Flurry Analytics is a free tool that most app developers use to track user data – it’s so ubiquitous it can be found in 400,000 apps on 1.2 billion devices all over the world. On average, each device is running about 7-10 apps with Flurry, which means the company can collect as much as 3 terabytes of data each day.
According to the Pew Research Center, 86% of Americans are constantly trying to hide their online data from criminals, advertisers, or unwanted friends. In fact, the survey reveals that the government and law enforcement are not the highest avoidance priorities for most Americans. Take a look at this chart detailing who Americans are avoiding when online.
Popular calendar app, Sunrise, is the latest to be targeted by hackers who managed to access the app’s database provider, MongoHQ on October 27, 2013. Attackers were able to access customer data, but Sunrise is giving assurances to customers that the app’s industry standard encryption has kept customer data secured, including valuable credit card and banking information.
However, Sunrise sent an email to users on Saturday evening detailing the breach and advising users to change their iCloud password, which was used to sync the app’s new iOS7 calendar feature. Read more
In a startling and ironic introduction to Cyber Security Awareness Month, design software company Adobe admitted its servers were breached by hackers who accessed usernames, passwords, and financial information from nearly 3 million customers. The breach occurred in August, but the company was not aware of the hack until mid-September when security researcher and journalist Brian Krebs noticed Adobe’s source code on servers used for previous hacking attempts.
While the Federal Government shuttered its doors, the California State Legislature quickly passed a law banning “revenge porn,” a misdemeanor with a penalty of up to six months and a $1000 fine. The law is intended to protect individuals from the humiliation of intimate photos being distributed online without prior consent.
The new law defined Revenge Porn as:
Any person who photographs or records by any means the image of the intimate body part or parts of another identifiable person, under circumstances where the parties agree or understand that the image shall remain private, and the person subsequently distributes the image taken, with the intent to cause serious emotional distress, and the depicted person suffers serious emotional distress. Read more
A secret surveillance court in the U.S. has ruled that U.S. government’s collection of telephone data is lawful, despite concerns that the practice violated Fourth Amendment rights.
U.S. Foreign Intelligence Court Judge Claire Eagen ruled in favor of allowing U.S. intelligence agencies to access the mobile metadata of citizens in large volumes directly from providers, in a judgement made public on Tuesday, and dated August 29.
The Court ruled that under the Patriot Act, the procedure was legal. Here is more from the court filing: “The Court found that under the terms of Section 215 and under operations of the canons of statutory construction such Orders were lawful and required, and the requested Orders were therefore issued.”
Not only can the NSA read your emails and track your web searches, the security agency can also access almost all of the data that you have stored on your phone.
According to the latest revelations in the scandal, the government agency can access things like your contacts, your call lists, your text messages and your location. And they are able to do it across a number of different mobile devices.
Fox News has more:
The U.S. National Security Agency is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users’ data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel. The magazine cited internal documents from the NSA and its British counterpart GCHQ in which the agencies describe setting up dedicated teams for each type of phone as part of their effort to gather intelligence on potential threats such as terrorists.
Eighty-six percent of Internet users have taken steps to cover up or remove their online browsing habits, according to a new report from Pew Research called “Anonymity, Privacy, and Security Online.”
The report analyzed consumer Internet behavior and found that 55 percent of Internet users said that they had taken steps to avoid observation by companies, people or the government. Even so, 59 percent of Internet users don’t think that it’s possible to be truly anonymous online.
The report also discovered that 21 percent of Internet users have had an email or social networking profile compromised. In addition, 13 percent of Internet users have had relationship troubles with friends and family based on something that a user posted online.
The report also revealed that 12 percent of Internet users have been stalked online and 11 percent have had important personal information such as their social security number or credit card number stolen from someone online. (Via PC World).
Iran-born Dutch filmmaker Bahram Sadeghi has prank called the NSA asking them for help finding an important email that he has deleted. The NSA agent on the line refers him to call his own email provider, but still asks to take down his contact information.
He explains that he an Iranian filmmaker with lots of friends in the media and travels a lot, which probably means that the NSA is storing his data.
We’ve embedded the video above for you to check out.