Facebook data breach has put Facebook fans at the risk of mis-using their data. It is not only issue with the Facebook. In recent findings, People has discovered how Facebook stalks each and everyone of us on the internet.
If you are interested in downloading your own data, you can do that too.
Explore Off-Facebook activity here: In Facebook setting, Facebook has given an option to the user to disable off-facebook activity. We are not sure if Facebook will not stalk you however at least you should use to limit the stalking by these social media.
Tor is the encrypted, anonymous way to browse the web that keeps you safe from prying eyes, right?
Well, no, not always.
Blogger and security researcher Chloe spent a month tempting unscrupulous Tor exit node operators with a vulnerable honeypot website to see if anyone was looking for passwords to steal.
In all, the trap sprung for twelve exit nodes, raising a finger of suspicion for them and reminding us that you can’t get complacent about security even if you’re using Tor.
Tor is a bit of heavy duty open source security software that’s famously used to access anonymous, hidden services (the so-called Dark Web) but, more commonly, used as a way to access the regular internet anonymously and in a way that’s resistant to surveillance.
Tor (short for The Onion Router) works by sending your encrypted network traffic on an eccentric journey between Tor ‘nodes’. At each step along the way each Tor node helps keep you safe by never knowing what’s in your message and never knowing more about your data’s journey than the node it came from and the next one it’s going to.
We study six browsers: Google Chrome, Mozilla Firefox, Apple Safari, Brave Browser, Microsoft Edge and Yandex Browser. Chrome is by far the most popular browser, followed by Safari and Firefox. Between them these browsers are used for the great majority of web access. Brave is a recent privacyorientated browser, Edge is the new Microsoft browser and Yandex is popular amongst Russian speakers (second only to Chrome).
In summary, based on our measurements we find that the browsers split into three distinct groups from this privacy perspective.
In the first (most private) group lies Brave
In the second Chrome, Firefox and Safari
And in the third (least private) group lie Edge and Yandex.
Used “out of the box” with its default settings Brave is by far the most private of the browsers studied. We did not find any use of identifiers allowing tracking of IP address over time, and no sharing of the details of web pages visited with backend servers
The wheels of 2020’s biggest cybersecurity threats have already been set motion. Mobile, the cloud and artificial intelligence, to name a few, are trends that will continue to be exploited by criminals. Couple that with the rapid growth of software development and a cybersecurity skills shortage and that should be enough to keep security pros on their toes.
Here is what experts say the year ahead in cybersecurity has in store. Reference
Mobile will become a primary phishing vector for credential attacks in 2020. “Traditional secure email gateways block potential phishing emails and malicious URLs, which works for protecting corporate email from account takeover attacks, but neglects mobile attack vectors, including personal email, social networking, and other mobile centric messaging platforms such as secure messaging apps and SMS/MMS,” according to Lookout security experts.