Remove Data collection Remove Education Remove Surveillance
article thumbnail

FTC finds social media and video streaming services engaged in vast surveillance of consumers

Malwarebytes

The conclusions seemed to upset the FTC, but we weren’t even mildly surprised: “The amount of data collected by large tech companies is simply staggering. Predicting, shaping, and monetizing human behavior through commercial surveillance is extremely profitable.”

article thumbnail

Judging Facebook's Privacy Shift

Schneier on Security

And if you read his 3,000-word post carefully, Zuckerberg says nothing about changing Facebook's surveillance capitalism business model. It even collects what it calls " shadow profiles " -- data about you even if you're not a Facebook user. Better use of Facebook data to prevent violence.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Apple users show strong support for Tim Cook’s privacy war against Mark Zuckerberger

The Last Watchdog

Shoshana Zuboff lays out how and why control of online privacy has become a linchpin to the current state of wealth distribution in her 2019 New York Times Book of the Year, The Age of Surveillance Capitalism: The Fight for A Human Future At the New Frontier of Power. It’s critical that they openly discuss these fundamental consumer rights.”.

article thumbnail

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Zero Day

When extramarital affairs website Ashley Madison experienced a  data breach in 2015 , some users were contacted by cybercriminals threatening to tell their partners, friends, and colleagues about their activities unless they were paid. What happens when an attacker is inside a network?

Passwords 106
article thumbnail

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Zero Day

When extramarital affairs website Ashley Madison experienced a  data breach in 2015 , some users were contacted by cybercriminals threatening to tell their partners, friends, and colleagues about their activities unless they were paid. What happens when an attacker is inside a network?

Passwords 101
article thumbnail

IVPN review: This VPN takes privacy to the next level

Zero Day

I went through the report, which mostly showed that they haven't handed over any user data despite getting several orders to do so.    Even if data collection is your primary concern, IVPN operates a clean zero-logs policy.

VPN 59
article thumbnail

What Is Industrial Control System (ICS) Cyber Security?

eSecurity Planet

They communicate with the central control system, allowing data collection and remote control over long distances. These networks enable data exchange between PLCs, RTUs, SCADA systems, and HMIs. Cybersecurity awareness training: Educate employees about cybersecurity risks and teach them how to spot potential threats.

Firmware 110