Search This Blog

Sunday, October 31, 2010

Soft-spoken 18-year-old American wins Miss World

AP/Alexander F. Yuan

BEIJING – The newest Miss World is from the United States.

Alexandria Mills, a soft-spoken 18-year-old, was named the winner in Saturday night's contest in southern China. The tall blonde was a relative surprise winner after speculation focused on other contestants.

Second place went to Emma Wareus of Botswana, and Adriana Vasini of Venezuela came third.

The host country's own contestant, Tang Xiao, also was among the final five.

According to a brief biography on the Miss World website, Mills calls Louisville, Kentucky, her hometown, and she recently graduated from high school. She would like to become a teacher.

"I've never met a stranger and enjoy meeting new people," she says in the bio.

For the final, she was wearing a shimmering ivory-colored dress slit up the leg.

Mills takes over the title from Kaiane Aldorino of Gibraltar, who was named Miss World 2009 at a ceremony in South Africa last December.

Women from more than 100 countries participated in the contest, organizers said.

This is the 60th year of the Miss World Competition, and organizers brought back contestants from past decades to give the night a retrospective theme.

Rihanna Genuinely Happier With Matt Kemp

http://a323.yahoofs.com/ymg/thatsreallyweek__5/thatsreallyweek-431650466-1288421396.jpg?ymUQVAEDew_1n5QORihanna is the poster girl for bouncing back. It's been 20 months since her heated verbal exchange with former beau Chris Brown turned violent, and she is already preparing the release of her second post-incident album, "Loud." Romantically, she is blissfully happy in a relationship with her Los Angeles Dodgers boyfriend Matt Kemp.

Rihanna is genuinely giddy this time around, she reveals in a cover story in the December 2010 issue of Marie Claire UK. Access Hollywood reported that she told the magazine, "I feel like I smile for real this time. The smiles come from inside, and it exudes in everything I do. People feel my energy is different. When I smile they can tell that it's pure bliss and not just a cover up."

The "Only Girl (In The World)" singer said she knew when her tumultuous relationship with Brown had come to an end.

"One day, I remember I was in New York at the Trump Hotel and I woke up and I just knew I was over it," she said.

http://a323.yahoofs.com/ymg/thatsreallyweek__5/thatsreallyweek-751322860-1288421396.jpg?ymUQVAEDWZxjhuBxBut Rihanna believes the altercation happened for a reason. "God has a crazy way of working, and sometimes when stuff happens you feel like, 'What did I do to deserve this? Why was it backfiring on me?'" she said, according to an Us magazine report. "But, I needed that wake-up call in my life. I needed a turning point, and that's what God was giving to me. All [of] this terrible stuff they say to you, it breaks you down."

Brown, on the other hand, has also experienced his own turning point. Since the felony assault, his career has plummeted until recently. His introspective ballad "Deuces" reached No. 1 on Billboard's R&B/Hip-Hop Songs chart and was recently remixed with guest vocals from hip-hop elite Kanye West, T.I., Andre 3000, and Drake.

Brown is feeling better these days, he told Access Hollywood. "Everything [is] good, I'm definitely - me personally and mentally - I'm a great guy now," he said. "Definitely just a person who's promoting positivity all the time, so that's just me," he said.

Brown added that he is also working on recording music. "The new album is called ‘F.A.M.E.': Forgiving All My Enemies. Basically, just being able to witness my success, failure and success again," he said. "Being able to see me going from my best times to my worst times and being able to overcome it and growing [in]to a man, as I was doing it."

Last Saturday, Celine Dion gave birth to twin boys, but fans were saddened to learn that Dion actually lost a third child during her pregnancy with multiples. Mariah Carey and Nick Cannon shared their good news, that they were expecting a baby this spring. And Billy Ray Cyrus and wife Tish filed for divorce.

There's been so much baby and couple news over the last few weeks. Let's cross our fingers that next week will yield a good-old fashioned rock star feud. See you then.

