This doesn’t make cents: Honda, Hyundai and GM sold driving data for pennies. A letter to the FTC revealed data broker Verisk paid Honda 26 cents per car and Hyundai 61 cents per car. The info was then sold again to auto insurers. Hello, higher premiums. Opt out by going into your infotainment system’s Settings and looking for Data Privacy or Data Usage.
Shortcut to reading annoying privacy policies
Tech privacy policies are confusing on purpose. I know, big shocker! But I’m always surprised by just how difficult these things are to comb through and what they hide.
Today, I’m calling out the biggest offenders — and sharing one of my favorite, easy-to-use privacy tools.
The worst of the worst
I read these privacy policies so you don’t have to. Some of these companies are collecting far more than you might realize.
- Disney shares your data with third parties. After that, they have no control over how it’s used.
- Instagram tracks your exact location and may share it for targeted advertising.
- Zoom records and shares your meeting data (including video, audio, and chat logs!) with third parties.
- Wikipedia automatically logs and stores your IP address.
- UPS transfers your personal data to other countries, where data protection laws might not be as strict.
- Uber Eats keeps your info indefinitely — even after you deactivate your account.
- Netflix shares your viewing habits and personal information with TV networks, ISPs and other partners.
- Spotify collects and stores voice data, including conversations, through its voice assistant.
- Microsoft collects massive amounts of data, including what you type, your app usage and what’s on your clipboard.
- Yahoo reserves the right to update its privacy policy at any time, without notifying you.
Feeling a little creeped out? Me, too.
Cut to the chase
It’d be nice if we could wave a magic wand to see all the hidden privacy gotchas. The next best thing? These easy tips:
⌛ Time-saving tip: When you’re reviewing a company’s privacy policy on your computer, use Ctrl + F on Windows or Cmd + F on a Mac to quickly search for buzzwords like “sell,” “partners” and “affiliates.” Words like “geolocation” and “geotargeting” indicate your location information will be collected. Def search for those.
💬 Know the terms: Sections with names like “How we collect your personal data” show what a company gathers from you and how they do it. “How we use your personal information” is their take on why they need your data in the first place. “Business purposes” usually means they share it with third parties.
🎮 Protect the kids: Look for references to “COPPA” or the “Children’s Online Privacy Protection Act” to see how a company protects your kid’s data.
Phew, that’s a lot. I’m always on the hunt to shortcut some of the hard work of securing your privacy. That’s where Incogni comes in.
The mistake slowing down your connection and killing your phone
It’s a cozy evening, and you just started streaming your favorite show. But, as the plot thickens, your Wi-Fi takes an unexpected hiatus. Annoying, right?
Before you unplug your router, look at your smartphone. The culprit could be apps chowing down on precious bandwidth.
If your Wi-Fi stinks, your phone might be to blame
It’s a cozy Friday evening, and you just started streaming your favorite show. But, as the plot thickens, your Wi-Fi takes an unexpected hiatus. Annoying, right?
Before you unplug your router, look to your smartphone. The culprit could be apps chowing down on precious bandwidth.
Security tip: The right way to clean out your smartphone apps
The word audit usually drums up feelings of anxiety. Nobody wants others poking into their business. However, when it comes to your phone, an audit might be your best path to privacy.
The process is simple. Go through each of your apps and ask yourself one question: “Do I really need this?” Tap or click here for five apps you should delete from your device.
Attention, campers and hikers: SpaceX is launching a backpack-sized Starlink Mini satellite antenna for $599. Monthly service is $150 with speeds over 100 Mbps. No, it’s not cheap, and you’re capped at 50GB per month, with extra data usage setting you back $1 for each gigabyte. FYI: Streaming a two-hour movie in 1080p eats 5GB to 8GB. But heck yeah, you have the internet wherever the path leads.
Apple’s iPhone spyware problem is worsening: Attacks mostly against journalists, activists and government representatives have been reported in over 150 countries. Common red flags: Faster-than-usual battery drainage, high data usage and unexpected shutdowns. If you’re a journalist or activist, or if you work for the government, turn on Lockdown mode.
Signs your phone or computer is infected with a virus or keylogger
No matter your device, a hacker with enough gumption and know-how can break in.
