Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Apple Inc. Whitepaper: A Day In The Life Of Your Data →

April 12, 2021 by Marc Handelman in Apple, iOS User Data Security, Apple Data Security, User Tracking
April 12, 2021 /Marc Handelman
Apple, iOS User Data Security, Apple Data Security, User Tracking

Every Step You Take, Every Move You Make... The Litany of Android Tracking

February 01, 2018 by Marc Handelman in Bad Form, Demise of Privacy, Information Security, User Tracking

via David Yanofsky writing at Quartz - comes this disturbing revelation of deep-tracking behaviors in use by Google and exhibited by Google's Android phones whilst in use. Apparently, Bad Behavior is tolerated (and a business requirement) in Mountain View... Today's Must Read.

February 01, 2018 /Marc Handelman
Bad Form, Demise of Privacy, Information Security, User Tracking

Retailers Begin Physical Customer Tracking →

January 18, 2017 by Marc Handelman in All is Information, Tracking, Dubious Methodology, Questionable Tracking, User Tracking, Surveillance, Must Read, Demise of Privacy, Information Security, Information Sharing, Intelligence Sharing, Intelligence, IoT, IoT Security

Tracking, that is, with the assistance of Intel Corporation (NASDAQ: INTC), that benevolent arbiter of all things computational... El Reg has conveniently provided a FAQ (direct from the chip fabricator) in their superlatively reported post. Today's Must Read.

January 18, 2017 /Marc Handelman
All is Information, Tracking, Dubious Methodology, Questionable Tracking, User Tracking, Surveillance, Must Read, Demise of Privacy, Information Security, Information Sharing, Intelligence Sharing, Intelligence, IoT, IoT Security

iOS Tracking, The Control Gambit →

July 25, 2016 by Marc Handelman in All is Information, Information Security, Intelligence, Vulnerabilities, User Tracking

via Kate Kochetkova writing on the Kaspersky blog, comes advice on mitigating iOS tracking. Well played Ms. Kochetkova, Well Played.

 

July 25, 2016 /Marc Handelman
All is Information, Information Security, Intelligence, Vulnerabilities, User Tracking