Exclusive: Western intelligence hacked 'Russia's Google' Yandex to spy on accounts - sources

Exclusive: Western intelligence hacked 'Russia's Google' Yandex to spy on accounts - sources

WASHINGTON/LONDON/SAN FRANCISCO (Reuters) - Hackers working for Western intelligence agencies broke into Russian internet search company Yandex in late 2018 deploying a rare type of malware in an attempt to spy on user accounts, four people with knowledge of the matter told Reuters.

Exclusive: Huawei reviewing FedEx relationship, says packages 'diverted'

Exclusive: Huawei reviewing FedEx relationship, says packages 'diverted'

HONG KONG (Reuters) - Chinese telecoms equipment maker Huawei is reviewing its relationship with FedEx Corp after it claimed the U.S. package delivery company, without detailed explanation, diverted two parcels destined for Huawei addresses in Asia to the United States and attempted to reroute two others.

Don't Put Anonymous Speech on the Chopping Block

Don't Put Anonymous Speech on the Chopping Block

Farrell and Schneier propose greater transparency as one means of strengthening democracy against information attacks that undermine trust. Chilling legitimate participation and reducing the diversity of opinions voiced would not fix the broken public comment process.

Apple's New MacBook Disconnects Microphone "Physically" When Lid is Closed

Apple's New MacBook Disconnects Microphone "Physically" When Lid is Closed

Apple's custom T2 security chip in the latest MacBooks includes a new hardware feature that physically disconnects the MacBook's built-in microphone whenever the user closes the lid, the company revealed yesterday at its event at the Brooklyn Academy of Music in New York.

Facebook are 'morally bankrupt, pathological liars' - NZ Privacy Commissioner

Facebook are 'morally bankrupt, pathological liars' - NZ Privacy Commissioner

In his first post-Christchurch shootings interview on Friday NZT, Facebook chief executive Mark Zuckerberg poured cold water on even a slight delay for Facebook Live, saying it would "break" the service which is often used for two-way communication with birthdays and other occasions (the Herald pointed out that video chat confined to a set group of people covers such events fine, no public broadcast required).

Saudis gained access to Amazon CEO Bezos' phone: Bezos' security chief

Saudis gained access to Amazon CEO Bezos' phone: Bezos' security chief

WASHINGTON (Reuters) - The security chief for Amazon chief executive Jeff Bezos said on Saturday that the Saudi government had access to Bezos’ phone and gained private information from it.

Chinese firm seeks to sell Grindr dating app over US security concerns

Chinese firm seeks to sell Grindr dating app over US security concerns

Chinese gaming company Beijing Kunlun Tech Co Limited is seeking to sell Grindr , the popular gay dating app it has owned since 2016, after a US government national security panel raised concerns about its ownership, according to people familiar with the matter.

A huge trove of medical records and prescriptions found exposed

A huge trove of medical records and prescriptions found exposed

According to a brief review of the data, the faxes contained a host of personally identifiable information and health information, including medical records, doctor’s notes, prescription amounts and quantities, as well as illness information, such as blood test results.

Google faces third EU antitrust fine next week: source

Google faces third EU antitrust fine next week: source

REUTERS/Arnd Wiegmann/File Photo The European Commission in 2016 opened a third case against the world’s most popular internet search engine by accusing Google of preventing third parties using its AdSense product from displaying search advertisements from Google’s competitors.

Google has quietly added DuckDuckGo as a search engine option for Chrome users in ~60 markets

Google has quietly added DuckDuckGo as a search engine option for Chrome users in ~60 markets

The greatest beneficiary of the update appears to be pro-privacy Google rival, DuckDuckGo , which is now being offered as an option in more than 60 markets, per the GitHub instance.

Dozens of companies leaked sensitive data thanks to misconfigured Box accounts

Dozens of companies leaked sensitive data thanks to misconfigured Box accounts

Security researchers have found dozens of companies inadvertently leaking sensitive corporate and customer data because staff are sharing public links to files in their Box enterprise storage accounts that can easily be discovered.

Disputed N.S.A. Phone Program Is Shut Down, Aide Says

Disputed N.S.A. Phone Program Is Shut Down, Aide Says

Mr. Augustine also said that the National Security Agency expected to “provide input” about whether to push for renewed authority to pursue the bulk data collection, but he made clear that the White House would make the final call about whether to ask Congress to extend the Freedom Act.

Minisign by Frank Denis

Minisign by Frank Denis

Combined with -G, overwrite a previous key pair -v display version number Trusted comments Signature files include an untrusted comment line that can be freely modified, even after signature creation.

Senate inquiry to probe Russian agent's meetings with Treasury, Fed

Senate inquiry to probe Russian agent's meetings with Treasury, Fed

That report revealed details about previously unreported meetings in 2015 set up by the Center for the National Interest, a Washington foreign policy think tank that is supportive of efforts to improve U.S.-Russia relations.