Here are surefire ways to know if your system has been hacked and what you can do to fix or prevent it, brought to you by sponsor TotalAV. Your best defense against viruses, keyloggers and other malware? A solid security suite.
Delete these apps to keep your phone fast and safe
It’s a fact: your devices work better when running lean. An excess of useless apps and files consumes storage space and slows everything from opening programs to browsing the web.
When was the last time you gave your computer a good going-over? You probably have stuff on that hard drive you completely forgot about or never use. One of the simplest ways to boost a PC or Mac is by clearing out some space and removing the files you don’t need to store locally. Tap or click here to speed up your computer in three steps.
Clues someone is reading or getting a copy of your text messages
Just about every connected device you have can be used to spy on you, and this isn’t limited to smart speakers and webcams. Many smart TVs come equipped with cameras that you don’t even know exist. Tap or click here for tips on stopping your TV from tracking you.
How to know if hackers are in your phone
The iPhone has a reputation for being secure. Apple has a closed operating system (as opposed to Android’s open-source) and more closely monitors and vets apps in the App Store. And with just one phone model, the iPhone, Apple can more easily push out updates and pressure its users to download them.
The hidden privacy report in your phone you should start checking
More mobile phone users are concerned about how apps access, disseminate and process their data. And with good reason, many apps have been found to extract more information than necessary.
Apple recently instituted several measures against app developers that play fast and loose with your data. The most significant change was the introduction of the App Privacy Report in iOS 15.2. But that is not the only weapon you have against data leakage.
How to turn your Android into a mobile hotspot
Internet is more reliable now than ever. But there are times when we lose connection, which could impact getting work done in time.
Thankfully all hope is not lost. You can create a mobile hotspot straight from your phone. You’ll be able to connect to anything that offers wireless connectivity, like laptops or tablets.
8 signs that your computer has been hacked
If your device is connected to the internet, it’s vulnerable to hacks. It’s as simple as that. Cybercriminals are always coming up with new tricks to get into your gadgets and you should be aware of that.
Fortunately, there are usually signs that your device has been compromised. When it comes to smartphones, this can include spikes in data usage, battery drainage and changes to your home screen, among other indicators. Tap or click here for information on diagnosing and solving phone hacks.
How to remove viruses from your iPhone or iPad
Apple has made it really difficult for hackers to get into your devices. But despite the common misconception that iPhones and iPad are immune to malware, hackers do, in fact, have ways of infecting your iPhone and iPad.
Working from home or streaming more? You may be facing a huge internet bill soon
The COVID-19 pandemic has changed the way many of us go to work every day. Millions of Americans are still working from home, which means they’re relying on their internet connection more than ever before.
More internet activity means increased data usage and potentially higher bills. That’s why many internet service providers took it upon themselves to remove data caps during the early stages of the pandemic. Tap or click here to see how this worked.
Google is making big changes to the way your private data is shared
Our digital privacy is a precious commodity that’s becoming increasingly scarce. There’s money to be made in data, after all, so the biggest tech companies on earth don’t have too much incentive to help you lay low.
It’s not as if these companies do this without your permission, though. Most apps request access to your data the first time you boot them up, but not all of them. Some developers just leave their privacy “gotchas” buried deep in the terms and conditions. Tap or click for an app that can read the Terms and Conditions for you.
4 signs your Android device has a virus - and what to do about it
Our Android smartphones and tablets are very personal devices. They’re our digital homes and we should be just as vigilant about outside invaders as we are with our houses. In the case of Android gadgets, it’s a matter of being aware of malware.
Worst companies for data privacy? You've got to see this list
At Komando.com, we’re always on the lookout for new information that will help you protect your online privacy. The digital world is constantly changing, and making informed decisions about where you share your data is critical in this day and age. With so many platforms to socialize and do business with, knowing safe places from unsafe ones can mean the difference between browsing in peace versus facing down hackers, targeted advertising, or worse.
Cheap background checks, heart-rate monitoring, antivirus software for Mac, and more: Tech Q&A
Each week, I receive tons of questions from my listeners about tech concerns, new products and all things digital. Sometimes, choosing the most interesting questions to highlight is the best part of my job. This week, I received questions about cheap background checks, antivirus software for Macs, heart-rate tracking and more.