Facebook is collecting and using highly sensitive and personal data about women for advertising purposes, according to three different organizations’ research.
According to research by The Mark and The Center for Investigative Reporting of the US-based Royle, Facebook uses a tool to learn about abortion methods and treatments for women. In addition to performing searches, it gathers important data.
According to the report, Facebook is also using ‘Metapixel’ to collect information on women who are pregnant or who are not pregnant but want children.
The report didn’t use the word “women,” but it did say that Facebook had been collecting data from people looking for information on abortion and complications associated with abortion or non-abortion.
According to the report, Facebook collects such people’s data through the ‘Metapixel’ tool and distributes it to companies, particularly clinics that provide abortion and other pregnancy-related services.
According to the report, the clinics to which Facebook is providing data are not registered with the health department and are instead run by conservative organizations opposed to abortion.
The report does not say which countries Facebook is collecting data in, but it does say that investigations have only been conducted in the United States so far.
In a statement released Friday, investigators denied the allegations, saying, “Similar, baseless allegations concerning Russia’s intelligence have been made more than once.”
According to the report, Facebook’s ‘Metapixel’ tool or feature gives businesses and organizations access to such features and data, allowing them to see who has used their services. Searched or viewed.
According to the report, Facebook searches the Facebook page of Facebook In-Clinics for people looking for pregnancy complications, which is illegally run under the auspices of conservative organizations to discourage abortion. Are
According to the report, Facebook later gives clinic management access to the data so that the administrators can see who has visited their page and what assistance they require.
According to the report, after providing clinics with people’s search histories and other information, Facebook sends targeted advertisements for the same clinics to people who are looking for ways to get to the clinics.
AMD has given us a new look at its future processor technology plans, and the big news is code-named Dragon Range. According to AMD itself, these processors are intended for extreme-class gaming.
According to the company’s “roadmap,” Dragon Range will be released sometime in 2023 and will be based on the company’s forthcoming “Zen 4” architecture.
These processors will be a part of the Ryzen 7000 series, a platform that will use more advanced PCIe and memory technologies than those currently employed by AMD. Therefore, we are discussing PCIe 5.0 and DDR5.
Powerful graphics and processor solutions necessitate a large amount of space for cooling, and one can typically anticipate a relatively short battery life – at least when the computer is working hard.
Laptops with Dragon Range processors do not appear to deviate from this trend. In fact, AMD hints at an even higher power consumption than what we observe in current gaming-oriented models. With “55W +” we can rapidly arrive at processors that consume nearly as much power as the processors in a significant number of desktops.
Today, this number is typically around 45 watts for gaming laptops.
With Dragon Range, it is at least clear that AMD envisions gaming laptops equipped with processors that have more cores and faster memory than is currently available. It is unknown whether this indicates that these processors will be equipped with additional “3D V-cache” like the Ryzen 7 5800X3D.
Regardless, these are laptops you would prefer to have plugged into an electrical outlet.
7000 series desktop computers this year The roadmap also confirms that the “Raphael”-codenamed 7000 series for desktops will be released later this year. These will be the first processors with Zen 4 architecture to hit the market.
Additionally, the new platform features DDR5, PCIe 5.0, and a brand-new AMD socket. Physically, the processors will connect to the motherboard via LGA, which means they will have contact points rather than pins.
Apple, Google, and Microsoft, three of the world’s largest technology corporations, want to simplify safe login procedures that do not require a password. Thursday, in honour of World Password Day, the corporations issued a joint statement announcing this. The new features are intended to enable websites and applications to provide consumers with safe, password-free logins across all devices and platforms.
The standard was created by the World Wide Web Consortium and the Fido Alliance. In addition to hundreds of technological businesses and service providers, the Fido Alliance also comprises public agencies. With these advancements, the industry hopes to assure that in the future, critical data will not be protected solely by a password.
Experts have pointed out for years that even passwords with several letters, numbers, and special characters that are often changed are vulnerable. They advise employing login techniques that also require a security stick or an authentication app’s code. The most recent version of the Fido standard even functions without a password you must remember.
