When customers originally signed up for 23andMe, they agreed to terms and conditions and a privacy notice that allows the company to use their information for research and development as well as share their data, in aggregate, with third parties. If consumers consented to additional research, which the vast majority did, the company can additionally share their individual information with third parties. 23andMe has also been clear that if it is involved in a bankruptcy or sale of assets, consumer information might be sold or transferred.
Category: Safety
As 23andMe goes bankrupt, millions of people’s DNA data is up for sale
“Folks have absolutely no say in where their data is going to go,” said Tazin Khan, CEO of the nonprofit Cyber Collective, which advocates for privacy rights and cybersecurity for marginalized people.
Police remove skimmer from Piggly-Wiggly on Battle Street | News | annistonstar.com
A skimmer is an electronic device that is used to steal credit or debit card information, including PIN numbers, while the victim is making a legitimate transaction.
‘This happens frequently,’ AARP Alabama warns of Venmo, Cash App scams
Scammers are using payments apps, like Venmo and Cash App, to swipe innocent people’s money. AARP Alabama says there are multiple mobile payment scams going around right now, and one scam takes place directly in your app.
How to Identify and Protect Against Phishing Attacks
Data brokers collect your personal information from various sources and compile detailed profiles. That’s why cybercriminals love data brokers. They hoard your info from everywhere: public records (voter rolls, property ownership), online stuff (browsing history, social media profiles, newsletter signups), and even commercial sources (loyalty programs, purchases). This intel helps them craft compelling and realistic phishing scams or impersonate you or trusted sources to steal private info or money.
Are you ready to trust your next ride to a robot chauffeur? | Fox News
Scientists at the University of Tokyo, led by Dr. Kento Kawaharazuka, have taken a novel approach to this problem. Instead of creating a fully autonomous vehicle, they’ve developed a robot that can drive a regular car.
How to stay safe from cybercriminal “quishing” attacks | TechRadar
Phishing works so well because it relies on hacking the human psyche. We want to trust the stories we’re told – especially if they’re told by ostensibly trustworthy organizations or individuals. This is an admirable, but highly exploitable, trait. As technologies evolve, threat actors are continually refining the methods they use to take advantage of trusting end-users.
FTC study finds ‘dark patterns’ used by a majority of subscription apps and websites | TechCrunch
Forced action means requiring the consumer to take some sort of step to access specific functionality, like filling out their payment details to participate in a free trial — something that 66.4% of the websites and apps in the study had required.