Tesla’s Self-Driving Spies Cruise the Streets, Watching Daily Life in High-Definition 3D

Tesla’s Self-Driving Spies Cruise the Streets, Watching Daily Life in High-Definition 3D

A recent video released by Tesla on Twitter reveals the vast amount of visual data that is collected by its driverless cars, sparking a reaction from Vitalik Buterin who believes that in-person privacy is no longer a winnable fight.

Parliament approves EU rules requiring life-saving technologies in vehicles

Parliament approves EU rules requiring life-saving technologies in vehicles

The additional obligatory equipment for cars, trucks and buses will help to save people’s lives”, said Róża Thun (EPP, PL) , who steered this legislation through Parliament.

Startups and the Rise of Digital Identity

Startups and the Rise of Digital Identity

Well, if you want to keep your identity safe from hackers, see people in developing nations open a bank account for the first time, and take control over your personal data—digital identity matters.

Launching the Mozilla Plugin Privacy Test Database

Launching the Mozilla Plugin Privacy Test Database

The results are interesting from a passive collection perspective - plugins that store user data when clicked are significantly safer than plugins that track all web activity all the time.

It's Scary How Much Personal Data People Leave on Used Laptops and Phones, Researcher Finds

It's Scary How Much Personal Data People Leave on Used Laptops and Phones, Researcher Finds

Frantz amassed a respectable stockpile of refurbished, donated, and used hardware: 41 desktops and laptops, 27 pieces of removable media (memory cards and flash drives), 11 hard disks, and six cellphones. Screenshot: Josh Frantz / Rapid7 Only two of the devices were erased properly, he said: a Dell laptop and a Hitachi hard drive.

Your “smart” TV is a dumb idea

Your “smart” TV is a dumb idea

Let’s start with a basic rundown of the critical features most people look for in a new television: Screen size: We can almost stop the list right here.

Nevada considers technology to scan cellphones after crashes

Nevada considers technology to scan cellphones after crashes

(AP) — Most states ban texting behind the wheel, but a legislative proposal could make Nevada one of the first states to allow police to use a contentious technology to find out if a person was using a cellphone during a car crash.

In-car monitoring: Surveillance tech will make your car less private

In-car monitoring: Surveillance tech will make your car less private

Startup Caaresys imagines its radar-based system monitoring the respiration and heart rates of everyone in the car, with a particular focus on sensing a child that might be hidden from view in the back and potentially left behind in the car.

From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic

From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic

"These unintentional microphones sense speech with high enough fidelity for the Shazam service to recognize a song recorded through the hard drive." The team's research work, scheduled to be presented in May at the 2019 IEEE Symposium on Security and Privacy , explores how it's possible to alter HDD firmware to measure the offset of a disk drive's read/write head from the center of the track it's seeking.

Why Security is Important (Or how Google sucks at it and it's just pathetic.)

Why Security is Important (Or how Google sucks at it and it's just pathetic.)

A few months ago I had an issue with a drive and wanted to upgrade, so I got a bigger, better drive, and as a precaution I offloaded some important documents to my google drive(in case data transfer from old drive gets borked. According to Google's own security, no one had logged on to my account but me.

Deleted WhatsApp Messages Can Be Restored – Here’s How

Deleted WhatsApp Messages Can Be Restored – Here’s How

After verifying that a backup exists, simply delete and reinstall WhatsApp from the App store, verify your phone number, and follow the on-screen prompts to restore your chat history.

Starting Tomorrow, Smartphones Become Thai Driver’s Licenses

Starting Tomorrow, Smartphones Become Thai Driver’s Licenses

Once it’s installed, drivers can register by email and phone number, then scan the QR code on the back of their physical driver’s license. Those holding cards printed before QR codes were added in September 2017 can contact the department to get their e-licenses.

Move aside, backseat driver! New tech at CES monitors you inside car

Move aside, backseat driver! New tech at CES monitors you inside car

As Guardian Optical CEO Gil Dotan said, “What automakers want is what either sells cars, or what regulators tell them to do.” Occupants, inside a car, are seen on a monitor using technology by Silicon Valley company Eyeris, which uses cameras and AI to track drivers and passengers for safety benefits, shown during an interview in San Jose, California, U.S., December 28, 2018.