New features added to the FIDO standard The current announcement adds two new features to the standard: On the one hand, users can automatically access their access data on numerous devices, as well as new devices, without having to register each account individually. Additionally, they can utilise authentication on their mobile device to log in to an app or website on any of their nearby devices, regardless of the operating system or web browser
The current technological implementation necessitates that users log in separately to each website or app on each device prior to using the password-free capability. Now, this is simple. The new functionality should be accessible on Apple, Google, and Microsoft platforms within a year.
“Overcoming Password-Based Authentication of the Past” Mark Risher, senior director of product management at Google, remarked, “This achievement is a credit to the industry’s joint efforts to enhance security and eliminate archaic password-based authentication.” Microsoft’s corporate vice president of identity programme management, Alex Simons, stated, “The full transition to a password-free world will occur when people make it a natural part of their life.”
Any effective solution must be more secure, easier to use, and faster than passwords and current multi-factor authentication systems.
The “Circle” function essentially goes against Twitter’s primary idea, as it only allows tweets to be shared in a smaller circle.
Twitter is experimenting with a feature that goes against one of the service’s core principles: Tweets can only be shared in a smaller circle when using the “Circle” function. Twitter justified the move by saying, “Not every tweet is intended for everyone.”
“Circle” makes it easy to have private chats and form closer bonds with a small number of people. A “circle” can have up to 150 users.
Twitter has always operated in such a way that tweets are essentially public and visible to everyone. Direct messaging between users and the option to make all tweets from an account available exclusively to those approved by the profile owner are the only two exceptions thus far.
Twitter clarified that tweets published in a “circle” cannot be retweeted or shared. According to the company, the feature would be provided to a limited number of people worldwide at first.
Elon Musk, the tech billionaire, is trying to acquire Twitter. He believes that the service imposes excessive restrictions on free speech on the site. Musk and the board of directors of Twitter have agreed to a deal for roughly 44 billion dollars, but he still needs enough stockholders to want to sell him their shares. The deal is expected to be completed by the end of the year, according to Twitter and Musk.
This week, the European Parliament approved new rules for data sharing. This means that the Data Governance Act (DGA) is another great step forward.
DGA is an EU regulation on data management. It is part of a wider EU data policy agenda.
The European Commission believes that more rules are needed in this area as our society relies more and more on data.
The regulation was presented at the end of 2020 by European Commissioner Margrethe Vestager. The proposal focuses on data from public authorities, businesses, and the general public.
1. Increase trust in data sharing
Data from individuals, businesses, or organizations that are made available on a voluntary basis should be used as much as possible in the public interest. This includes, for example, data that could be important for science, health care, climate control, and improved mobility.
Organizations gathering data in the public interest should soon be able to apply for a national registry. There will then be a European logo stating that the organization is DGA compliant.
Europe is hopeful that this will encourage people to share data with these organizations.
2. Making it easier to reuse government data
The DGA should facilitate the reuse of certain information held by the government.These include, for example, personal data and trade secret information.These data can contribute value to the economy and society.
The regulation states that public authorities must be technically equipped to handle these data in a secure way.
An electronic register of government data should therefore be set up.
3. Ensuring stricter rules around data share neutrality
Data sharing service providers (so-called data intermediaries) must abide by stricter rules.For example, following the establishment of the DGA, companies are not permitted to exchange data on their own initiative.
Henceforth, data intermediaries who want to resell data must report it to a competent government agency.These organizations ensure that the companies adhere to the rules.
It is not yet clear which Dutch government agency will oversee businesses.
The goal is for data intermediates to function as neutral party. They need to link data owners and data users in a neutral manner.
New rules as good as final
The European Parliament has now approved the final text of the DGA. The European Council and the Member States have yet to do this, but it is often more of a formality.
Once a final agreement has been reached and the content published, it will take another 15 months for the new rules to apply in all Member States.
Lift is a vertical mouse that is sold in both left-handed and right-handed versions. It costs 69.99 euros and is available in three colors.
The last two years have been a challenge for health, but not only because of the coronavirus epidemic. Forced to work from home, we have had to compromise on ergonomics , typing for long hours on laptops, without external monitors at the right height, on uncomfortable chairs, or with mice that don’t fit well in the hand.
