Epic privacy fail: WeTransfer shared its users' files with the wrong people
Sharing files using the cloud is very convenient, but understandably, some people are hesitant to do so with sensitive or private information. These privacy-conscious folks may be looked at as "paranoid" by some, but you know what? As more and more breaches occur, it is becoming harder to trust the cloud with files. And so, the "tinfoil hat" wearers start to look quite sensible.
As an example, popular cloud-based file-sharing service WeTransfer has failed in epic fashion. You see, the company not only shared files with the intended recipients, but with random strangers too! Yes, that private information you didn't want seen by anyone other than your intended audience may have been viewed by the wrong person. Good lord.
Google confirms that second-hand Nest Cams could have been used to spy on people
There been many concerns voiced about the privacy and security implications of many smart products. Some are well-founded, as a new admission from Google that its Nest Cams could be used to spy on people goes to show.
The problem does not center around hackers, but people who have sold or given away their Nest Cams. Even after the new owner performed a factory reset of the camera -- following Google's own instructions -- it was still possible for the original owner to access the camera feed.
The impact of data privacy on the healthcare industry
Healthcare companies are constantly consuming and sharing information to build better patient profiles and improve outcomes. Yet a new report reveals that only 70 percent are very or extremely confident in knowing exactly where their sensitive data is.
The study from data privacy specialist Integris shows that of these 50 percent update their inventory of personal data once a year or less, and a mere 17 percent of respondents are able to access sensitive data across five common data source types.
Facebook will pay you to gather information from you
That Facebook gathers personal information from its users should come as no surprise -- it could be argued that it is the social network's raison d' être. Following numerous privacy scandals, and the controversial (and since-closed) Research and Onavo programs, Facebook is now ready to be open about its data collection, and is even willing to pay people for this.
The new "Study from Facebook" app gives Facebook users the chance to volunteer to share information about their app usage -- and get paid for divulging this information. Sound good to you?
Microsoft takes down huge MS-Celeb-1M facial recognition database
Microsoft has deleted a database containing around 10 million photographs that was being used to train facial recognition systems.
Known as MS-Celeb-1M, the database was created in 2016, and originally contained photos of celebrities. Over time, however, images of writers, journalists and others crept in, and ultimately 100,000 individuals were to be found in it. Microsoft has not made much noise about the deleted content, but has said that the database was wiped as the person maintaining it was no longer a company employee.
Want someone's personal data? Give them a free donut
While you might expect Homer Simpson to hand over personal details in exchange for a donut, you wouldn't expect cybersecurity professionals to do the same.
However, technology services provider Probrand has carried out a study at a cyber expo attended by UK security professionals, where attendees voluntarily shared sensitive data including their name, date of birth and favourite football team -- all to get their hands on a free donut.
Secure contact center payment solution comes to the cloud
Contact center data security specialist Semafone is making its Cardprotect available as a cloud solution in the US for the first time.
Companies now have the choice of running Cardprotect on premise, as a managed appliance, in a hybrid could or fully cloud solution. The new, cloud version enables a much faster, more scalable, flexible and cost-effective deployment, as there is no need for contact centers to purchase or manage equipment.
64 percent of organizations believe they have suffered a breach due to privileged access
A global survey of over 1,000 IT security decision makers by privileged access management specialist BeyondTrust reveals that 64 percent believe they've had either a direct or indirect breach due to employee access in the last year, and 62 percent believe they've had a breach due to vendor access.
Employee behavior continues to be a challenge for a majority of organizations. Writing down passwords, for example, is cited as a problem by 60 percent of organizations, while colleagues telling each other passwords was also an issue for 58 percent of organizations in 2019.
Medical and financial details of 12 million Americans exposed in Quest Diagnostics data breach
Medical testing firm and clinical laboratory Quest Diagnostics has revealed that a data breach has led to the records of nearly 12 million of its customers being exposed. The data includes financial data, Social Security numbers and medical information.
Quest Diagnostics was itself not the target of hackers, but the American Medical Collection Agency (AMCA) was. The company is used by Optum360 for billing collections services, and Optum360 is used by Quest Diagnostics.
'Sign in with Apple' neatly balances privacy and convenience
At WWDC yesterday, Apple made numerous announcements and one of the more interesting was the company's new alternative to social sign-in buttons. Endless apps and website let you sign in with your Facebook, Twitter or Google account for the sake of convenience, but it comes at the cost of privacy -- which is precisely why Apple came up with "Sign in with Apple".
The basic idea is the same as existing social sign-in options -- it's a quick and easy way to sign into various services without the need to create a dedicated account. The difference is that "Sign in with Apple" protects your privacy and avoids the tracking of the current crop of alternatives.
Applying for a US visa? Prepare to hand over your social media account details
As announced a little over a year ago, US visa applicants should now expect to be asked for details of their social media accounts. Only certain types of diplomatic and official visa applications are exempt.
As of Friday, the US State Department started to use social media usernames, email addresses and phone numbers as part of its screening process. The use of "social media identifiers" for vetting purposes will apply to almost everyone applying for a US visa, raising all manner of privacy concerns.
Leaked: take a look at Cloudflare's free VPN, Warp
Cloudflare's 1.1.1.1 DNS switching tool has proved very popular with iOS and Android users looking to take control of their internet connections, and there was much excitement when the company announced that it would be releasing a free VPN tool called Warp.
At the moment, there is a lengthy waiting list for the free VPN (I'm number 278100 on the list, for instance) but we've been given a sneak peak at what to expect. Leaked screenshots show off the free VPN, and a video gives you an idea of the sort of performance you can expect.
New tool allows files to be encrypted and shared wherever they’re stored
One of the best ways of preventing sensitive files from falling into the wrong hands is to encrypt them, but the process of encrypting and decrypting can be a chore, especially if you want to share the information.
VPN service NordVPN is set to launch its own NordLocker security tool, designed to safeguard files whether they are stored locally or in the public cloud, and make them easy to share.
More than 70 percent of consumers fear becoming ID theft victims
The more the internet has become essential to our daily lives, the more people are waking up to the threats that it poses to their safety.
In a new study by F-Secure, 71 percent of respondents say they feel that they will become a victim of cybercrime or identity theft, while 73 percent express similar fears about their children.
Bittium announces the world's most secure smartphone: the Bittium Tough Mobile 2
In a world that is increasingly concerned about privacy and security, Bittium launches the Tough Mobile 2. Proudly billed as "the world's most secure smartphone" it takes a multilayered approach to security, combining both hardware and software solutions.
More than just secure, the Bittium Tough Mobile 2 -- as the use of the word "tough" would imply -- is also a rugged phone (although it does not proclaim to be the toughest phone in world). Designed and manufactured in Finland, the phone is aimed at professionals, and boasts "ultra secure communications without compromising usability".
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.