OpenVPN 2.5.0 – What is Coming to OpenVPN in 2019

OpenVPN 2.5.0 – What is Coming to OpenVPN in 2019

Here is what the OpenVPN Community is working on: Hallmark Feature: Plugin support for Pluggable Transports.

The Article the Internet Doesn’t Want You to Read

The Article the Internet Doesn’t Want You to Read

Staring at the screen that was propped up on a yellow pages (sign on the times?) on the rear end of the desk, I turned it on, waiting for it to do its thing, then connecting the modem, listening to that well known sound, opening up Internet Explorer and then navigating to one of the early web search engines, I can’t quite remember if it was Ask Jeeves or Web Crawler but then pausing for a moment…

Border agents are copying travelers’ data, leaving it on USB drives

Border agents are copying travelers’ data, leaving it on USB drives

CBP agents are allowed to carry out warrantless device searches at all 328 ports of entries in the US: they’re allowed to manually – i.e., visually – inspect travelers’ phones, laptops, tablets, thumb drives or other electronic devices as they look for content related to terrorism, child abuse imagery, or other material that smells of the criminal.

France Is Hemorrhaging Sensitive Data, And People Are Beginning To Notice

France Is Hemorrhaging Sensitive Data, And People Are Beginning To Notice

“We have North Koreans infiltrating the French Senate, a member of [the French domestic intelligence service] selling information on the ‘dark web’ to mafia members, USB drives that contain the home addresses of thousands of police officials possibly ending up in the hands of jihadist groups, and God knows what else.”

How to Securely Wipe Your Devices So You Can Recycle or Resell Them

How to Securely Wipe Your Devices So You Can Recycle or Resell Them

Third-party tools for executing the ATA Secure Erase command on both HDDs and SSDs include Parted Magic, a previously free bootable CD for partition management that now costs $11 to download, and HDDerase, a bootable DOS-based utility originally developed at the University of California San Diego’s Center for Memory and Recording Research, but which hasn’t been updated since 2008 and might not work with some drives or some configurations.

Police can remotely drive your stolen Tesla into custody

Police can remotely drive your stolen Tesla into custody

But it’s not just self-driving cars that are changing how police work. “Once we’re all driving autonomous cars, I imagine we need systems that detect cars without passengers inside, specifically in crowded, public spaces,” says Schönfeld.

Carmakers are collecting data and cashing in – and most drivers have no clue

Carmakers are collecting data and cashing in – and most drivers have no clue

Now, carmakers are rushing to turn your car's data into a revenue stream, reselling blocks of location information and, one day, information from cars' on-board cameras and sensors could be bought by mapping companies or apps that monitor traffic conditions.

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

The paper outlines that some SSD drives (including Samsung and Crucial) do not actually encrypt the data properly, and that they can be easily by-passed without a system password.

Buggy software in popular connected storage drives can let hackers read private data

Buggy software in popular connected storage drives can let hackers read private data

The researchers Paulos Yibelo and Daniel Eshetu said the software running on three of the devices they tested — NetGear Stora, Seagate Home and Medion LifeCloud — can allow an attacker to remotely read, change and delete data without requiring a password.

Password bypass flaw in Western Digital My Cloud drives puts data at risk

Password bypass flaw in Western Digital My Cloud drives puts data at risk

A security researcher has published details of a vulnerability in a popular cloud storage drive after the company failed to issue security patches for over a year.

‘After I jumped into a ride-share car, the driver said something that terrified me.’

‘After I jumped into a ride-share car, the driver said something that terrified me.’

It started off normal – I ordered the ride, waited for the driver, said hello, hopped in. “She told me she was sick the next day and didn’t need a ride to work,” he said.

Getting Started With Linux

Getting Started With Linux

Install Linux on a virtual machine and run it within a window on your current desktop or notebook computer. If the command fails with a message about running out of space, then you need to use a larger USB thumbdrive!

Your WhatsApp chats are now a little less secure

Your WhatsApp chats are now a little less secure

All WhatsApp data backed up using Google Drive will no longer be protected by end-to-end encryption. “Important: Media and messages you back up aren’t protected by WhatsApp end-to-end encryption while in Google Drive.”