By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy

Web browser company Brave said on Wednesday that it learned how Google works around GDPR (the EU's data privacy regulation) to help its advertising partners identify European web users. According to the company, which offers its own privacy-focused web browser, Google uses Push Pages that contain unique identifiers to share information with its partners. Those pages appear to be made specifically for identifying web users; they have no other function. This isn't the first time Brave leveled allegations of GDPR violations against Google. The company told the UK Information Commissioner and Irish Data Protection Commission (DPC) in September 2018 that Google's advertising systems were a "massive and ongoing data breach that affects virtually every user on the web." The revelation of these Push Pages is supposed to help support those claims. Brave said the Push Pages rely on a "code of almost 2,000 characters, which Google adds at the end to uniquely identify the person that Google is sharing information about" and which can be used in conjunction with other identifiers, like browser cookies. This makes it easier for Google's partners to connect data about website visitors even if they aren't technically being given their real identity. The Push Pages don't appear to serve any other purpose. Brave said they're never visible to users, and even if someone enters their URL to visit them directly, they don't show any content. (Which implies that Google only intends for them to communicate with other background processes of which web users are probably unaware.) Visit OUR FORUM for more of Google's response to these allegations.

Malware is an unwanted code that somehow made its way onto your computer in order to perform functions designed with malicious intent. Sometimes these programs slow down a machine or cause it to crash entirely. The creators may then demand a ransom in order to fix the machine. Sometimes malware uploads information to remote servers, giving someone access to your saved data or vital credentials that you type, such as passwords and credit card numbers. People tend to create malware for Windows because that’s the operating system found on the most PCs. This increases the odds that a virus will spread from one computer to another. Virus makers tend to target less technical users that are easier to fool with bogus web banners and phishing scams. Viruses also spread among people who know how to pirate music and TV shows but don’t understand how these files may be infected. There are antivirus programs for Linux, but even their purpose is often to help protect Windows users. One piece of malware has recently made news for targeting the Linux desktop. EvilGNOME runs on the GNOME desktop environment by pretending to be an extension. GNOME is the most common Linux desktop environment, found as the default interface on two of the most popular Linux distros, Ubuntu and Fedora, and on computers that ship directly from Linux manufacturers such as System76 and Purism. Legitimate extensions allow you to alter many aspects of the GNOME desktop. The malware known as EvilGNOME is able to take screenshots and record audio from your PC’s microphone. It can also upload your personal files. A more detailed breakdown is available in a report by Intezer Labs, who gave EvilGNOME its name. This malware didn’t attract attention for being particularly likely to impact large numbers of people. It was considered newsworthy because it existed at all. Linux is relatively rare on desktops, but it’s the most prominent operating system found on servers powering the web and managing much of the world’s digital infrastructure. Follow this thread on OUR FORUM.

Hundreds of millions of phone numbers linked to Facebook accounts were left exposed on an unprotected server in the latest massive security breach to plague the embattled tech giant. Up to 419 million phone numbers were stored on a database housed on multiple servers including the numbers of an estimated 133 million US-based users alone. The revelation comes just weeks after Facebook was slapped with a record $5 billion fine by the US Federal Trade Commission for violating users’ privacy rights.
Each phone record was tied to a user’s unique Facebook ID (a long, public number associated with the account), which can then quickly and easily be used to ascertain yet more personal information such as a user’s name, gender and location by country.
This, in turn, can expose users to spam calls and allow hackers to launch SIM-swapping attacks whereby cell phone carriers are tricked into providing a target’s phone number to an attacker. The unscrupulous hacker can then force-reset the password on any online account registered with that number.
This particular method of attack was used against none other than Twitter CEO Jack Dorsey, whose own Twitter account was hijacked. The company announced on Wednesday that it was temporarily disabling the text-to-tweet function due to “vulnerabilities that need to be addressed by mobile carriers.”