Friday, October 29, 2010

China boasts world's fastest supercomputer


China boasts world's fastest supercomputer
AFP/Getty Images/File – Hundreds of ethernet cables are connected to rows of laptops for Flashmob 1, the first flashmob supercomputer, …

BEIJING (AFP) – China is set to trump the US to take the number one spot for the fastest supercomputer ever made in a survey of the world's zippiest machines, it was reported Thursday.

Tianhe-1, meaning Milky Way, has a sustained computing speed of 2,507 trillion calculations per second, making it the fastest computer in China on a list published Thursday.

But it is also 1.4 times faster that the world's current fastest ranked supercomputer in the US, housed at a national laboratory in Tennessee, according to the New York Times.

[Related: Fast train, big dam show China's engineering might]

Tianhe-1 does its warp-speed "thinking" at the National Center for Supercomputing in the northern port city of Tianjin -- using mostly chips designed by US companies.

The Tianjin Meteorological Bureau and the National Offshore Oil Corporation data centre have both started trials using the computer.

"It can also serve the animation industry and bio-medical research," Liu Guangming, the supercomputing centre's director, told state news agency Xinhua.

According to Jack Dongarra, a University of Tennessee computer scientist who maintains the official supercomputer rankings which are due to be released next week, the Chinese beast "blows away the existing number one machine".

"We don't close the books until November 1, but I would say it is unlikely we will see a system that is faster," he told the New York Times.

It is not the first time, however, that the US has had its digital crown stolen by an Asian upstart. In 2002, Japan made a machine with more power than the top 20 American computers put together.

Japan is also working on a new machine called "K Computer" in a bid to take the supercomputing crown.

Computer designer Steven J. Wallach is not overly worried by China's rise to computing superpower.

"It's interesting, but it's like getting to the four-minute mile," he told the New York Times. "The world didn't stop. This is just a snapshot in time.

"They want to show they are number one in the world, no matter what it is."

Thursday, October 28, 2010

Jessica Simpson Admits She Often Think About Suicide

Jessica SimpsonJESSICA Simpson admits she often wants to “surrender and give up”.

The singer/actress and TV host talked to USA Today about her love life, self-esteem and the endless scrutiny surrounding her weight.

“Many times I wanted to surrender and give up,” she said.

“But I have a calling in my life. And if I have to go through that scrutiny, I will.

“I went through a really hard time a couple years back with people just harping on the pressure of how to look perfect, obviously using me and my weight. It was a tabloid frenzy.

“I feel like people are constantly curious as to how much I weigh or what I look like or what I wear…There’s no way you’re not going to be affected by the ugly things people say about you. It’s very hurtful. It definitely brings up a lot of your own insecurities. It takes a great family and wonderful friends—and love definitely helps, too—to get through it.”

Simpson — who started dating NFL football player Eric Johnson in June — recently admitted she’s an emotional eater.

“When I’m sad, I want to eat, but when I’m happy, I don’t really think about it,” she said.

“When I’m hungry I’ll eat. When I’m not hungry, I won’t.

“I’m not that much of a calorie counter, but I do think about it. I’m from Texas, so I love everything fried. I’ll give myself a cheat day every week.

“I believe it’s important to not say, ‘I can’t have this’. I think there’s ways to do things in moderation … you definitely have to eat things you love.”

Monday, October 25, 2010

The sneakiest new shopping scams

Easy ways to avoid the biggest rip-offs online and in stores



By the editors of Shop Smart Magazine

Just as important as knowing how to sniff out great buys is understanding what it takes to avoid rip-offs. And with Internet fraud on the rise, it's getting tougher to outsmart the criminals. Complaints to the Internet Crime Complaint Center, a joint operation of the FBI and the National White Collar Crime Center, jumped 22 percent last year. The complaints include plenty of run-of-the-mill scams, like sellers who steal credit-card numbers or take the money and run. But those are child's play compared with what else is brewing.

More from ConsumerReports.org

Store brands vs. name brands

Get the best price on anything

Consumer Reports has no relationship with any advertisers or sponsors on Yahoo!

