Skip to main content

Privacy

See All Stories

Privacy is a growing concern in today’s world. Follow along with all our coverage related to privacy, security, what Apple and other companies are doing to keep your information safe, and what steps you can take to keep your information private.

iPhone Lockdown Mode can be easily detected, could make you a target

iPhone Lockdown Mode

iPhone Lockdown Mode is an extreme form of security designed to protect people who might find themselves targets of state-sponsored spyware, like Pegasus. However, a privacy activist says it also makes it easy for a website to detect when someone is using it – and has demonstrated this.

So what is designed to be protection against rogue governments could actually end up helping them identify people who may be of interest …

Expand Expanding Close

DuckDuckGo email privacy service now available to all

DuckDuckGo email promo image

A DuckDuckGo Email Protection service was last year launched as a limited beta, with a waiting list for those wanting to use it. The waitlist is now gone, and anyone can get access to it right away.

The privacy-focused email forwarding service strips out trackers, and offers the ability to create disposable email addresses, all without changing your email provider – similar to Apple’s Hide My Email feature …

Expand Expanding Close

Here’s how much less data Apple collects from you than Google and other companies

apple app tracking transparency

Apple’s known for its push for privacy by stating this is a “fundamental human right.” Different from most Big Tech companies, Apple says it’s not a company driven by ads, which means it doesn’t need to collect your data to sell products. Now, a new study shows that, in fact, Apple is the company that collects less data compared to other companies.

Expand Expanding Close

Twitter investigation instigated by Senate following claims by former head of security

Site default logo image

A Twitter investigation has been announced by the Senate Judiciary Committee, following claims of “extreme” security failings at the social network. The claims were made in an 84-page report by the company’s former head of security, Peiter Zatko.

Concerns have been expressed about the national security risks of bad actors being able to fake tweets from the accounts of world leaders and major media organizations …

Expand Expanding Close

Former Twitter security head says company’s systems have ‘extreme, egregious deficiencies’

Site default logo image

Update: Elon Musk’s lawyers have now issued a subpoena to speak to Zatko about the claims.

Former Twitter security head Peiter Zatko has filed a formal complaint that the company has “extreme, egregious deficiencies” in its protections against hackers, and has done little to defeat spam.

He accuses the company of deceiving the Federal Trade Commission (FTC), following promises made back in 2011 after hackers twice took full control of Twitter …

Expand Expanding Close

Apple’s CSAM approach is the right one, says British government, as it attacks Facebook

Apple's CSAM approach | Pile of photos on a table

The British government has backed a call by the country’s security services for client-side scanning for child sexual abuse material – aka Apple’s CSAM approach.

Home Secretary Priti Patel has written an op-ed in which she indicates government support for the stance, while also attacking Facebook’s plans to make all Messenger chats end-to-end encrypted by default …

Expand Expanding Close

In-app browsers like those in Facebook and Instagram are a big privacy risk, developer shows

in-app browsers | Facebook app on an iPhone screen

One of the more annoying things some apps do is incorporate their own in-app browser, opening that for web links instead of respecting your chosen default browser.

This has long been a nuisance, but a developer has now explained the security risks of doing so, especially when dealing with companies not noted for their privacy standards – like Facebook

Expand Expanding Close

Twitter belatedly confirms data breach which exposed contact details for 5.4M accounts [U]

Twitter data breach | Twitter logo on ones and zeroes like code

Update: Twitter has rather belatedly confirmed that a hacker was able to expose the account details, though the company has not commented on the 5.4M number. See statement at the end of the piece.

A Twitter data breach has allowed an attacker to get access to the contact details of 5.4M accounts. Twitter has confirmed the security vulnerability which allowed the data to be extracted.

The data – which ties Twitter handles to phone numbers and email addresses – has been offered for sale on a hacking forum, for $30,000 …

Expand Expanding Close

Ad tracking rules could become much stricter in Europe; Apple’s ATT vindicated

apple app tracking transparency

A European court ruling could result in ad tracking rules becoming much stricter in future. The court essentially set a precedent that inferred data is still personal data.

This means that if a company can work out things about you, then that information is protected every bit as much as personal data you provided directly …

Expand Expanding Close

Congress wants further crackdown on spyware makers like NSO, after earlier import ban

Spyware makers | Man in darkened room using MacBook

Congress is set to vote on The Intelligence Authorization Act, intended to further punish spyware makers like NSO. It follows evidence that the company’s Pegasus spyware was used to hack iPhones used by American diplomats.

The Commerce Department had already named NSO as a threat to US national security, and banned the import and use of Pegasus, but the bill would take things further …

Expand Expanding Close

Carrier location data usage again under investigation, after promises broken

Carrier location data | Satellite photo of New York City

The Federal Communications Commission (FCC) is again investigating the collection and use of carrier location data – the information mobile networks have about where your mobile devices are, as well as your movement patterns.

It follows a previous investigation which last year found that wireless carriers broke federal law by selling this private data to a number of third-party companies …

Expand Expanding Close

CloudMensis spyware is being actively used in the wild to steal private data from Macs

Site default logo image

A nasty piece of Mac malware is being actively used in the wild to capture personal data from Macs. Security researchers say that CloudMensis spyware can allow an attacker to download files, capture keystrokes, take screengrabs, and more.

Cybersecurity firm ESET says that the spyware has been in active use since February, and appears to be targeting specific individuals …

Expand Expanding Close

Latest Pegasus iPhone hack: Apple warned pro-democracy protestors in Thailand

Pegasus iPhone hack | Protestors and police on the streets

The latest Pegasus iPhone hack to come to light targeted more than 30 pro-democracy protestors. Apple detected that their phones had been infected by NSO’s spyware, and alerted them.

Thailand has been the subject of multiple military coups over the years, the most recent of which was in 2014, with an army-backed leader still in power today after elections widely believed to have been fraudulent …

Expand Expanding Close

CSAM law could force all encrypted messaging services to use Apple-style client-side scanning [U: Delayed]

Site default logo image

Update: The vote on the bill is now expected to be delayed until the fall – see end for more details.

A proposed new CSAM law in the UK could force all messaging companies to use the type of client-side scanning approach that Apple planned to launch to detect child sexual abuse material (CSAM) on iPhones.

An amendment to the Online Safety Bill has been put forward that would require tech companies to identify and remove CSAM, even in end-to-end encrypted private messages …

Expand Expanding Close