• May 28, 2018
  • Glyn Moody
  • Governments, News, Privacy, Security,

In China’s footsteps: Amazon and US schools normalize automatic facial recognition and constant surveillance

Amazon has developed a powerful cloud-based facial recognition system called “Rekognition”, which has major implications for privacy. It is already being used by multiple US police forces to carry out surveillance and make arrests, the ACLU has learned. Amazon claims that Rekognition offers real-time face matching across tens of millions of individuals held in a … Continue reading “In China’s footsteps: Amazon and US schools normalize automatic facial recognition and constant surveillance”

0

If You Have a Comcast Xfinity Router, You Need to Install a VPN (Now)

If you lease an Xfinity router from internet service provider (ISP) Comcast, you need to install a VPN as soon as possible. According to security researchers Karan Saini and Ryan Stevenson, the telecom giant, which operates in 40 states as well as the District of Columbia, leaked router login informat through a website designed to … Continue reading “If You Have a Comcast Xfinity Router, You Need to Install a VPN (Now)”

1

Your Cell Phone Carrier Is Selling Your Real-Time Location Data to Third Parties

All major cell phone carriers collect and sell their customers’ real-time location data to third-party advertisers, information disclosed in a recent court case has revealed. Krebs On Security even discovered that LocationS According to AndroidCentral, the case hearkens back to 2014 when a sheriff in Missouri began using a prison telecommunications service called “Securus” to … Continue reading “Your Cell Phone Carrier Is Selling Your Real-Time Location Data to Third Parties”

0

  • May 9, 2018
  • Glyn Moody
  • Governments, News, Privacy, Security,

Crypto backdoors are in the news again, and as bad for privacy as ever

VPNs are an indispensable part of online life, and they protect many aspects of privacy. But there’s a class of threats that VPNs can’t defend against: crypto backdoors, which allow even the strongest encryption to be bypassed. That’s why it’s important for everyone who cares about their privacy and security to be aware of any … Continue reading “Crypto backdoors are in the news again, and as bad for privacy as ever”

0

Another day, another breach: At what point does storing passwords in plaintext become criminally negligent?

The third largest breach ever in Finland happened yesterday. Passwords were stored in plaintext. At T-Mobile Austria, they explain that of course they store the password in plaintext, but they have so good security so it’s nothing to worry about. At what point does this become criminally negligent? News of the Finnish breach (Google Translate) … Continue reading “Another day, another breach: At what point does storing passwords in plaintext become criminally negligent?”

1

  • Mar 4, 2018
  • Caleb Chen
  • Networking, News, Security,

Researchers detail new 4G LTE vulnerabilities allowing spoofing, tracking, and spamming

4G LTE isn’t nearly as secure or private as you think it is. Mobile privacy and security are both at risk. Researchers from Purdue University and the University of Iowa have released a new research paper detailing ten attacks on 4G LTE networks. Some attacks allow fake emergency alerts to be sent to a phone, … Continue reading “Researchers detail new 4G LTE vulnerabilities allowing spoofing, tracking, and spamming”

0

  • Feb 5, 2018
  • Glyn Moody
  • Governments, News, Privacy, Programming, Security,

The real Strava heatmap story is not threats to national security, but about privacy and de-anonymization

At the end of January, Nathan Ruser posted a tweet about Strava, a Website and mobile app used to track athletic activity via GPS coordinates. It concerned Strava’s global heatmap: “the largest, richest, and most beautiful dataset of its kind. It is a visualization of Strava’s global network of athletes,” as the company puts it. … Continue reading “The real Strava heatmap story is not threats to national security, but about privacy and de-anonymization”

0

  • Nov 22, 2017
  • Glyn Moody
  • News, Privacy, Programming, Security,

The latest threat to your online privacy: exfiltration of personal data by website session-replay scripts

Last week, Privacy News Online reported on a worrying trend of increased surveillance in the workplace. This kind of spying includes capturing every keystroke workers make. The practice is regarded in many jurisdictions as acceptable because people are working on equipment provided by their employer, and use it to carry out tasks for the company … Continue reading “The latest threat to your online privacy: exfiltration of personal data by website session-replay scripts”

2

  • Nov 20, 2017
  • Glyn Moody
  • Governments, Privacy, Security,

Two ways to help preserve privacy in an age of massive leaks and deep hacks

We live in the golden age of leaks. That’s not to say that leaks didn’t happen before. But the move to digital data and the availability of high-speed Internet connections has made the exfiltration of data on a massive scale much easier. Where in 1971 Daniel Ellsberg had to photocopy 7,000 pages of what became … Continue reading “Two ways to help preserve privacy in an age of massive leaks and deep hacks”

0

  • Nov 13, 2017
  • Glyn Moody
  • News, Privacy, Programming, Security,

Welcome to the brave new world of workplace surveillance

Here on Privacy News Online, we write a lot about government surveillance and its impact on privacy. Sadly, constant spying has been normalized to such an extent that workplace surveillance is a thriving new business sector that startups and established companies are rushing to serve. For example, InterGuard promises “complete end-user auditing and control”, and … Continue reading “Welcome to the brave new world of workplace surveillance”

0