Security   524972

« earlier    

Secret Pass » Linux Magazine
Pass is a simple shell script that helps you manage and synchronize passwords using Git.
passwords  linux  tools  security  git 
3 hours ago by po
How to Stop Apps From Tracking Your Location - The New York Times
Hundreds of apps can follow your movements and share the details with advertisers, retailers and even hedge funds. Here’s how to limit the snooping.
At least 75 companies receive people’s precise location data from hundreds of apps whose users enable location services for benefits such as weather alerts, The New York Times found. The companies use, store or sell the information to help advertisers, investment firms and others.
You can head off much of the tracking on your own device by spending a few minutes changing settings. The information below applies primarily to people in the United States.
apps  tracking  location_services  privacy  sharing  security  advertising  nytimes  ios 
4 hours ago by rgl7194
Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret - The New York Times
Dozens of companies use smartphone locations to help advertisers and even hedge funds. They say it’s anonymous, but the data shows how personal it is.
The millions of dots on the map trace highways, side streets and bike trails — each one following the path of an anonymous cellphone user.
One path tracks someone from a home outside Newark to a nearby Planned Parenthood, remaining there for more than an hour. Another represents a person who travels with the mayor of New York during the day and returns to Long Island at night.
Yet another leaves a house in upstate New York at 7 a.m. and travels to a middle school 14 miles away, staying until late afternoon each school day. Only one person makes that trip: Lisa Magrin, a 46-year-old math teacher. Her smartphone goes with her.
apps  tracking  location_services  privacy  sharing  security  advertising  nytimes  ios 
4 hours ago by rgl7194
An In-Depth Guide to Personal Cybersecurity – Nick Rosener – Medium
I spent a day this week on an annual overhaul of my digital security. Several friends and colleagues were interested in a guide to doing the same; so I thought I would write one up and share with all of you: my closest internet friends.
security  netnarr 
4 hours ago by cogdog
Lenovo tells Asia-Pacific staff: Work lappy with your unencrypted data on it has been nicked • The Register
Paul Kunert:
<p>A corporate-issued laptop lifted from a Lenovo employee in Singapore contained a cornucopia of unencrypted payroll data on staff based in the Asia Pacific region, The Register can exclusively reveal.

Details of the massive screw-up reached us from Lenovo staffers, who are simply bewildered at the monumental mistake. Lenovo has sent letters of shame to its employees confessing the security snafu.

"We are writing to notify you that Lenovo has learned that one of our Singapore employees recently had the work laptop stolen on 10 September 2018," the letter from Lenovo HR and IT Security, dated 21 November, stated.

"Unfortunately, this laptop contained payroll information, including employee name, monthly salary amounts and bank account numbers for Asia Pacific employees and was not encrypted."

Lenovo employs more than 54,000 staff worldwide, the bulk of whom are in China.

The letter stated there is currently "no indication" that the sensitive employee data has been "used or compromised", and Lenovo said it is working with local police to "recover the stolen device".</p>
lenovo  hacking  security 
5 hours ago by charlesarthur

« earlier    

related tags

(2017/2018)  1password  1st  2018  2nd  adilabdalmahdi  advertising  amazon  analytics  android  anonymous:  api  app  apple  apps  appsec  archive  army  arstechnica  article  asayesh  asia  athena  australia  auth  aws  azurekeyvault  azuremanagedserviceidentity  becoming  beyondcorp  bigquery  books  bots  bug  business  cd  certificates  chat  chatbot  chatbots  china  chip  ci  cli  cloudflare  cloudtrail  compliance  confluence  continuousintegration  crypto  cryptography  csp  csrf  data-dealer  data  database  developer  development  devops  digisec  digitalocean  django  dns  elasticsearch  encryption  exploit  extension  fail  firefox  friends  gadgets  git  google  google_home  guide  hack  hacking  hardware  header  headers  history  homelab  http  information_security  infosec  intel  interconnected.devices  internet.of.shit  internet  ios  iot  iphone  java  jira  jk-cloud  jk-engineer  jk-homenetwork  jk-virtual  jk-vm  json  krg  law  lenovo  license  linux  live-update-of-code  location  location_services  mac  mailing_list  management  maximum  mesh.networking  messaging  messenger  microsoft  mobile  mod  monitoring  mozilla  music  netnarr  netpolicynotes  networking  newsletter  nexpose  nginx  nytimes  office365  online  opensource  osint  ovum  pass  password  passwords  pc  pentest  pgp  pki  privacy  python  ragtag  rails  rapid7  readlater  recon  restapinotes  rubbish  safety  scanner  secrets  secretsmanagement  security  server  serverless  setup  shame  sharing  signalapp  social  ssh  ssl  sso  ssrf  sulaymaniyah  supermicro  supply_chain  surveillance  sysadmin  sysdig  technology  telegram  tips  tls  to  tokens  tools  tracking  tutorial  ubuntu  unix  usa  usb  vpn  vulnerability  watermarks  web  webadmin  webdev  windows  write-up  xml  xxe  zdenek_nemec 

Copy this bookmark: