FCC Net Neutrality Repeal: Ignoring the Digital Privacy of Millions of Users

FCC Net Neutrality Repeal: Ignoring the Digital Privacy of Millions of Users

Pai, the former Verizon lawyer, even halted a data security rule that would require ISPs to take “reasonable” steps to protect customer information from unauthorized use or access, making sure Internet providers aren’t at fault if your data is exposed.

Tech sector says Peter Dutton's encrypted message 'back door' will jeopardise digital security

Tech sector says Peter Dutton's encrypted message 'back door' will jeopardise digital security

That is why the Home Affairs Minister, Peter Dutton, has been so keen to pass laws forcing messaging companies to put "back doors" into their technology, allowing authorities to access these otherwise secret communications.

IOS 11 Horror Story: the Rise and Fall of iOS Security

IOS 11 Horror Story: the Rise and Fall of iOS Security

If the attacker has your iPhone and your passcode is compromised, you lose your data; your passwords to third-party online accounts; your Apple ID password (and obviously the second authentication factor is not a problem).

We Need Decoy Operating Systems on Smartphones

We Need Decoy Operating Systems on Smartphones

Whether it violates the Fourth Amendment of the U.S. Constitution or not, it’s an unfortunate fact that U.S. Customs and Border Protection agents routinely force travelers entering the country to unlock their phone for inspection under the threat of confiscation or prolonged detainment.

Why surveillance is even worse for your privacy than you thought: three cautionary tales

Why surveillance is even worse for your privacy than you thought: three cautionary tales

If it is retained, use by criminals is not the only risk: the authorities may demand legal access in order to use that data as they wish, including against the person who caused it to be stored.

Pssst... Wanna buy a digital identity? Only $50

Pssst... Wanna buy a digital identity? Only $50

It finds that for under $50, criminals can sell a person's complete digital life on the dark web, including data from breached social media accounts; banking details; remote access to servers or desktops; data from popular services like Uber, Netflix, and Spotify; and accounts for gaming websites, dating apps and porn websites, which might include credit card information.

Private messages from 81,000 hacked Facebook accounts for sale

Private messages from 81,000 hacked Facebook accounts for sale

Hackers appear to have compromised and published private messages from at least 81,000 Facebook users' accounts. The BBC Russian Service contacted five Russian Facebook users whose private messages had been uploaded and confirmed the posts were theirs.

Do Your Apps Know Too Much About You?

Do Your Apps Know Too Much About You?

App makers are starting to bundle permission choices together and still aren’t quite there with letting their users know exactly what they’ll be using data for.

'Privacy is a human right': Big cheese Sat-Nad lays out Microsoft's stall at Future Decoded

'Privacy is a human right': Big cheese Sat-Nad lays out Microsoft's stall at Future Decoded

Of course, ethical behaviour extends beyond the AI sphere, and Nadella assured the audience of Microsoft fans that the software giant also thinks long and hard about the human rights record of a region before plonking down a data centre and giving the local regime access to Azure's cloudy toys.

Google Online Security Blog: Announcing some security treats to protect you from attackers’ tricks

Verify critical security settings to help ensure your account isn’t vulnerable to additional attacks and that someone can’t access it via other means, like a recovery phone number or email address.

The Cloud is NOT a Place

The Cloud is NOT a Place

It’s just mentally easier sometimes to use a term you think you understand, than to really dig into what it means and truly understand it. Further, I think the technical people who are responsible for using the term on us, should also bear the responsibility of not confusing us about this thing called “The Cloud.”

Report: Microsoft shares banking data of Indian customers with US Intelligence agencies

Report: Microsoft shares banking data of Indian customers with US Intelligence agencies

The report stated that the consumer data with banks who moved to Microsoft Office 365 was shared by the company with the US Intelligence Agencies.

Telegram Desktop Saves Conversations Locally in Plain Text

Telegram Desktop Saves Conversations Locally in Plain Text

The desktop variant for Telegram secure messaging app fails to protect chat content locally and offers access to plain text conversations and media that otherwise travel encrypted.

Spy and police chiefs demand passage of Australian encryption access law

Spy and police chiefs demand passage of Australian encryption access law

Without providing any evidence, Australian Security Intelligence Organisation (ASIO) chief Duncan Lewis told a parliamentary committee hearing on October 19 that suspected terrorists were using encrypted messages to plan potential attacks.

How to set up untraceable websites (eepsites) on I2P

How to set up untraceable websites (eepsites) on I2P

An eepsite is a website that is hosted anonymously, a hidden service which is accessible through your web browser. If you use I2P webserver, you can check your destination by clicking “I2P webserver” in “I2P HIDDEN SERVICES”.

