Cybersecurity graphic

Ring Rolls Out End-To-End Encryption For Surveillance Footage

Ring has gotten negative press coverage recently for accessing customers’ Ring camera footage. Now they’re implementing end-to-end encryption. End-to-end encryption has become known as a far more sound alternative to conventional encryption. This is because conventional back-doored encryption enables the service provider to access your data whether customers like it or not. End-to-end encryption provides…

Eye on computer chip

Apple Blocks Apps From Circumventing Customers’ Anti-Tracking Settings

Apple has reportedly caught some app vendors trying to circumvent customers’ anti-tracking settings via a tracking system called CAID. Apple blocked updates that implemented CAID. CAID is an system that allows participating app vendors to track users’ activity across apps, even if they declined permission to be tracked on their iPhones. It was introduced by…

Mercedes-Benz Breach Exposes SSNs, Credit Card Numbers, And Birth Dates

A Mercedes-Benz data breach exposed sensitive information owned by their customers. 1.6 million customer records were audited and the breach was found to affect fewer than 1,000 customers. The information in the breach included drivers license numbers, social security numbers, self-reported customer credit scores, credit card numbers, and dates of birth. The German automaker disclosed…

Smartphone with a lock and key on it

Phone Numbers Need To Be Phased Out

Telephones were invented more than a century ago, before the Internet existed. They provided a quick and easy way to communicate with friends, family, and acquaintances in a somewhat affordable manner. As high-speed, unmetered Internet connections become more ubiquitous, they have resulted in the mainstream adoption of calling and instant messaging services that vastly outperform…

Super Mario Run being played on an iPhone 7

iOS Should Have A Permissions Screen

Apple has been leading the pack on user privacy for smartphones and tablets for years, and App Tracking Transparency (ATT) in iOS 14.5 is one of the most prominent examples of that so far. Despite offering a significantly higher security and privacy standard than Android, iOS users would still benefit from having a permissions screen.…

eufy security camera

eufy Camera Feeds Leaked To Strangers

Users of eufy smart home cameras (eufyCams) have been seeing the camera feeds of strangers, even in other countries. The controls of affected cameras are also accessible. eufyCams allow users to access their camera feeds anywhere in the world over the Internet. This feature (in any brand of camera) obviously poses a privacy and security…

Two iPhones

Apple Will Ban Apps That Force Users To Enable Tracking

Apple has released iOS 14.5, and one of its most significant features is App Tracking Transparency (ATT). ATT requires app vendors to ask users for permission before tracking their activity across multiple apps. This mirrors efforts in many countries to pass laws requiring consent for data collection. However, such laws have been circumvented by telling…