article thumbnail

Avast Announces Termination of Data Collection Subsidiary

Adam Levin

Avast will phase out Jumpshot, a subsidiary that sells user browsing data gleaned from its antivirus and security products. . “I Avast’s sudden about-face regarding the sale of user data came just days after a joint exposé published by Motherboard and PCMag that revealed the depth and scope of its user data tracking.

article thumbnail

Avast Subsidiary Sells User Browsing History

Adam Levin

According to a recent joint investigation by Vice’s Motherboard and PCMag, highly granular and sensitive user data from users of Avast antivirus is being repackaged and sold to companies via a subsidiary called Jumpshot which promises buyers of the data information on “Every search. Every click. On every site.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Determining What Video Conference Participants Are Typing from Watching Shoulder Movements

Schneier on Security

He then created a software program that linked the movements to a list of commonly used words. We then comprehensively evaluate[d] both the keystroke/typing detection and text inference frameworks using data collected from a large number of participants.”

article thumbnail

RSAC insights: SolarWinds hack illustrates why software builds need scrutiny — at deployment

The Last Watchdog

Obviously, one change for the better would be if software developers and security analysts paid much closer attention to the new and updated coding packages being assembled and deployed on the fly, in pursuit of digital agility. For a full drill down, please give the accompanying podcast a listen.

Software 202
article thumbnail

Monetization Monitor: Software Usage Analytics 2020

Efficient usage data collection and analytics can open up significant possibilities for suppliers. Yet many software suppliers still struggle to get accurate insights into usage. Yet many software suppliers still struggle to get accurate insights into usage. Top findings include: Growing Interest in Usage Data.

article thumbnail

Enhancing IT Support for Manufacturing Systems: Addressing Critical Gaps

SecureWorld News

When a production system fails due to hardware faults, connectivity issues, or software errors, the response from IT support teams often falls short. o Proprietary Software: Many manufacturing systems run on industry-specific software that IT personnel may not be familiar with.

article thumbnail

Measuring the Security of IoT Devices

Schneier on Security

In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. Data Collected: 22 Vendors 1,294 Products 4,956 Firmware versions 3,333,411 Binaries analyzed Date range of data: 2003-03-24 to 2019-01-24 (varies by vendor, most up to 2018 releases). [.].

IoT 230