Amazon and Google ask for non-stop data from smart home devices

Amazon and Google ask for non-stop data from smart home devices

The concern is that both Amazon and Google could do this, and that users didn't consent to sharing as much smart home data as they do today.

Trust Models for Secure Network Connections

Trust Models for Secure Network Connections

by Andrii Fedotov · by Security Zone · Like (1) Comment ( ) Save Tweet {{ articles[0].views | formatCount}} Views Join the DZone community and get the full member experience.

Apple blocks Facebook from running its internal iOS apps

Apple blocks Facebook from running its internal iOS apps

Apple has shut down Facebook’s ability to distribute internal iOS apps, from early releases of the Facebook app to basic tools like a lunch menu.

Undetectable Remote Arbitrary Code Execution Attacks through JavaScript and HTTP headers trickery

Undetectable Remote Arbitrary Code Execution Attacks through JavaScript and HTTP headers trickery

Comment 1 • 4 months ago CC: decal Flags: needinfo?(giacomo) (Reporter) Comment 6 • 4 months ago (In reply to Daniel Veditz [:dveditz] from comment #5) > The current behavior appears to be dictated by the various specifications of > the web.

Taylor Swift used facial recognition to track her stalkers at a concert

Taylor Swift used facial recognition to track her stalkers at a concert

Security for Taylor Swift at California’s Rose Bowl in May 2018 included a facial recognition system monitored from almost 2,000 miles away. But concert venues are typically private locations, meaning even after security checkpoints, its owners can subject concert-goers to any kind of surveillance they want, including facial recognition.

EPIC to Congress: Federal Agency Making Up the Rules for Facial Recognition Screening

EPIC to Congress: Federal Agency Making Up the Rules for Facial Recognition Screening

EPIC urged the Committee to suspend the screening program until privacy safeguards and meaningful opt-out procedures are established. Last week, EPIC warned Customs and Border Protection about facial recognition technology and urged the DHS Privacy committee to end the program.

Facebook's hidden battle against ad-blockers

Facebook's hidden battle against ad-blockers

It would be easy for a plug-in to spot the word "sponsored" or to find a container labelled "ad" inside the webpage code, so companies, including Facebook, use coding tricks to obfuscate their ads.

Privacy is Personal

Privacy is Personal

It’s essential to recognize the personal nature of privacy, because in the online world we still lack the equivalents of shelter and clothing, so those are still on the to-be-done punch list of requirements for civilizing that world.

Oxford researchers exposed the avalanche of data Google and Facebook can hoover up from apps on your phone

Oxford researchers exposed the avalanche of data Google and Facebook can hoover up from apps on your phone

Companies like Google and Facebook can hoover up vast quantities of data from third-party apps on people's smartphones, according to a detailed new study by the University of Oxford.

Japan to tell Facebook to improve data protection: Kyodo

Japan to tell Facebook to improve data protection: Kyodo

The Japanese government is set to tell Facebook Inc (FB.O) to better protect its users' personal data after a leak involving British firm Cambridge Analytica that affected 87 million users globally, Kyodo News reported on Monday.

Smart home makers hoard your data, but won’t say if the police come for it

Smart home makers hoard your data, but won’t say if the police come for it

We asked some of the most well-known smart home makers on the market if they plan to release a transparency report, or disclose the number of demands they receive for data from their smart home devices.

Buggy software in popular connected storage drives can let hackers read private data

Buggy software in popular connected storage drives can let hackers read private data

The researchers Paulos Yibelo and Daniel Eshetu said the software running on three of the devices they tested — NetGear Stora, Seagate Home and Medion LifeCloud — can allow an attacker to remotely read, change and delete data without requiring a password.

NSA denies spy chip claims, FBI says it’s not allowed to

NSA denies spy chip claims, FBI says it’s not allowed to

Joyce also said that fallout from the story wasn’t limited to damage to the reputation of the companies concerned. The spy chip claims have been denied by Apple, Amazon, Supermicro, British NSA equivalent GCHQ, the Department of Homeland Security, one of Bloomberg’s sources and now the NSA.

Judge: FCC can’t hide records that may explain net neutrality comment fraud

Judge: FCC can’t hide records that may explain net neutrality comment fraud

While Cooper didn't give Prechtel everything he asked for, the judge's ruling ordered the FCC to turn over the email addresses that were used to submit .CSV files, which contained the bulk comments.

T-Mobile discovers security breach of certain customer information

T-Mobile discovers security breach of certain customer information

(Reuters) - T-Mobile US Inc (TMUS.O) and its unit Metro PCS informed customers on Thursday about a potential security breach that was discovered and shut down by the company.