The malicious apps, which pose as tools for either managing or boosting Instagram follower numbers, are actually designed to phish for Instagram credentials. The stolen credentials allow hackers to abuse compromised accounts in order to distribute spam and ads, enriching crooks in the process.
Altogether the malicious apps have been installed by up to 1.5 million users, software security firm ESET reports.
The applications have been removed from the Play Store.
You know what the Echo is not? Your wife. I don’t care how sexy the Echo voice is, you have no marital privilege with it. Your expectation of privacy when telling Echo to unlock the murder room should be no more than your expectation of privacy when writing down “I’ma kill that fool” in your diary.
I am cautious about who wants to collect all my data on the inner webs, but I realize I must deal with them in today’s world. The alternative is to cut your shoes off, learn to play the flute, and live in a tree.
Spangenberg, who was hired by Uber in March 2015 as a forensic investigator, goes on to say, “Uber collected data regarding every ride a user requested, their username, the location the ride was requested from, the amount they paid, the device used to request the ride, the name and email of the customer, and a myriad of other data that the user may or may not know they were even providing Uber by requesting a ride.”
And that’s just for starts.
Uber, natch, is shocked! just shocked! that anyone would think there is gambling in their establishment . . . .
Writing at The Observer, Evgeny Morozov explores self-serving double standards of tech titans who would have you run naked through the internet while, secluded behind high walls with turrets and towers, they watch you cavort.
Here’s just a couple of examples; follow the link for much, much more.
They are digital carrion crows; under cover of providing a “service,” they pluck the bodies of their users and sell them for profit.*
In their world, openness is for others, a commodity to mined and traded.
*As the regards the “services” they provide, I would argue that Google’s search is far more valuable and useful to those who use it–it is an actual “service”–than, say, Facebook’s or Instagram’s nattering nurseries of narcissism.
Whether the charges are true or not, Facebook is a private company entitled to dish out the news as it chooses. What disturbs me more is that a not-very-skeptical public is more and more willing to submit to a single source for news.
Her comments about Facebook as a “single source of news” apply doubly to Fox News as a single source of news. If it is true that Facebook from time to time has tilted the news–and I have no basis for even guessing, as I avoid Facebook whenever possible and wouldn’t consider it a source of news in any event–Fox routinely upends the news.
Follow the link for more.
*The true problem facing the right is that, if coverage is unbiased, the facts lean left.
Mark Leigh, 54, of Failsworth, said his two bicycles – worth £500 ($750) and £1,000 ($1,500) – were nicked shortly after he made his address and details of his bikes public on the popular biking app Strava, the Manchester Evening News reports.
The app includes an optional privacy setting that conceals the exact location of your home, but Leigh was not aware of this switch when he shared details of his bike rides via the software.
There’s a reason I keep the GPS in my cell phone turned off. Putting aside outlying possibilities such as the above, it’s nobody’s business which grocery stores I use.
In other words, when a student logs into their educational account, and then uses Google News to create a report on current events, or researches history using Google Books, or has a geography lesson using Google Maps, or watches a science video on YouTube, Google tracks that activity and feeds it into an ad profile attached to the student’s educational account—even though Google knows that the person using that account is a student, and the account was created for educational purposes.
The whole thing is worth a read, especially if you care about companies stripping you nekkid on the interwebs.
. . . US security researcher Matt Jakubowski discovered that when connected to Wi-Fi the doll was vulnerable to hacking, allowing him easy access to the doll’s system information, account information, stored audio files and direct access to the microphone.
Play it safe. Give your kid a Raggedy-Ann, not a Mata Hari Barbie.
The feature is being tested on Australian users first, with iOS to arrive by the end of the week, and if they don’t grab pitchforks and torches, The Social NetworkTM threatens promises to take it to the US soon.
The pic-scanning isn’t restricted to photos you’ve already uploaded to Facebook – the app scans your phone’s photo collection for new images, and will raise a dialogue asking if you want to post it to your friends.