Google Chrome’s ‘Incognito’ Mode Not So Incognito

Research by Internet Privacy Company DuckDuckGo is reported to have produced evidence that could show that even in Incognito mode, users of Google Chrome can still be tracked, and searches are still personalised accordingly. Incognito Mode Going incognito (private browsing mode) in Google Chrome means launching a separate ‘Incognito’ browser window by going to top […]

Continue reading


ICO Investigation Into Police Use of Facial Recognition Technology

ICO head Elizabeth Dunham is reported to have launched a formal investigation into how police forces use facial recognition technology (FRT) after high failure rates, misidentifications and worries about legality, bias, and privacy. Concerns Expressed In Blog Post In May In a blog post on the ICO website back in May, Elizabeth Dunham expressed several concerns […]

Continue reading


70% Increase In DDoS Cyber Attacks On Black Friday Prompts Christmas Warning

Cyber security experts are warning companies with online shops to have adequate protection against DDoS attacks in place after a 70% increase in that kind of cyber-attack was recorded on Black Friday. What Is A DDoS Attack? A denial-of-service attack is a cyber-attack on that is intended to make a computer or network unavailable to […]

Continue reading


SIM Swap Scam Warning

A recent investigation by BBC TV’s Watchdog Live revealed evidence that some mobile phone shop staff are not conducting proper ID checks for replacement SIM requests, thereby enabling some customers to become victims of SIM swap scams. What is a SIM Swap Scam? SIM swap scams are believed to have been in existence for the […]

Continue reading


£385,000 Data Protection Fine For Uber

Ride-hailing (and now bike and scooter-hiring) service Uber has been handed a £385,000 fine by the ICO for data protection failings during a cyber-attack back in 2016. What Happened? The original incident took place in October and November 2016 when hackers accessed a private GitHub coding site that was being used by Uber software engineers. […]

Continue reading


Data Protection Trust Levels Still Low After GDPR

A report by the Chartered Institute of Marketing (CIM) has shown that as 42% of consumers have received communications from businesses they had not given permission to contact them (since GDPR came into force), this could be a key reason why consumer trust in businesses is still at a low level. Not Much Difference The […]

Continue reading


Free VPN Tools May Be Linked To China

A new investigation by Metric Labs of the top free VPN (Virtual Private Network) apps in Apple’s App Store and Google Play has revealed that more than half are run by companies with Chinese ownership. What’s A VPN? A ‘Virtual Private Network’ (VPN) is generally used to keep internet activity private, evade censorship / maintain […]

Continue reading


Facial Recognition For Border Control

It has been reported that the UK Home Office will soon be using biometric facial recognition technology in a smartphone app to match a user’s selfie against the image read from a user’s passport chip as a means of self-service identity verification for UK border control. Dutch & UK Technology The self-service identity verification ‘enrolment […]

Continue reading


Jail For Car Accident Data Thief

An employee at a vehicle accident repair centre who stole the data of customers and passed it to a company that made nuisance phone calls has been jailed for 6 months following an investigation by the Information Commissioner’s Office (ICO). Used Former Co-Worker’s Login To Company Computer The employee of Nationwide Accident Repair Services, Mustafa […]

Continue reading


Fatal Security Flaws Discovered in Solid State Drives (SSDs)

Researchers from Radboud University in the Netherlands have released a paper highlighting several security flaws that they’ve discovered in SSDs which mean that data from a flash disk can recovered in more than one way, even if it’s supposedly self-encrypted. What Is An SSD? An SSD is a solid-state storage device that uses integrated circuit […]

Continue reading