Your phone’s secret network activity: 10 times worse than DNS logs reveal | Cybernews

Many data brokers may use that data for behavior profiling, analytics, and advertising, and it may also be sold to third parties. Commercial spyware, such as Pegasus, used to track journalists, political dissidents, and others, could be delivered via ad networks or other legitimate infrastructure your apps rely on.

VPNs Aren’t Bulletproof: 7 Common Misunderstandings About VPN Security

First, both the website and your ISP probably know that you’re using a VPN, and they also know the time and session length of your visit. Second, your actual activity on those sites can easily reveal your identity, since there are cookies on your local system, and if you log in to any accounts then obviously the target site knows who you are.

Microsoft is reworking Recall after researchers point out its security problems | Ars Technica

Microsoft has announced that it’s making some substantial changes to Recall ahead of its release on the first wave of Copilot+ PCs later this month.

How to disable Windows Recall | Windows Central

The feature works by taking snapshots of your screen every few seconds and storing them locally on your hard drive.

Rural hospitals are particularly vulnerable to ransomware, report finds | CyberScoop

The threat facing U.S. health care systems is no longer theoretical, with several important health care providers getting hit by ransomware attacks in recent months. 

Nintendo Life: Google Employee Reportedly Tied To Multiple Nintendo Leaks

The database, which contains incidents from 2013-2018, reportedly details a case in which a Google employee had accessed several private Nintendo videos and leaked the contents of them online. According to 404 Media, an internal investigation into the report concluded that the activity was “non-intentional”.

To Share or Not to Share: How Elite Runners Manage Their Strava Profiles

Strava can be a useful tool for athletes, but we must be careful about what is shared and be aware of who might see your data. https://run.outsideonline.com/gear/running-tech/to-share-or-not-to-share-how-elite-runners-manage-their-strava-profiles/

Hackers Can Abuse Apple’s Wi-Fi Positioning System

A recent study by security researchers has revealed a major privacy vulnerability in Apple’s Wi-Fi Positioning System (WPS) that allows hackers to track the locations of Wi-Fi access points and their owners globally.

An Apple bug restored users’ old deleted photos. If they were deleted, how did they come back?

Deleted photos aren’t when it comes to iOS, a problem exposed by a bug which resulted in photos being restored after users deleted them. Worse, this reportedly has happened on…

Connected cars’ illegal data collection and use now on FTC’s “radar” | Ars Technica

The Federal Trade Commission’s Office of Technology has issued a warning to automakers that sell connected cars. Companies that offer such products “do not have the free license to monetize people’s information beyond purposes needed to provide their requested product or service,” it wrote in a blog post on Tuesday. Just because executives and investors want recurring revenue streams, that does not “outweigh the need for meaningful privacy safeguards,” the FTC wrote