Think you're too savvy to get taken? OK, maybe you don't fall for those e-mails from Nigerian royalty asking you to wire money, but digital criminals are getting sneakier every year. One scam that can trip up even the most cautious consumers involves "skimmers" attached to ATMs. Those devices record account numbers and passwords so that thieves can clean out your bank account.

"These guys are constantly thinking of new ways to swindle you, some of which are quite sophisticated," says Brian Krebs, a computer security expert and author of "Krebs on Security" at Krebsonsecurity.com.

Think you're safer shopping at the mall? Official purse-snatching statistics show there's been a downward trend, but many of those crimes aren't reported to law enforcement officials. And pickpocket activity always jumps around holiday time, says Bob Arno, co-author of "Travel Advisory! How to Avoid Thefts, Cons and Street Scams While Traveling" (Bonus Books, 2003). But you can outsmart even the craftiest swindlers if you know what's in their bag of nasty tricks. Here's a guide to the latest, sneakiest scams, and simple tips that can help you protect yourself.

'Smishing'

How it works "Phishing" is when you get an e-mail from a supposedly trustworthy source, such as your bank or PayPal, claiming a problem with your account and asking for your user name and password. When you respond, your information is stolen and your account is siphoned. "Smishing" is the latest twist on that scam—instead of getting an e-mail, you get a text message. (The word is a combination of "SMS," for short message service, aka text messaging, and "phishing.") You're told to call a toll-free number, which is answered by a bogus interactive voice-response system that tries to fool you into providing your account number and password.

"It works because people don't give their cell-phone numbers out," Krebs says. "If someone has my cell number, I figure it's someone I know." Thieves can use random-dialing telemarketing services to hit on your number, says Rod Rasmussen, president and CTO of IID, an Internet security firm. If you belong to a credit union, be especially wary—members are targets because often the call-back number has a local area code, not an 800 number, which makes victims less likely to suspect a hoax, Rasmussen says.

Prevent it If you get a text alert about an account, don't respond before you verify that it's legitimate. You can do a Google search on the number to see whether it matches your financial institution. Even better, call the customer-service number at your bank or other service provider to give any needed information to a representative.

Teeny, tiny charges

How it works Thieves get hold of your credit- or debit-card number and make very small charges of 20 cents to $10. The charges appear on your bill with an innocuous-sounding corporate name, and a toll-free number may appear next to the charge. But when you call the number, it's either disconnected or you're instructed to leave a message and your call is never returned.

That was precisely the scam that the Federal Trade Commission broke up in June, according to spokesman Frank Dorman. "We don't know where the thieves got the card numbers, but we're looking into that," he says. The scam was successful because most consumers either didn't notice the charges or didn't bother to correct them because the amounts were so small. In all, the crime ring racked up more than $10 million in bogus charges, the FTC estimates.

Prevent it Scrutinize every item on your bill every month, and question those you don't recognize. (Some charges, but not all, will list a phone number.) If you think a charge is fraudulent, notify your card company as soon as possible but no later than 60 days after the charge appears. By law, the card company must remove the disputed amount from your account while it investigates. Worst case, by law you're liable for only the first $50 on a credit card. (In most cases, Visa and MasterCard will cover the full amount.) Debit cards offer fewer protections: You must report the problem two days after you notice it. If you don't, you could be liable for the first $500 in fraudulent charges. If you wait more than 60 days after your statement is mailed, you could lose all the money in your account.

Skimmers

How it works Skimmers, devices that thieves attach to ATMs or gas pumps to steal your debit account number and password, have been around for years—and they're not going away. They're getting even more sophisticated.

The devices are placed at the mouth of the card-acceptance slot and record the data off of the magnetic strip on the back of your ATM card when you slide it into the machine. Crooks will usually plant a second device, such as a hidden camera or a transparent plastic PIN pad overlay, that's used to record your PIN when you type it in. In the early days of skimming, the thief had to return to the ATM or gas pump to retrieve the apparatus. But now, Krebs says, wireless technology enables the devices to be rigged to send account information via text message to the thief's cell phone. "The thief can be down the street in a coffee house or halfway around the world," he says. "As long as he's got a working phone signal, he can get the information sent to him right away and start using it."