Logitech’s latest mouse, announced today, tries to fix at least this last point and does it from a new angle. One of 57 degrees , to be exact. Lift is a vertical mouse that joins the company’s Ergo series of ergonomic devices and is sold in both left-handed and right-handed versions. It costs 69.99 euros and can be purchased from today in three different colors on the manufacturer’s website or at its usual distributors.
What makes it special? Instead of having the buttons at the top, the Lift buttons are on a 57 degree inclined plane with respect to the horizontal support surface. This tilt changes the position of the hand during use and completely relaxes the tension on the wrist . I have been able to test it during the last week and it is a great alternative for those who notice, at the end of the day, excessive pressure or pain in the hand with a conventional mouse.
When using it, it has a thumb rest and the rest of the hand is dropped on the side. The posture is somewhat reminiscent of the one we would use to shake someone’s hand. It is comfortable, neutral, and allows you to grip the mouse firmly so as not to lose precision. The device feels comfortable and warm to the touch and is made mostly from post-consumer recycled plastic.
Lift isn’t Logitech’s first vertical mouse. The company has also been selling the MX Vertical for months, but it is a much larger mouse that can be somewhat uncomfortable in medium or small hands. It’s also more expensive, because it offers a USB-C connection and a rechargeable battery inside, instead of using an AA battery like the Lift does.
It is also somewhat noisier. One of the great advantages of Lift is that the buttons and scroll wheel make almost no noise, although the scroll wheel’s spin isn’t as satisfying as other MX-series mice.
The wheel turning system is magnetic, like on other MX-series products, so it has great precision and speed when scrolling through a long document, but not as fast as, say, a Logitech MX Master 3 (which is by far my favorite mouse).
Setting up the Lift is easy. It connects to the computer or tablet via Bluetooth or radio frequency (it includes a receiver for the USB-A port of the computer in the latter case). It can memorize up to 3 different devices and has five buttons in addition to the scroll wheel . Two are accessible from the thumb, two (the main ones) with the index and middle fingers and a third button is just below the scroll wheel.
Although it is automatically detected as a standard mouse, the Logitech Settings application allows you to associate shortcuts and advanced functions to the different buttons.
For those who aren’t comfortable with a conventional mouse or suffer from repetitive strain injuries after years of use, Lift can be a great relief, though those with larger hands may find the MX Vertical an even more comfortable alternative. comfortable.
The practical VirusTotal service checks files and websites for malware using currently over 70 virus scanners. The protection integrates seamlessly into Chrome and Firefox via the completely reprogrammed browser extension VT4Browsers.
Basically, files from the Internet should only be downloaded from trustworthy sources. However, if you are unsure about a file or if you are affected by the virus scanner installed in Windows, you can check the file with the ingenious virus scanner service VirusTotal .
This is exactly what the free add-on VT4Browsers connects to Chrome and Firefox. So if you install VT4Browsers, you can consult over 70 virus scanners directly in Firefox and Chrome with just one click. In this way, malicious files can be detected as such before they are installed and suspicious links can be checked for dangers. We’ll show you how to use the browser extension to surf the web more securely.
5000 series processors are two years old, but still until recently they were one of the best choices on the market.
It seems that AMD has experienced competition in the form of a whole range of Intel Alder Lake processors and was forced to react in the form of a price reduction of up to 25 percent. Unfortunately, at the moment it only applies to the American and Canadian markets.
It is worth noting that the premiere of Alder Lake processors helped to bounce back from the coldly received 11th generation processors, as shown by recent data.
AMD Ryzen 7000 series processors will not be released until the second half of the year. These will bring with them the new AM5 socket, which will abandon the PGA socket in favor of LGA, support for the PCIe 5.0 interface. and the DDR5 memory standard .
It is also worth noting that in the near future, according to the announcement, the Ryzen 7 5800X3D processor will be the Ryzen 7 5800X with an additional 64 MB of the third level cache (L3) added using the 3D V-Cache technology . According to AMD, increasing the L3 will allow you to increase performance in games by an average of 15 percent. in FHD resolution.
