Articles about Privacy

Selling a smartphone? Here's how to securely wipe your personal data

As a test, Avast purchased 20 used and supposedly wiped Android phones and discovered that it was able to recover vast amounts of personal user data. My colleague Brian Fagioli reported the story here.

Google responded to the news, stating "This research looks to be based on old devices and versions (pre-Android 3.0) and does not reflect the security protections in Android versions that are used by the vast majority of users". It went on to offer users advice on how to make sure when selling an old mobile phone you aren’t also gifting your personal data to buyers.

Continue reading

Vysk QS1 phone case brings encrypted calls to paranoid Samsung and Apple users

Phones hit the headlines for lots of reasons -- the biggest, the most expensive, the shiniest, or just the newest. We live in times in which security and privacy are major concerns for people in all walks of life. The activities of the NSA, as revealed by Edward Snowden, served only to heighten paranoia -- the prospect of having one's phone calls and text messages intercepted is something that fills few people with joy. Enter Vysk communicastions' Vysk QS1 phone case which can be used with an iPhone 5 or 5s, and a Samsung Galaxy S5 or S4. The selling point here is that it's not just your phone that's protected, but also your privacy.

The privacy features come in mechanical and software forms. On the mechanical front there are "shutters" that can be used to obscure your phone's front and rear cameras, and there's also a jamming system for microphones. This is described by Vysk as "Lockdown Mode", but you can take things a step further. For $9.95 you can subscribe to "Private Call Mode". This introduces encryption to your texts and phone calls, with an onboard processor taking care of encryption on the fly and sent via the Vysk encrypted network. As Vysk puts it: "No one -- not even Vysk -- will know the identity of the caller or the recipient. No data is collected -- no phone numbers, call times or content - so there is no data to record. Because nothing is recorded, nothing is at risk."

Continue reading

Selling your smartphone online? You may be making a huge mistake

Buying and trading goods used to be so easy. If I needed a rake and my neighbor needed a hoe, we could simply swap. If I wanted to sell something, I would take out a classified ad in a local newspaper, like the Penny Saver. Hell, I bought my first car that way -- loved that thing.

Nowadays, buying and selling is much more complicated -- especially electronics. You can buy something from eBay or Craigslist only to find out that it doesn't work or is stolen. Smartphones and tablets can be risky to sell, because you have to remember to wipe your data before giving it to the other party. If you forget, the buyer can get your personal information and private photos. Forget to delete that sexy selfie that you took? Some weirdo from eBay now has it and will spread it around the net. Today, Avast announces that as a test it purchased 20 used and supposedly wiped phones from the net. The personal data recovered is shocking.

Continue reading

Innocent victims: NSA gathered data about more ordinary web users than targets

We already knew that the dragnet style of data collection employed by the NSA resulted in a huge level of collateral damage. As revealed by whistle-blower Edward Snowden the agency had been intercepting huge amounts of web traffic -- often with the assistance of web firms -- on an almost unbelievable scale. The NSA has tried to improve its public image by playing the national security card, as well as releasing a "transparency report" but there's no getting away from the fact that countless innocent web users got caught up in the net. But an investigation by the Washington Post reveals the true extent of the impact on the average internet users -- and it's far worse than many thought.

A four-month investigation by the newspaper found that the number of average internet users who had their data intercepted far outweighs the data of targeted individuals. And not just by a bit -- by a factor of nine. Data provided to the Washington Post by Edward Snowden shows that an astonishing 900 percent more innocent users than intended targets fell victim to the NSA's surveillance. (For the purposes of accuracy the exact figures are closer to an 11 to 89 percent split). These are staggering revelations. There has already been very vocal opposition to the NSA's activities but these were essentially "blind" complaints. Without knowing the scale of operations, it was difficult to know just how upset to be. Nine out of ten people who had their data collected were nothing more than collateral damage caught in the extremely wide net cast by the agency.

Continue reading

Is Russia on the verge of creating its own controlled, closed internet?