Prevent it Use credit cards and avoid using non-bank ATMs. Those machines are generally located in areas that are less secure, making it easier for thieves to tamper with them. And check the card slot: If there's a plastic strip or plastic film sticking out, or anything glued to the card reader, go elsewhere. If your card is stuck inside the card slot, do not leave the machine. Use your cell phone to call your bank branch or the 24-hour service number to report the problem.

Membership programs

How they work You're buying from a large, reputable website but just before you click the "confirm" button on your purchase, you see a pop-up window or banner ad with an offer such as "$10 Cash Back on Your Next Purchase!" Here's the catch. By accepting that so-called deal, you're agreeing to enroll in a Web discount program that's run by a completely separate company. Those programs, which have innocuous names such as "Reservation Rewards," "Travel Values Plus," or "Great Fun," often provide a 30-day trial period during which you get discounts on a variety of merchandise and services. After that, a monthly membership fee, usually $10 to $20, will appear on your credit-card bill—even though you never gave that outside company your card number.

Sounds dicey, doesn't it? A Senate committee headed by Jay Rockefeller, D-W.Va., thought so, too. Last year, the committee launched an investigation into three large companies that sell memberships to those discount clubs: Affinion Group, Vertrue, and Webloyalty. The committee's report was issued last November and alleged, among other things, that "misleading 'Yes' and 'Continue' buttons cause consumers to reasonably think they are completing the original transaction, rather than entering into a new, ongoing financial relationship with a membership club operated by Affinion, Vertrue, or Webloyalty."

The problem is so ubiquitous that in May, Rockefeller introduced a bill to ban that and other misleading sales practices. Meanwhile, the three companies mentioned in the report have pledged to change their ways. Previously, customers' credit-card numbers were provided to the discount company by the original site without the consumer's knowledge. After the investigation began, all three companies started to require consumers to type in, at a minimum, the last four digits of their card number to make it clear that they are entering into a separate transaction. We'll be on the lookout for whether those changes are enough to keep consumers from being duped.

Prevent it Be wary of pop-up windows or banner ads that promise an additional discount before you complete a transaction. If you do click on an offer, take the time to read the fine print. Scrutinize your credit-card statement every month and question any unfamiliar charges, no matter how small. Check your e-mail inbox and spam folder because Web loyalty programs often send a notification e-mail before they start charging your credit card, when you still have time to cancel.

Stripped gift cards

How it works Thieves look for gift cards that are displayed on grab-and-go racks, such as in grocery and department stores. They use a handheld scanner—which you can buy online for just a few hundred dollars—to read the code behind the magnetic or scratch-off strip on the back of the card. That, combined with the card number on the front, gives them everything they need to steal the value of the card. Then they put the card back on the rack. Later an unsuspecting buyer purchases the worthless gift card. Even if a card isn't preloaded, a thief can steal the card number and security code, then call the 800 number shown on the card every few days to check the balance. Once a shopper has purchased the card and loaded it with a dollar amount, the thief can spend it before the purchaser does.

Prevent it Buy cards that are behind a customer-service desk, says Tom Browning, vice president of corporate compliance and chief security officer for AlliedBarton Security Services. Inspect the card; if the magnetic or peel-off strip on the back isn't pristine, the card might have been tampered with. When buying a preloaded card, ask the cashier to scan it to make sure the full value is on it. If you're buying from a third-party gift-card site, look at the refund policy. And always hang on to the receipts. If something goes wrong, it can help you—or the gift recipient—get a refund.

Counterfeit electronics

How it works Counterfeiting might seem like old news, but it's still going strong—in fact, stronger than ever. Last year, U.S. Customs and Border Protection made 14,841 seizures of fake and pirated goods worth $261 billion, an all-time high. The counterfeits seized included the usual suspects—footwear, apparel, and accessories—plus a huge number of electronics. "A knockoff handbag may not present a direct risk to consumers," says Anthony Toderian, spokesman for CSA International, which tests and certifies products, "but counterfeit electronics certainly do." Fake goods could have substandard wiring, faulty fuses, flammable plastic casings, and harmful chemicals such as lead and mercury. All kinds of electronics have been illegally copied, including computers, phones, and handheld gaming devices, he says. Although online shopping and auction sites and deep-discount stores are the most likely places those fakes will pop up, some have made their way onto the shelves of major retailers. "Buyers for stores can be fooled just as easily as regular consumers can," Toderian says.

