8 years ago

GeekedIn service exposed 8 million GitHub profiles online

The GeekedIn recruitment project scraped user data from GitHub and other similar websites, but data were inadvertently leaked online. The…

8 years ago

Russia is going to ban LinkedIn after court ruling. What’s next?

Russia is going to ban Linkedin after a court ruling that found the professional social network  to be in violation…

8 years ago

Donald Trump will control the NSA – what this means for your privacy

Earlier this week, Donald Trump won a stunning election victory that will put him in charge of the world’s most…

8 years ago

Mass Surveillance of Cell Phone Data by AT&T Service Provider

AT&T has been data-mining and willingly sharing user phone data, through its “Hemisphere” Project, which is essentially a mass surveillance…

8 years ago

Experts devised a method to capture keystrokes during Skype calls

A group of security experts discovered that the Microsoft Skype Messaging service exposes user keystrokes during a conversation. A group…

8 years ago

WiFox mobile app shows names and passwords for Wi-Fi airports networks worldwide

The WiFox mobile app was designed as a huge container of network names and passwords for Wi-Fi airports networks worldwide.…

8 years ago

No doubt, events demonstrate that Signal is the most secure messaging app

Why Signal is considered the most secure instant messaging app? It stores only a few information about its users, and…

8 years ago

DefecTor – Deanonymizing Tor users with the analysis of DNS traffic from Tor exit relays

Researchers devised two correlation attacks, dubbed DefecTor, to deanonymize Tor users using also data from observation of DNS traffic from…

8 years ago

This website uses cookies.