By continuing to use the site or Forum, you agree to the use of cookies, find out more by reading our GDPR policy.

Despite the new GDPR regulation entering into effect across Europe, Facebook and Google are manipulating users into sharing personal data by leveraging misleading wording and confusing interfaces, according to a report released today by the Norwegian Consumer Council (NCC). In its 44-page report, the Norwegian agency accuses Google and Facebook of using so-called "dark patterns" user interface elements into "nudging" users towards accepting privacy options. These dark patterns include misleading privacy-intrusive default settings, misleading wording, giving users an illusion of control, hiding away privacy-friendly choices, take-it-or-leave-it choices, and choice architectures where choosing the privacy-friendly option requires more effort for the users. Google and Facebook making users work for their privacy. "Facebook and Google have privacy-intrusive defaults, where users who want the privacy-friendly option have to go through a significantly longer process," the NCC says. "They even obscure some of these settings so that the user cannot know that the more privacy intrusive option was preselected. "Choices are worded to compel users to make certain choices, while key information is omitted or downplayed," the NCC says in its report. Complete details can be found on OUR FORUM.

On Monday, the Wi-Fi Alliance, the organization that manages Wi-Fi technologies, announced the official release of WPA3. WPA3 is the latest version of Wi-Fi Protected Access (WPA), a user authentication technology for Wi-Fi connections. News that the Wi-Fi Alliance was working on WPA3 leaked online in January. The organization started working on WPA3 after a security researcher revealed KRACK, a vulnerability in the WPA2 WiFi protocol that made it somewhat trivial for an attacker to gain access to WiFi transmissions protected by WPA2. WPA3 is currently optional for all newly produced devices, but it will become the de-facto Wi-Fi authentication standard for all Wi-Fi capable devices in the coming years. A date has not been set yet, but the new WPA3 will retain interoperability with older WPA2 devices to ensure as less friction as possible during the transition to WPA3. WPA3-Personal and WPA3-Enterprise are just like WPA1 and WPA2 before it, there are two WPA3 "security modes" —WPA3-Personal and WPA3-Enterprise. The main difference between these two security modes is in the authentication stage. WPA3 uses the Simultaneous Authentication of Equals (SAE) algorithm, which replaces Pre-shared Key (PSK) in WPA2-Personal, while WPA3-Enterprise uses a more complex set of features that replace IEEE 802.1X from WPA2-Enterprise. Follow the link to OUR FORUM for more.

Windows 98 is undoubtedly one of the most popular Windows versions to date and, Windows 98 no longer receives updates and fixes from Microsoft. The software giant released Windows 98 operating system on June 25, 1998, exactly 20 years ago from today. Windows 95 arrived in August 1995 and introduced the Start button and taskbar, and it also introduced a new concept of “plug and play”. Windows 98 was a successor to Windows 95, and it brought Outlook Express, Internet Explorer 11, Windows Address Book, Microsoft Chat, NetShow Player and other improvements. Windows 98 Second Edition was released in 1999, and NetShow Player was replaced by Windows Media Player 6.2. Just like Windows 95, Microsoft’s Windows 98 was also a major upgrade, and it introduced the back and forward navigation buttons and the address bar in Windows Explorer. With Windows 98, Microsoft also improved the USB support, and it’s one of the reasons that led to widespread adoption of USB hubs and USB mice. Read more on OUR FORUM.

Microsoft is kicking off Redstone 5 Bug Bash starting today and as a part of Bug Bash, Microsoft is also inviting Windows Insider to visit the Redmond campus in Washington. Called Insiders2Campus contest, it will allow Insiders to participate in a contest during the Bug Bash and file feedback with Microsoft. The contest starts at 12:01 a.m. Pacific Time on June 21, 2018, and ends at 11:59 p.m. Pacific Time on August 15, 2018. During this time, Microsoft will hold two Bug Bashes, one starting June 22nd and the other starting July 27th. There are a few easy tasks that participants need to do to participate in the contest. You can head below to take a look at all the tasks. Participate in one of two Windows 10 (Redstone 5) bug bashes: Windows 10 bug bashes are a chance to provide feedback on specific Windows Insider Preview features and functions — by participating in ‘Quests’ in the Feedback Hub designed by our Windows engineers. Microsoft will be selecting 10 Windows Insider who will be flying to Seattle and visit the Microsoft Redmond campus. Not only this, Microsoft will also be covering the total trip cost including food and logging for all the Windows Insiders. Follow this on OUR FORUM.

The Supreme court has just delivered a new judgment that prohibits warrantless seizure of location records by the police. The case, Carpenter v. United States was decided on  5 – 4 margin, a slim one, om the issue of whether a user could expect a reasonable expectation of privacy regarding location records held by a third party. This would trigger fourth amendment protections if the court ruled in the affirmative. “Given the unique nature of cell phone location records, the fact that the information is held by a third party does not by itself overcome the user’s claim to Fourth Amendment protection,” said Chief Justice John Roberts in his delivery of the majority opinion. It was ruled that the Location Information obtained by police should generally be a considered search — as it is private information — triggering probable cause warrant requirement to obtain such records.  Location records are extremely sensitive, and chronicle “a person’s physical presence compiled every day, every moment, over several years.” said the court. “This is a groundbreaking victory for Americans’ privacy rights in the digital age.“The Supreme Court has given privacy law an update that it has badly needed for many years, finally bringing it in line with the realities of modern life.,” the ACLU said today. Read the Supreme Court decision on OUR FORUM.

The intentions of and delivery method of Mylobot are unknown - but it appears to be the work of a sophisticated attacker who could deliver trojans, ransomware and more. A new malware campaign is roping systems into a botnet and providing the attackers with complete control over infected victims, plus the ability to deliver additional payloads, putting the victims' devices at risk of Trojans, keyloggers, DDoS attacks and other malicious schemes. The malware comes equipped with three different layers of evasion techniques which have been described by the researchers at Deep Instinct who uncovered the malware as complex, rare and "never seen in the wild before". Dubbed Mylobot after a researcher's pet dog, the origins of the malware and its delivery method are currently unknown, but it appears to have a connection to Locky ransomware -- one of the most prolific forms of malware during last year. The sophisticated nature of the botnet suggests that those behind it aren't amateurs, with Mylobot incorporating various techniques to avoid detection. Follow this on OUR FORUM.