Prevent it Look for a label stating that the product has been certified by CSA International or Underwriters Laboratory. (Go to CSA -International. org and click on "Certification Marks" to see what genuine labels look like. At UL.com, go to the search box and type in "How to spot fakes.") Look at the product, too. Are there misspellings on the package? If the box is see-through, does it contain all of the listed components, including batteries, cases, and power cords? Is the manufacturer's contact information, including address and phone number, clearly displayed? When in doubt, buy from well-known retailers that offer a full refund.

3 simple ways to protect yourself

Get the right security software In recent tests, we found two great, downloadable programs that protect against viruses, spyware, and other online threats at no charge. Try Avira, at www.free-av.com, or Microsoft Security Essentials, at www.microsoft.com/security_essentials.

Fight fraud There are several useful resources for ensuring your online safety. Bookmark these!

FTC.gov The Federal Trade Commission's site has lots of fact sheets that tell you what to do you if you've been scammed. Under the Consumer Protection tab, click on "Consumer Information" and then "Shopping for Products & Services." Don't miss the helpful primers on what to do if you're billed for merchandise you never receive and "How to right a wrong."

Safeshopping.org This site is sponsored by the American Bar Association and is packed with advice on safe payment methods, protecting your privacy when you shop, and other need-to-know topics.

OnGuardOnline.gov This site has tips on Internet shopping and is sponsored by government agencies. Quizzes test your knowledge of spyware, online auctions, ID theft, and more.

Antiphishing.org The Anti-Phishing Working Group, an industry-sponsored association, has a tip sheet on how to avoid being scammed. Click on "Consumer Advice," then "How to Avoid Phishing Scams."

Check sellers Before you do business with anyone, go to the Better Business Bureau, at www.bbb.org/us. Grades A to F are based on how long the seller has been in business and how good a job it does resolving complaints. Other sites that are worth a look include SiteJabber.com, Complaints.com, and RipoffReport.com, for its user reviews. Also do a Google search of the site or retailer and the word "complaints."

Hang on to your handbag!

Bob Arno, an author and anti-theft consultant, has traveled the world secretly filming pickpockets. So he knows their tricks and how to thwart them. Here's his advice:

Get a grip Thieves are just as likely to snatch your purse as to slip a hand inside it to grab a wallet. So keep your handbag tight against your body and in front of you at all times. And when you're sitting down in the food court at the mall, don't sling your purse behind you on the chair. Even if you think you're maintaining physical contact with your bag, leaning forward for just a second is all the opportunity a thief needs to grab it. And never put it on the floor, even if it's in front of you.

Nix knapsacks They're back in style, but any bag that's not within your view is a juicy target for skilled pickpockets, no matter how securely it's fastened. And avoid purses with open compartments. Bags with zippers are best.

Keep your focus A classic ploy of purse thieves is to create a diversion—pointing at something, talking loudly, holding open a map and asking for directions, or spilling something on your coat then offering to clean it up. It can happen in a restaurant or a busy mall. Whenever anyone approaches you, be sure to firmly hold your purse and keep it in front of you.

Pare down your wallet Do you really need to bring all of your credit cards and ID cards with you? Leave everything except the necessities at home. And never routinely carry around anything with your Social Security number on it. (Photocopy all of the cards in your wallet, just in case.)

Be smart with your car Park in well-lit areas. If it's still daylight but you plan to shop for a while, park under a street lamp or in a well-lit garage. Always put up your windows and lock the car. If you go back to your car to stow packages, put them in the trunk—visible boxes and bags are magnets for thieves. Don't load up with so many packages that your purse dangles from your arm, out of your sight. Take advantage of curbside pickup or ask the store to hold bags for you. If someone tries to grab your purse, don't resist. "It's not worth losing your life over," Arno says. Also, if you have a GPS device in your car, program it so that your "home" setting isn't your home address. Instead, use the school or church down the street, or crooks will know how to get to your house while you're out. GPS thefts are also on the rise, so don't leave any visible trace of one in your car, including the mount.