In the US, the flagship 16-core Ryzen 9 5950X was cheaper by 25 percent, and by many appreciated as a universal Ryzen 7 5800X by 22 percent. same as Ryzen 5 5600X. The G-series Ryzens with an integrated graphics system were also included in the price reductions. The stronger Ryzen 7 5700G was cheaper by 18 percent, and the weaker Ryzen 5 5600G by 15 percent.
A digital footprint (also known as a data shadow or electronic footprint) is the data trail that you leave behind when you use the Internet. This includes websites you visit, emails you send and information you submit online. The digital footprint can be used to track a person’s online activities and devices. As an internet user, you can leave your footprint either actively or passively.
What is a digital footprint?
Whenever you use the internet, you leave a trail of information known as your digital footprint. A digital footprint is created, for example, when you post a post on social media, subscribe to a newsletter, submit an online review or buy something online.
But sometimes it’s not so obvious that you’re leaving a data trail. For example, websites can track your activity by installing cookies on your device, and apps can collect data without your knowledge. Once you give an organization access to your data, they could resell your data or give it to third parties. Or worse, your personal information could be stolen in a data breach.
In connection with the digital footprint, the terms “active” and “passive” are often used.
Active digital footprint
With an active digital footprint, the user has willingly disclosed data about themselves, for example by posting on social networks or participating in an online forum. When a user logs into a website using a registered username or profile, all of their contributions become part of their active digital footprint. Other activities that leave an active digital footprint include filling out an online form, e.g. B. to subscribe to a newsletter, or to accept cookies in the browser.
Passive digital footprint
A passive digital footprint is created when information about a user is collected without their knowledge. This is the case, for example, when websites track how often a user visits this page, where they come from and what their IP address is. This process runs in secret and the user is not necessarily aware of it. Other examples of passive footprints include social media sites and advertisers using your likes, shares and comments to build a profile of you and target you with specific content.
Why are digital footprints important?
You shouldn’t ignore your digital footprint for the following reasons:
The footprint is fairly permanent, and once data is public—or even semi-public, as is the case with Facebook posts—the owner has little control over what others do with it.
A digital footprint can determine a person’s digital reputation and is now considered to be just as important as off-net reputation.
Employers can check candidates’ digital footprints, especially on social media, before hiring anyone. Colleges and universities can check the digital footprint of applicants for a university place before accepting them.
Texts and photos that you post online can be misinterpreted or altered and thereby appear unintentionally offensive.
Content intended for a private group can be shared widely and potentially destroy relationships and friendships.
Cyber criminals can use your digital footprint to phish to gain access to accounts or impersonate your information.
It is therefore worthwhile to think about what your digital footprint says about you. Many people try to control their digital footprint by restraining their online activities so that there is no data to collect in the first place.
Examples of the digital footprint
There are hundreds of elements that can become part of an internet user’s digital footprint. Examples of activities that can leave a digital footprint:
Shopping on online store websites
Register for vouchers or set up a user account
Download and use of shopping apps
Newsletter sign-up for certain brands
Use of a mobile banking app
Buy or sell stocks
Subscription to financial guides and blogs
Opening a credit card account
Use of social media on your computer or devices
Sign in to other websites using social media credentials
contact with friends and acquaintances
Share information, data and photos with your contacts
Joining a dating website or app
Reading online news
Subscribing to an online news source
Reading articles in a news app
Subscribe to a publication’s newsletter
Reposting articles and information you’ve read
health and fitness
Deploying fitness trackers
Use of apps in healthcare
Register your email address with a gym
Subscribing to health and fitness blogs
Protect your digital footprint
Since employers, co-workers and others can track your online identity, it’s important to keep your digital footprint in mind. Here are a few tips on how to protect your personal information and keep an eye on your online reputation.
Check your own digital footprint using search engines
Enter your name in search engines. Include your first and last name and alternative spellings. If your name has changed, you should search for both the current name and the previous name. You can use the results of this online search to see what information about you is publicly available. If any of the results paint you in a bad light, you should contact the site administrator with a request to remove the listing. Google Alerts lets you keep track of your name.