The idea of a closed internet is hardly new; turn your eyes to East Asia, and the Great Firewall of China looms large. The Chinese government is well known for the control it likes to exert over the levels of access its citizens have to the internet, and there have been numerous well-publicized cases of censorship and access being restricted to pages that refer to certain events in the county's history. The country is highly defensive of its image, and goes to great lengths to fight off western influence -- including going as far as banning Windows 8 on government computers lest machines furnished with Microsoft's most recent operating system be used for spying on the People's Republic of China. Now it looks as though Russia could be going down a similar route.

Russian parliament has just passed a law that requires internet companies to store data about Russian citizens within the county's boundaries. The move can be viewed in a couple of ways. It is no secret that the Russian government, and Vladimir Putin in particular, is no fan of social media -- social networks were used by Russians to voice their disapproval at Putin's activities. It is thought that the move to contain citizen's data without Russia is a bid to create a Russian version of China's closed internet.

Continue reading

Facebook faces official complaint over deceptive newsfeed experiment

The revelations about Facebook's emotional experiment with users' newsfeeds back in 2012 has seen the social network fighting off a torrent of criticism. Users were upset to learn that the content of their newsfeed may have been manipulated as researchers tried to determine the effects exposure to positive and negative newsfeed content had on users' subsequent output. Now an official complaint has been lodged against the social network by thee Electronic Privacy Information Center. Epic filed a complaint with the US Federal Trade Commission, alleging that "the company purposefully messed with people’s minds".

There are several lines of attack in the complaint, but the main thrust is that Facebook neither obtained permission from the 700,000 affected users, nor informed them about what was happening. Epic also complains that Facebook failed to warn users that their data would be shared with researchers at Cornell University and the University of California. The complaint points out that "at the time of the experiment, Facebook was subject to a consent order with the Federal Trade Commission which required the company to obtain users' affirmative express consent prior to sharing user information with third parties".

Continue reading

GCHQ faces legal action from ISPs over alleged spying and network attacks

Seven internet service providers (ISPs) have filed a legal complaint against the UK's intelligence agency GCHQ.

Since a series of high-profile allegations made last year by US whistleblower Edward Snowden, government agencies have had to face claims of spying and intrusion but this is the first time GCHQ has faced legal action.

Continue reading

Threats to the internet in 2025 -- start worrying now

We looked yesterday at the ten most serious security breaches of recent years, but the threat landscape is constantly changing. So what will happen in the future and which threats should we be most concerned about?

A new report by PewResearch, as part of its series marking 25 years of the internet, looks at how things might be in 2025. More than 1,400 experts in various fields were canvassed for their views on future threats.

Continue reading

The top 10 data breaches and how they happened

Cyber attack

Security breaches happen all the time but it's the biggest ones that hit the headlines and send ripples through the IT community. Security consultancy TSC Advantage has looked at the top ten breaches from the last five years and what effect they've had.

Top of the list is the Adobe hack of 2013, made possible by weak password requirements and affecting 152 million customers. In second place comes the recent eBay hack involving stolen employee credentials and affecting 145 million users.

Continue reading

Post-Snowden era will make physical location of data irrelevant

Globe hard drive

A new report from research specialist Gartner says that the physical location of data is becoming increasingly irrelevant and that by 2020 a combination of legal, political and logical location will be more important.

Gartner research vice president Carsten Casper says that the number of data residency and data sovereignty discussions has soared in the past 12 months, and that this has stalled technology innovation in many organizations. Originally triggered by the dominance of US providers on the Internet and the Patriot Act, the perceived conflict has since been fueled by revelations of surveillance by the NSA made public by Edward Snowden.

Continue reading

The majority of smartphone users have something to hide from their partners

Software company IObit commissioned a survey into the personal content stored on smartphones, and found a lot of users have something on their devices they would rather others -- and in particular their partners -- didn’t see.