Check sellers Before you do business with anyone, go to the Better Business Bureau, at www.bbb.org/us. Grades A to F are based on how long the seller has been in business and how good a job it does resolving complaints. Other sites that are worth a look include SiteJabber.com, Complaints.com, and RipoffReport.com, for its user reviews. Also do a Google search of the site or retailer and the word "complaints."

ShopSmart;) the unique shopping magazine, offers unbiased, easy-to-read advice on the best brands of household appliances, kitchenware, electronics, and more. Subscribe today!

Copyright © 2006-2010 Consumers Union of U.S., Inc. No reproduction, in whole or in part, without written permission.

Monday, October 18, 2010

Facebook in Privacy Breach

[facebook jump1]
Kim White Bloomberg

Facebook founder and CEO Mark Zuckerberg addressed the F8 developer conference this spring.


Many of the most popular applications, or "apps," on the social-networking site Facebook Inc. have been transmitting identifying information—in effect, providing access to people's names and, in some cases, their friends' names—to dozens of advertising and Internet tracking companies, a Wall Street Journal investigation has found.

The issue affects tens of millions of Facebook app users, including people who set their profiles to Facebook's strictest privacy settings. The practice breaks Facebook's rules, and renews questions about its ability to keep identifiable information about its users' activities secure.


The problem has ties to the growing field of companies that build detailed databases on people in order to track them online—a practice the Journal has been examining in its What They Know series. It's unclear how long the breach was in place. On Sunday, a Facebook spokesman said it is taking steps to "dramatically limit" the exposure of users' personal information.

Many top applications on Facebook have been transmitting identifying information to Internet tracking and ad companies. Emily Steel discusses. Also, Michael Ramsey discusses skepticism about the auto industry's big bet that battery-powered cars will become big sellers.

"A Facebook user ID may be inadvertently shared by a user's Internet browser or by an application," the spokesman said. Knowledge of an ID "does not permit access to anyone's private information on Facebook," he said, adding that the company would introduce new technology to contain the problem identified by the Journal.

"Our technical systems have always been complemented by strong policy enforcement, and we will continue to rely on both to keep people in control of their information," the Facebook official said.

"Apps" are pieces of software that let Facebook's 500 million users play games or share common interests with one another. The Journal found that all of the 10 most popular apps on Facebook were transmitting users' IDs to outside companies.

The apps, ranked by research company Inside Network Inc. (based on monthly users), include Zynga Game Network Inc.'s FarmVille, with 59 million users, and Texas HoldEm Poker and FrontierVille. Three of the top 10 apps, including FarmVille, also have been transmitting personal information about a user's friends to outside companies.

Facebook says it is taking steps to "dramatically limit" the exposure of users' personal information, after a WSJ investigation showed that personal IDs were being transmitted to third parties via Facebook apps. But how hard is it to fix such a breach - and how concerned should users be about the sharing of these IDs? Julia Angwin joins Digits to discuss.

Most apps aren't made by Facebook, but by independent software developers. Several apps became unavailable to Facebook users after the Journal informed Facebook that the apps were transmitting personal information; the specific reason for their unavailability remains unclear.

The information being transmitted is one of Facebook's basic building blocks: the unique "Facebook ID" number assigned to every user on the site. Since a Facebook user ID is a public part of any Facebook profile, anyone can use an ID number to look up a person's name, using a standard Web browser, even if that person has set all of his or her Facebook information to be private. For other users, the Facebook ID reveals information they have set to share with "everyone," including age, residence, occupation and photos.

The apps reviewed by the Journal were sending Facebook ID numbers to at least 25 advertising and data firms, several of which build profiles of Internet users by tracking their online activities.

