PINDROP BLOG

Category: Privacy

November 11, 2016
Yahoo Data Breach May Have Been Identified in 2014
Some Yahoo employees were aware that the company had been compromised as far back as 2014, even though Yahoo officials only disclosed the breach affecting 500 million users two months ago, the company said in a regulatory filing. The company also said that on Monday, law enforcement officials informed Yahoo that a hacker had come…
Read More →
November 8, 2016
Audit of Signal Protocol Finds it Secure and Trustworthy
A group of academic security researchers has reviewed the security of the Signal protocol, which is used in the Signal encrypted messaging app as well as in many third-party apps, and found that it is both secure and resistant to attack. The review, conducted by researchers from universities in the U.K., Canada, and Australia, looked at…
Read More →
November 7, 2016
Android Patch Released to Stop Ultrasonic Tracking
The researchers who exposed the ways in which ultrasonic signals can be used to track users across devices have released a patch for Android that helps users protect themselves against the silent tracking. The patch is designed to give users more control of which apps on their devices have access to the ultrasonic spectrum, which…
Read More →
November 4, 2016
More Than Half of All Pages on Chrome Loaded Over HTTPS
After years of encouraging site owners to transition to HTTPS by default, Google officials say that the effort has begun to pay off. The company’s data now shows that more than half of all pages loaded by Chrome on desktop platforms are served over HTTPS. Google has been among the louder advocates for the increased…
Read More →
October 31, 2016
Silently Tracking Users With Ultrasonic Beacons
As consumers have begun using ad blockers in greater numbers, skipping TV ads with DVRs, and generally looking for any possible way to avoid advertising, technology providers and marketers have been trying to find new methods to get their messages in front of potential buyers. One of the newer methods uses ultrasonic signals in ads…
Read More →
October 28, 2016
Congress Pushes Justice Department for Data on Government Hacking
A group of more than 20 members of Congress from both parties is asking the Department of Justice for details about how the government plans to use expanded lawful hacking authority that would come online in December if a proposed change goes into effect. The letter raises a number of questions about the way that changes…
Read More →
October 27, 2016
FCC Rule Forces Opt-In For Broadband Providers to Share User Data
The FCC has voted to enact a new rule that will force broadband companies to get consent from customers before they sell information about those customers’ online movements, history, and other actions. The new rule will require broadband companies to have customers opt in to the sale or sharing of their online histories as part of marketing…
Read More →
October 20, 2016
Mozilla to Ship TLS 1.3 in Firefox 52
Mozilla plans to implement the next version of the TLS specification in an upcoming release of its Mozilla browser. TLS 1.3 will be shipped in Firefox 52, which is scheduled for release in March 2017. Mozilla’s Martin Thomson said in an email to the Mozilla development group Wednesday that the company will include TLS 1.3…
Read More →
October 20, 2016
Yahoo Asks Government to Clarify Whether it Ordered Email Scanning
In an odd twist to an already odd story, Yahoo officials have asked the Director of National Intelligence to confirm whether the federal government ordered the company to scan users’ emails for specific terms last year and if so, to declassify the order. The letter is the result of news reports earlier this month that detailed…
Read More →
October 19, 2016
Recording Keystroke Sounds Over Skype to Steal User Data
Researchers have known for a long time that acoustic signals from keyboards can be intercepted and used to spy on users, but those attacks rely on grabbing the electronic emanation from the keyboard. New research from the University of California Irvine shows that an attacker, who has not compromised a target’s PC, can record the acoustic…
Read More →