The survey, which was conducted among 5,000 international smartphone users, revealed some fascinating details, including that 81 percent of people feel SMS messages on their smartphones should be private, and a third of respondents want to actually conceal part of their SMS logs -- especially from their significant others. Of course, it’s not just text messages that users want to hide.

Continue reading

Facebook gives with one hand and takes with the other

Social networks are funny beasts, and this is certainly something that's true of Facebook. The site has a patchy history with regard to user privacy, and there are constant complaints about how personal content is used, who can gain access to it, and the privacy settings that are in place. But like all modern companies, Facebook likes to be seen listening to its customers -- or at least appear to listen. A recent example of 'listening to the people' is Facebook's reaction to the #FreeTheNipple campaign which ultimately led to the site bowing to pressure and permitting photos of breastfeeding to be published. There have also been numerous instances of responding to complaints and making privacy settings easier to control.

Like Microsoft, Google, Yahoo, and even the NSA, Facebook has released transparency reports that detail data requests and the like. Transparency reports are something that users all but demanded, and delivering them is excellent PR for the companies involved. Now Facebook is taking things up a notch, fighting for users' rights in court. Earlier this week it emerged that the social network is fighting a US court order which forced it to hand over user data. The data was requested as part of an investigation into benefit fraud. Facebook complied but complained that it was a violation of the Fourth Amendment.

Continue reading

NSA under the microscope -- agency releases "transparency" report

NSA, Snowden, spying, yadda, yadda, yadda. This story is old, I know, but it goes on. The activities of the NSA and other government agencies have forced the online world to look very closely at how its data is being used, and how the companies handling it operate. Just about every online company worth its salt has gone out of its way to bemoan the NSA, their need to comply with data requests from the agency, and their inability to reveal everything they want to about what the NSA is asking about.

We have seen "transparency reports" from Google, Microsoft, LinkedIn and numerous other companies. But as suggested by my use of quotes, and as alluded to in the opening paragraph, there have been (severe) limits to the levels of transparency we have seen. "Quite opaque" might be a better description. Still, with the world and its dog falling over one another to release the most details, most comprehensive, and most self-congratulatory report, we probably should have predicted that pressure on the NSA would reach a point at which it felt forced to show its own hand. That time has come. The microscope has been turned around, and the security agency is now laying bare its own facts and figures.

Continue reading

The most popular stories on BetaNews this past week: June 15 -- 21

This is the week of the Surface Pro 3. Brian had already attended the launch event earlier in the month, and has provided an essential list of hardware and software purchasers need to grab for the best all round experience -- he even goes as far as suggesting that it's better than a MacBook Air. Even before launch there was an update available for the tablet-cum-laptop, and there was also news that the Intel Core i3 and i7 models would be shipping earlier than previously expected. But not all of the products we looked at this week were quite so "every day". There was the wifi doorbell complete with camera, and also the prospect of charging your phone wirelessly with your pants -- yes you did read that correctly.

The Windows Phone market is dominated by Nokia, but a new batch of handsets has been unveiled by Indian manufacturer Micromax. If Android is your mobile OS of choice, you may be thinking about venturing into the rooted world. This week a new tool was released that makes the process as quick and painless as possible, opening up a whole new breed of apps and options. Joe decided to take a walk on the wild side and adopt the Nokia Lumia Icon as his phone of choice. In the Android arena, a new contender entered -- the Amazon Fire Phone. Will a kill switch be added? Microsoft and Google have agreed to add it to their mobile operating systems.

Continue reading

Twitter reinstates tweets that mock the Prophet Muhammad and depict Koran burning

Twitter has reversed blocks it placed on numerous tweets and accounts in Pakistan that were deemed "blasphemous" and "unethical", including some that featured anti-Islamic content, depictions of the Prophet Muhammad, and photos of the Koran burning. Pakistani authorities complained to Twitter back in May, and the social network "made an initial decision to withhold content in Pakistan".

But after the Pakistan Telecommunication Authority failed to provide the additional information that Twitter requested, the accounts and tweets have been restored.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.