Remove Consumer Protection Remove Data collection Remove Mobile
article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

Unfortunately, many organizations will still prioritize secrecy over consumer protection in a bid to hush up incidents and protect their reputations. In this world, data is cheap and unnecessarily collected in bulk by companies that don't protect it effectively or govern themselves in data collection practices well.

Passwords 101
article thumbnail

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Zero Day

Unfortunately, many organizations will still prioritize secrecy over consumer protection in a bid to hush up incidents and protect their reputations. In this world, data is cheap and unnecessarily collected in bulk by companies that don't protect it effectively or govern themselves in data collection practices well.

Passwords 106
article thumbnail

GUEST ESSAY: A primer on the degrees of privacy tech companies assign to your digital footprints

The Last Watchdog

Data collection red flags. All of this leads us to “third-party” data. Third-party data is generally implicitly collected, used and shared from an external party across sites. A third-party system could use a combination of a remotely hosted tracker and third-party cookies for web or MAIDs (mobile ad identifiers).

eCommerce 113