Defenders of online tracking argue that this kind of surveillance is benign because it is conducted anonymously. In this case, however, the Journal found that one data-gathering firm, RapLeaf Inc., had linked Facebook user ID information obtained from apps to its own database of Internet users, which it sells. RapLeaf also transmitted the Facebook IDs it obtained to a dozen other firms, the Journal found.

Name Games

All 10 of the top Facebook apps transmitted users' IDs, The Journal found

RapLeaf said that transmission was unintentional. "We didn't do it on purpose," said Joel Jewitt, vice president of business development for RapLeaf.

Facebook said it previously has "taken steps ... to significantly limit Rapleaf's ability to use any Facebook-related data."

Facebook prohibits app makers from transferring data about users to outside advertising and data companies, even if a user agrees. The Journal's findings shed light on the challenge of policing those rules for the 550,000 apps on its site.

The Journal's findings are the latest challenge for Facebook, which has been criticized in recent years for modifying its privacy rules to expose more of a user's information. This past spring, the Journal found that Facebook was transmitting the ID numbers to advertising companies, under some circumstances, when a user clicked on an ad. Facebook subsequently discontinued the practice.

"This is an even more complicated technical challenge than a similar issue we successfully addressed last spring on Facebook.com," a Facebook spokesman said, "but one that we are committed to addressing."

The privacy issue follows Facebook's effort just this month to give its users more control over its apps, which privacy activists had cited as a potential hole in users' ability to control who sees their information. On Oct. 6, Facebook created a control panel that lets users see which apps are accessing which categories of information about them. It indicates, for example, when an application accesses a user's "basic information" (including a user ID and name). However, it doesn't detail what information friends' applications have accessed about a user.

Video From 'What They Know' Series

It's rarely a coincidence when you see Web ads for products that match your interests. WSJ's Christina Tsuei explains how advertisers use cookies to track your online habits.

A new report in the Wall Street Journal's "What They Know" series illustrates how companies like Microsoft must balance conflicting interests: helping people surf the Web with its browser to keep their mouse clicks private, and helping advertisers who want to see those clicks. WSJ's Julia Angwin, Nick Wingfield, and Jessica Vascellaro join host Simon Constable as panelists on this special Digits live show.

Facebook apps transform Facebook into a hub for all kinds of activity, from playing games to setting up a family tree. Apps are considered an important way for Facebook to extend the usefulness of its network. The company says 70% of users use apps each month.

Applications are also a growing source of revenue beyond advertising for Facebook itself, which sells its own virtual currency that can be used to pay for games.

Following an investigation by the Canadian Privacy Commissioner, Facebook in June limited applications to accessing only the public parts of a user's profile, unless the user grants additional permission. (Canadian officials later expressed satisfaction with Facebook's steps.) Previously, applications could tap any data the user had access to, including detailed profiles and information about a user's friends.

It's not clear if developers of many of the apps transmitting Facebook ID numbers even knew that their apps were doing so. The apps were using a common Web standard, known as a "referer," which passes on the address of the last page viewed when a user clicks on a link. On Facebook and other social-networking sites, referers can expose a user's identity.

The company says it has disabled thousands of applications at times for violating its policies. It's unclear how many, if any, of those cases involved passing user information to marketing companies.

Facebook also appeared to have shut down some applications the Journal found to be transmitting user IDs, including several created by LOLapps Media Inc., a San Francisco company backed with $4 million in venture capital. LOLapp's applications include Gift Creator, with 3.5 million monthly active users, Quiz Creator, with 1.4 million monthly active users, Colorful Butterflies and Best Friends Gifts.

Since Friday, users attempting to access those applications received either an error message or were reverted to Facebook's home screen.

"We have taken immediate action to disable all applications that violate our terms," a Facebook spokesman said.

Data From 'What They Know'

[wtkkids2]

The Wall Street Journal analyzed the tracking files installed on people's computers by the 50 most popular websites, plus WSJ.com. Explore the data here and see separate analysis of the files on popular children's sites.

A spokeswoman for LOLapps Media declined to comment.

The applications transmitting Facebook IDs may have breached their own privacy policies, as well as industry standards, which say sites shouldn't share and advertisers shouldn't collect personally identifiable information without users' permission. Zynga, for example, says in its privacy policy that it "does not provide any Personally Identifiable Information to third-party advertising companies."

