6 private links
Try these 4 advanced facebook ad strategies to target people (not cookies) and reach the exact target audience you want.
A Guide to Reasoning About Unintuitive Machine-Learning Problems
Google will comply with Europe’s demands to change the way it runs its shopping search service, a rare instance of the internet giant bowing to regulatory pressure to avoid more fines.
Cybersecurity expert Bruce Schneier, a fellow with the Berkman Klein Center for Internet & Society, discusses what consumers can do to protect themselves from government and corporate surveillance.
Our team of Positive Technologies researchers has delved deep into the internal architecture of Intel Management Engine (ME) 11, reveali...
Blog about anti-virus software and its issues.
The AccuWeather application for iOS requests location access under the premise of providing users localized severe weather alerts, critical…
A security researcher has found that the popular weather app sends private location data without the user's explicit permission to a firm designed to monetize user locations.
...still thinking of a genius subtitle, but I break things.
DID you know that Google has been recording you without your knowledge?
In order to clearly highlight risk to the user, starting this month in Firefox 51 web pages which collect passwords but don’t use HTTPS will display a grey lock icon with a red strike-through in the address bar.
To help users browse the web safely, Chrome indicates connection security with an icon in the address bar. Historically, Chrome has not explicitly labelled HTTP connections as non-secure. Beginning in January 2017 (Chrome 56), we’ll mark HTTP pages that collect passwords or credit cards as non-secure, as part of a long-term plan to mark all HTTP sites as non-secure.
In January, we began our quest to improve how Chrome communicates the connection security of HTTP pages. Chrome now marks HTTP pages as “Not secure” if they have password or credit card fields. Beginning in October 2017, Chrome will show the “Not secure” warning in two additional situations: when users enter data on an HTTP page, and on all HTTP pages visited in Incognito mode.
The purpose of Instart Logic technology is to disguise 3rd-party requests as 1st-party requests, thus bypassing content blockers, and even the ability of browsers to block 3rd-party cookies (because they are stored as 1st-party cookies)
Note: The extension is useful only for Chromium-based browsers. There is no need for such an extension so far on Firefox, and thus there is no version for Firefox.
As part of the Tor uplift project, we are going to implement anti-fingerprinting protection [1] in Firefox.
This bug is used as the meta bug of all anti-fingerprinting features.
Reference:
[1] Cross-Origin Fingerprinting Unlinkability
https://www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability