This live London Underground train map shows the power of open data

Keep track of every London Underground train as they move under your feet
The London Underground is fascinating.To think how many people are underground in London at any given moment is a baffling, yet wonderfully enticing statistic.

AI Needs Your Data—and You Should Get Paid for It

Doctors like Chang often rely on eye imaging to track the development of conditions like glaucoma.“I was basically begging for data,” Chang says.

Equifax: An object lesson in how not to handle a data breach

First came the frankly cavalier attitude to cyber security that laid the groundwork for 2017's mammoth data breach, including a slapdash cyber security strategy and insufficient data protection measures.So poor was the company's security that a report from the House Oversight Committee called the breach "entirely preventable".

Congress Wants Answers on Amazon and Capital One's Data Breach

Leaders of House and Senate committees want Capital One and Amazon to explain to Congress how a hacker accessed personal information from more than 100 million Capital One credit card customers and applicants.Jim Jordan, the top Republican on the House Oversight and Reform Committee, asked for a staff-level briefing by Aug 15 on the breach that was reported late Monday.

Lancaster University hit by double data breach

Personal information belonging to students has been stolen as part of a "sophisticated and malicious" cyber attack on Lancaster University, with the institution revealing it has sustained two breaches of data.Attackers gained access to data records for undergraduate applications for 2019 and 2020 entry, including information like names, addresses, telephone numbers and email addresses, Lancaster University has revealed.

How Facebook's Singular Approach to Data Reshaped Social Connections and Changed the Political Landscape Forever

In The Code: Silicon Valley and the Remaking of America, Margaret O'Mara explores how Silicon Valley came to be at the epicenter of technology in America.Yet, few people had heard of "Silicon Valley" and the electronics firms that clustered there when a trade-paper journalist decided to give it that snappy nickname in early 1971.

A.I. Uses Expected to Expand as U.S. Consumers Warm Up to Trading Data for Convenience

“The western world is focused more on privacy,” said Ilya Fushman, general partner and managing member at Kleiner Perkins.” That’s because consumers could warm up to things like their doors opening automatically and their lights turning on upon their arrival home, Fushman added.

Keep Firefox from leaking your data everywhere on the internet

Here's how to protect your privacy using Firefox's privacy and security settings.How to use Firefox's content-blocking toolsFirefox 68 can protect you from websites that gather information about you without your consent as well as from cryptominers and fingerprinters.

7 security tips to keep people and apps from stealing your data

These apps that gathered precise geolocation data and phone identifiers without the owners' knowledge.We reached out to data privacy experts for their top tips to protect your personal data when using apps.

Keep Firefox from leaking your data all over the internet

If you're tired of leaking data across the web, Firefox and its privacy tools can help protect you and your data as you visit websites.Here's how to protect your privacy using Firefox's privacy and security settings.

Facebook Surveillance Case Could Kill EU-U.S. Data Flow


How to automatically delete the web activity and location history data in your Google account

Here’s how to set it up:Web and Activity Data IDG

You can set your web activity to delete after three months or 18 months.Head over to your Google account and click Data & Personalization.

Contractor's AWS S3 server leaks data from Fortune 100 companies: Ford, Netflix, TD Bank

The leaky AWS S3 buckets contained information on Attunity's own operations, but also data from some of its customers -- Fortune 100 companies like Ford, Netflix, and TD Bank.The leaky S3 buckets were found on May 13, and secured three days later, thanks to the work of data breach hunting firm UpGuard.

What Sheryl Crow can teach us about data protection

The event was headlined by Fallout Boy, with Sheryl Crow supporting – a clash of styles that resulted in a room full of middle-aged IT managers who had come to see a 90s country pop star awkwardly rocking out to late-2000s emo pop rock.Little did I know at the time, however, that Crow would one day provide a perfect object lesson for those same IT managers in how poor data protection practices can backfire horribly.

Three quarters of mobile apps have this security vulnerability that could put your personal data at risk

Three quarters of mobile applications have vulnerabilities relating to insecure data storage, leaving both Android and Apple iOS users open to cyberattacks that could allow hackers to steal sensitive information.The findings have been outlined in the Vulnerabilities and Threats in Mobile Applications 2019 report from Positive Technologies.

Salesforce adds customer data platform to CRM

At its annual Salesforce Connections conference, Salesforce unveiled its new Customer Data Platform (CDP) alongside the next generation of Customer 360.The new platform services will allow companies to unify disparate customer data throughout their entire organization and then personalize every engagement based on a single view of the customer.

Google caught 'red-handed' lifting lyrics data

A company that specialises in song lyrics has accused Google of scraping data from its website to use in its search engine.For a few years now, search for the lyrics to a song using Google Search, a little box will appear in the search results with the exact lyrics and details of said song.

SIM swap horror story: I've lost decades of data and Google won't lift a finger

She said that it appeared my Twitter account had been hacked.If I cannot get my Twitter account back, stay tuned for a new account that I will have to rebuild from scratch.

Move data from your PC to iOS with iMazing 2, now only $20


iOS users know the anguish associated with upgrading to a new device, largely due to the massive hassle that is moving data between devices.Thankfully, there's iMazing 2, the innovative tool that lets you freely move data between devices without having to jailbreak them, and it's on sale for only $20.

US border ntrol reveals a cyber attack stole traveller data

Photos of travellers and license plate images have been compromised after a subcontractor for the US Customs and Border Protection (CBP) suffered a cyber attack on its network.The US border control agency became aware on 31 May that one of its subcontractors transferred photos of license plates, as well as travellers' images, to its own networks without the agency's knowledge.