Reduce the number of information sources that mention you.
Real estate websites and whitepages.com, for example, may have more information about you than you’d like. These websites often contain very personal information such as telephone number, address and age. If you do not agree to this, you can write to the website operator and request the deletion of this data.
Give as little information as possible
Every time you share your personal information, you increase your digital footprint. This also increases the risk that that someone will misuse your data or become the victim of a data breach themselves, putting your data in the wrong hands. So, before you next submit a form, think about whether it’s really worth it. Can I get this information or this service in another way without releasing my data?
Check your privacy settings
Social media privacy settings allow you to control who can read your posts. Go through these settings and set them to a level that is acceptable to you. For example, on Facebook, you can limit posts to friends or create your own lists of people who can see specific posts. However, these settings only protect your privacy within this website.
Don’t reveal too much about yourself on social media
Social media is a very easy way to connect with others, but it can also overdo it. It is best to keep your whereabouts, travel plans or other personal information to yourself. Do not include a phone number or email address in the resume you post on social media. Also, “liking” your own bank, health insurance company, pharmacy, etc. is not a good idea. Cybercriminals could use this to glean clues about your most important accounts.
Avoid unsafe websites
With every online transaction, make sure you’re dealing with a secure website. The URL should start with https:// and not http://. The “s” here stands for “secure” and means that the site has a security certificate. You should also see a lock icon on the far left of the address bar. Never enter confidential data, especially payment data, on unsecured websites.
Be careful when entering private data in public WLAN networks
A public Wi-Fi network is inherently less secure than your private one because you don’t know who set it up or who is still reading. If possible, do not send any personal information when surfing the Internet over a public Wi-Fi network.
Delete old accounts
One way to reduce your digital footprint is to delete old accounts – for example, social media profiles that you no longer use or newsletters that you no longer read. By cleaning up unused accounts, you reduce the risk of becoming a victim of a data breach.
Secure passwords and use of a password manager
With a strong password you can ensure internet security. A strong password is long – at least 12 characters, ideally longer – and consists of a mixture of upper and lower case letters plus special characters and numbers. The more complex and intricate your password is, the harder it is to crack. Generate, store and manage all your passwords in one secure online account with a password manager . Never reveal your passwords, even in a private context. Don’t share them with others and don’t write them down. Also, don’t use the same password for all your accounts and remember to change it regularly.
Keep an eye on health insurance data
Practice good data hygiene by regularly checking your health insurance data. Identity thieves target medical and health insurance records as well as your financial records. If criminals seek medical treatment on your behalf, their medical records could become entangled with yours.
No login using Facebook data
Logging into websites and apps using your Facebook details is convenient. However, by doing so, you are giving the website you log into via Facebook permission to collect your Facebook user data, putting your personal information at further risk.
Keep your software up to date
Outdated software can contain a wealth of data traces. And if this is no longer updated, cybercriminals could gain access to your devices and data. Because without updates, security gaps arise over time that cybercriminals like to exploit. You can prevent this by keeping your software up to date. Older software is usually more vulnerable to hacking.
Also check your mobile devices
Set up a passcode for your mobile device so that if you lose it, others cannot access it. Read the user agreement when installing an app. Many apps disclose what information they collect and what it is used for. Personal data such as email, location and online activities could be affected. Verify that you consent to the sharing of this information before installing the app.
Think first, then post
What you post or say on the internet is a reflection of who you are, as is what others say about you. Parts of your digital footprint such as uploaded photos, comments on blogs, YouTube videos and Facebook posts may reflect you in a very different light than you would like to be seen. Take an active role in shaping your digital footprint by only posting things that reinforce the impression you want others to have.
React immediately after a data breach
If you suspect that the security of your data has been compromised, you should act immediately. In the event of a financial loss, contact your bank or credit card provider directly to report the violation. Change any passwords that may have been hacked. If you have used this password on multiple accounts, change it there as well.
Use a VPN
You can protect your digital footprint by going online through a Virtual Private Network (VPN). With a VPN, your IP address remains hidden, making your online activities virtually untraceable. This protects your privacy on the Internet and prevents websites from installing cookies that save your browsing history.