A Zynga spokeswoman said, "Zynga has a strict policy of not passing personally identifiable information to any third parties. We look forward to working with Facebook to refine how web technologies work to keep people in control of their information."

The most expansive use of Facebook user information uncovered by the Journal involved RapLeaf. The San Francisco company compiles and sells profiles of individuals based in part on their online activities.

The Journal found that some LOLapps applications, as well as the Family Tree application, were transmitting users' Facebook ID numbers to RapLeaf. RapLeaf then linked those ID numbers to dossiers it had previously assembled on those individuals, according to RapLeaf. RapLeaf then embedded that information in an Internet-tracking file known as a "cookie."

RapLeaf says it strips out the user's name when it embeds the information in the cookie and shares that information for ad targeting. However, The Wall Street Journal found that RapLeaf transmitted Facebook user IDs to a dozen other advertising and data firms, including Google Inc.'s Invite Media.

All 12 companies said that they didn't collect, store or use the information.

Ilya Nikolayev, chief executive of Familybuilder, maker of the Family Tree application, said in an email, "It is Familybuilder's corporate policy to keep any actual, potential, current or prior business partnerships, relationships, customer details, and any similar information confidential. As this story relates to a company other than Familybuilder, we have nothing further to contribute."

Write to Emily Steel at emily.steel@wsj.com and Geoffrey A. Fowler at geoffrey.fowler@wsj.com

Sunday, October 3, 2010

Fashion Faceoff: Khloe vs. Kim

We all know the Kardashian clan likes to share everything from their colorful opinions to waxing tips with each other, but they're generally pretty territorial when it comes to their clothes. So to see Kim and Khloe both sporting the same Bebe bandage dress within days of each other comes as a bit of a shock. This fashion battle pits sister against sister ... and you know those Kardashian girls fight dirty!

Khloe Kardashian in Hollywood, September 21, 2010. Michael Buckner/Getty Images Kim Kardashian in Los Angeles, September 24, 2010. Maciel-WL/X17online.com

Mrs. Khloe Kardashian Odom was first spotted wearing the form-fitting frock on September 21 at the AXE Music "One Night Only" Concert Series in Hollywood. The 5'10" reality star accessorized with classic bumps, a slim clutch, and long, loose locks.

We all know the Kardashian clan likes to share everything from their colorful opinions to waxing tips with each other, but they're generally pretty territorial when it comes to their clothes. So to see Kim and Khloe both sporting the same Bebe bandage dress within days of each other comes as a bit of a shock. This fashion battle pits sister against sister ... and you know those Kardashian girls fight dirty!

Khloe Kardashian in Hollywood, September 21, 2010. Michael Buckner/Getty Images Kim Kardashian in Los Angeles, September 24, 2010. Maciel-WL/X17online.com

Mrs. Khloe Kardashian Odom was first spotted wearing the form-fitting frock on September 21 at the AXE Music "One Night Only" Concert Series in Hollywood. The 5'10" reality star accessorized with classic bumps, a slim clutch, and long, loose locks.

Just three days later, her big sister Kim -- who's all of 5'2" -- wore a matching bandage mini with a subtly different color scheme. Kim paired her dress with leopard-print peep-toe heels and a black clutch.

OK, the dress is from the Kardashian by Bebe collection, so that explains why Kim would be willing to be seen out in the same frock as Khloe in the same week. The dark gray flatters Khloe's figure -- and she looks cute -- but Kim seriously fills the dress out in all the right places, so for me, she's the clear winner.


Just three days later, her big sister Kim -- who's all of 5'2" -- wore a matching bandage mini with a subtly different color scheme. Kim paired her dress with leopard-print peep-toe heels and a black clutch.

OK, the dress is from the Kardashian by Bebe collection, so that explains why Kim would be willing to be seen out in the same frock as Khloe in the same week. The dark gray flatters Khloe's figure -- and she looks cute -- but Kim seriously fills the dress out in all the right places, so for me, she's the clear winner.