Application security, Security
August 18, 2022
Via: Help Net SecurityA vulnerability in the Android version of the Ring app, which is used to remotely manage Amazon Ring outdoor (video doorbell) and indoor surveillance cameras, could have been exploited by attackers to extract users’ personal data and device’s data, including […]
Mobile, Network security, Privacy protection
July 15, 2019
Via: Hot for SecurityTerrorist organizations know their way around the web, and they don’t shy away from using social networks to communicate with each other or to recruit new members. The FBI is looking into gaining more control over social media and the […]
Mobile, Mobile security, Privacy protection
April 12, 2019
Via: Help Net SecurityThe most successful companies of our time are those who’ve mastered user data – collecting it, analyzing it and profiting from it – typically at the expense of user privacy. The Internet of things (IoT) has given tech companies, advertisers, […]
September 6, 2018
Via: Naked SecurityIt’s one thing to slip spyware onto somebody’s phone so you can surreptitiously intercept text messages, call logs, emails, location tracking, calendar information and record conversations – that kind of privacy-spurning stuff. It’s another thing entirely to be the company […]
July 10, 2018
Via: The HillCongress is weighing a ban on federal agencies using video surveillance equipment from two large Chinese companies, the latest sign of concerns about foreign espionage among lawmakers. It’s part of a broader trend. Across the government, the U.S. is moving […]
May 31, 2018
Via: Security WeekBerlin – The operator of the world’s largest internet hub challenged the legality of sweeping telecoms surveillance by Germany’s spy agency, a German court heard Wednesday. The BND foreign intelligence service has long tapped international data flows through the De-Cix […]
Network security, Security, Tech
May 29, 2018
Via: The HillA growing number of Democratic lawmakers and civil libertarians are voicing concerns about Amazon’s facial recognition software, worrying that it could be misused. They fear that without proper oversight the technology could hurt minority or poor communities and allow police to […]
March 12, 2018
Via: The HillExperts are sounding the alarm about new cyber activity from Iran, as hackers become more emboldened and skilled at carrying out surveillance operations and other attacks outside the country’s borders. In recent years, Iran-linked hacker groups have showed signs of […]
March 14, 2017
Via: The HillUnder pressure from civil liberties advocates, Facebook has updated its policies to explicitly prohibit the use of company data for surveillance purposes. Facebook announced the move on Monday after the American Civil Liberties Union (ACLU) published records showing that Facebook […]
Access control, Network security
February 20, 2017
Via: WiredA smart base employs technologies—artificial intelligence, the Internet of Things, machine automation and robotics, and data analysis, to name a few—to improve the quality and speed of its functions and services. Taken together, they collect and process large amounts of […]
January 11, 2017
Via: Russel EdwardsSurveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy […]
October 18, 2016
Via: Computer WeeklyGCHQ has been secretly collecting bulk communications data (BCD) on the UK population since 1998. But, with responsibility for oversight split between several regulators, there was no adequate oversight until 2015, the IPT ruling revealed. “We are not satisfied that, […]
October 10, 2016
Via: The HillSoftware that Yahoo installed at the behest of the National Security Agency or FBI may have been more malicious than originally reported, Motherboard reports. A New York Times story asserted that Yahoo developed software to search all emails for signatures […]
September 30, 2016
Via: Computer WeeklyPrivacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights. Ten human rights organizations from the UK, the US, Canada, Ireland […]
May 11, 2016
Via: Kaspersky BlogSocial networks, online news outlets, media service providers, online shops — all of them offer high quality content, compared to the Internet of the past. To get to this quality, a large investment is required. Like all investments, there is […]
March 22, 2016
Via: CIOThe Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday. There are worries that Tor could either be […]
March 21, 2016
Via: CIONSA whistleblower Edward Snowden opened the Free Software Foundation’s LibrePlanet 2016 conference on Saturday with a discussion of free software, privacy and security, speaking via video conference from Russia. Snowden credited free software for his ability to help disclose the […]
February 8, 2016
Via: The HillEuropean privacy regulators are putting U.S. surveillance practices under the microscope, this time with a crucial transatlantic data deal hanging in the balance. Legal and privacy advocates say European nations are poised to strike down the deal if they decide […]
Cyber warfare, Privacy protection
October 28, 2015
Via: privacy-protectionYesterday, S. 754, the Cybersecurity Information Sharing Act (CISA) passed through the Senate, despite protests from privacy advocates and many information security and technology companies. A related bill passed through the House earlier this year; now CISA will go through […]
October 13, 2015
Via: access-controlOn September 10, 2015, the #fbi Director James B. Comey continued advocating #law enforcement’s concerns that companies’ adoption of stronger #encryption without possessing a key to decode it creates an environment favoring criminals and impeding investigators. The debate about whether […]