The internet of things is becoming a surveillance tool - Stacey on IoT

The internet of things is becoming a surveillance tool - Stacey on IoT

Its role should be to make sure consumers can take advantage of internet connected devices without signing away their privacy and in the process, giving companies the tools to manipulate or discriminate against them as they try to live their lives.

An evolution in private messaging | Networks Asia

An evolution in private messaging | Networks Asia

The potential applications of distributed messaging networks, where users own their data, and privacy and security are in-built by design, are worthy of exploration.

IPhone bug gives access to your private photos

IPhone bug gives access to your private photos

Jose Rodriguez, a Spanish amateur cybersecurity specialist, has discovered a bug in iOS 12 that allows an attacker with physical access to a locked iPhone to access all of its photos.

As many feared, Google’s ambitious Sidewalk Toronto “smart city” project turns out to be a “surveillance city”

As many feared, Google’s ambitious Sidewalk Toronto “smart city” project turns out to be a “surveillance city”

The chairman of Alphabet, the parent company of both Google and Sidewalk Labs, Eric Schmidt, said the project was “all the things you could do if someone would just give us a city and put us in charge.” Alphabet insisted it needed “full autonomy from city regulations so it can build without constraint” and use Sidewalk Toronto as a testbed for new technologies that will monitor and measure urban activity on an unprecedented scale.

Firefox, Chrome and the Future of Trustworthy Extensions

“Beginning in Chrome 70, users will have the choice to restrict extension host access to a custom list of sites, or to configure extensions to require a click to gain access to the current page.” Meanwhile Mozilla will continue to look for ways Firefox can provide more permission control to a majority of extension users.

Apple boss decries 'data industrial complex' while pocketing, er, billions to hook Google into iOS

Apple boss decries 'data industrial complex' while pocketing, er, billions to hook Google into iOS

Cook lamented the tech industry's data-driven economy without invoking the names of ad-focused companies like Facebook or Google, the traditional villains when Apple plays privacy paladin. Cook in his speech said Apple supports a federal data protection law in the US similar to the GDPR.

New EU copyright legislation gets mixed reactions

New EU copyright legislation gets mixed reactions

One aspect of the legislation would allow researchers to use text or data mining computer programs on material they have legal access to read, if such mining is for nonprofit purposes or in the public interest.

Governments want your encrypted data, Australia wants them to have it, and you should be worried

Governments want your encrypted data, Australia wants them to have it, and you should be worried

This legislation comes after the Five Eyes intelligence alliance, including Australia, Canada, New Zealand, the U.S., and the U.K., released a statement calling for government access to encrypted files on the basis of national security and crime prevention.

An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet

An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet

According to a new report by the security researchers at UpGuard, a Washington-based ISP by the name of Pocket iNet left 73 gigabytes of essential operational data publicly exposed in a misconfigured Amazon S3 storage bucket for months.

Firefox 63.0 Release Information

Firefox 63.0 Release Information

Our Firefox 63.0 release overview provides you with extensive details on changes, improvements, removed features and known issues of the new browser version. Our Firefox 63.0 release overview provides you with extensive details on changes, improvements, removed features and known issues of the new browser version.

Apple is focusing on its ad sales business because smartphone sales won’t cut it

Apple is focusing on its ad sales business because smartphone sales won’t cut it

Apple would share revenue with the apps displaying ads; the amount of that share would vary, the WSJ reports. Apple already sells some ads based on search terms in the App Store, which led to $1 billion in revenue last year.

UK police are buying top secret hacking tech to break into iPhones

UK police are buying top secret hacking tech to break into iPhones

At least three police forces in England have spent thousands of pounds on new hacking technology to get into iPhones, according to financial documents seen by WIRED.

Cisco contradicts Dutton’s claim breaking digital encryption won’t create ‘back doors’

Cisco contradicts Dutton’s claim breaking digital encryption won’t create ‘back doors’

At a committee hearing in Canberra on Friday, witnesses from Cisco, Optus and Telstra called for a better definition of the bill’s main safeguard that tech companies cannot be asked to build “systemic” weaknesses into their products.

Digital IDs Are More Dangerous Than You Think

Digital IDs Are More Dangerous Than You Think

In the design and deployment of Digital ID systems, we must advocate for the principles of data minimization, decentralization, consent, and limited access that reinforce our fundamental rights.

Buggy software in popular connected storage drives can let hackers read private data

Buggy software in popular connected storage drives can let hackers read private data

The researchers Paulos Yibelo and Daniel Eshetu said the software running on three of the devices they tested — NetGear Stora, Seagate Home and Medion LifeCloud — can allow an attacker to remotely read, change and delete data without requiring a password.

More