Firefox to Warn When Saved Logins are Found in Data Breaches

Firefox to Warn When Saved Logins are Found in Data Breaches

Starting in Firefox 70, Mozilla aims to have the browser report when any of your saved logins were found in data breaches. Compromised Password Notification in Firefox Lockwise Mozilla will also plans on displaying stats for the amount of data breaches your logins were involved in the browser's upcoming protection report.

The FBI plans more social media surveillance

The FBI plans more social media surveillance

The tool would also allow the FBI to track people based on location, enable persistent keyword monitoring and provide access to personal social media history. The government doesn't have the best track record with regard to social media surveillance.

Bogus “Aggression Detectors” Are Audio-Recording People In Public

Bogus “Aggression Detectors” Are Audio-Recording People In Public

ProPublica and Wired published a story this week reporting that the technology is being used in hundreds of schools, hospitals, and other public places around the world, including over 100 in the United States.

Researchers Turn to Amazon and Google For Bedroom Health Surveillance

Researchers Turn to Amazon and Google For Bedroom Health Surveillance

A new press release from the University of Washington highlights how researchers are aiming to leverage the growth of in-home smart tech devices to not only detect adverse health events but trigger calls for professional assistance.

EU Quietly Ramps Up Preparations To Re-introduce Blanket Data Retention After Top Court Threw It Out In 2014

EU Quietly Ramps Up Preparations To Re-introduce Blanket Data Retention After Top Court Threw It Out In 2014

In the second version, the Council of the EU is much more assertive: The rulings of the European Court of Justice in the cases Digital Rights Ireland and Tele 2, which set out the criteria for the lawful retention of data and access thereof are of fundamental importance in this context.

China’s Big Brother Social Control Goes to Australia

China’s Big Brother Social Control Goes to Australia

Just as in China, the surveillance system is being branded as a “smart city” program, and while Australian officials claim its operations are benign, they’ve announced it functions to monitor cell phone activity and “virtual fences” that will trigger alerts if people cross them.

Schools Are Safer Than Ever, But That's Not Stopping Schools From Buying Social Media Monitoring Software

Schools Are Safer Than Ever, But That's Not Stopping Schools From Buying Social Media Monitoring Software

The Brennan Center for Justice reports schools are purchasing social media monitoring tools with increasing frequency, allowing them to track and surveil students far past the borders of the school grounds.

Employee privacy is at stake as surveillance tech monitors workers

Employee privacy is at stake as surveillance tech monitors workers

Earlier this year, Amazon received a patent for an ultrasonic bracelet that can detect a warehouse worker's location and monitor their interaction with inventory bins by using ultrasonic sound pulses.

How does it feel to be watched at work all the time?

How does it feel to be watched at work all the time?

Image copyright Robin Lubbock Image caption Humanyze's Ben Waber thinks firms need to find our more about how they function His company gathers "data exhaust" left by employees' email and instant messaging apps, and uses name badges equipped with radio-frequency identification (RFID) devices and microphones.

Russia passes bill to allow internet to be cut off from foreign servers

Russia passes bill to allow internet to be cut off from foreign servers

Russia passes bill to allow internet to be cut off from foreign servers. Critics say implementing the measures would be expensive and give vast censorship powers to the government’s new traffic monitoring centre.

Elizabeth Warren: If Data Gets Stolen, Throw Tech CEOs in Prison

Elizabeth Warren: If Data Gets Stolen, Throw Tech CEOs in Prison

Senator and presidential hopeful Elizabeth Warren wants tech leaders to be held accountable when user data that they’ve collected gets stolen or leaked. According to a bill Warren introduced Wednesday, executives of billion-dollar companies could be held criminally liable for data breaches — and perhaps even face jail time.

Chicago is Tracking Kids With GPS Monitors That Can Call and Record Them Without Consent

Chicago is Tracking Kids With GPS Monitors That Can Call and Record Them Without Consent

“I can’t quite even start down the parade of horribles in terms of all the ways this could be a problem,” said Sarah Staudt, senior policy analyst and staff attorney for Chicago Appleseed Fund for Justice and a former juvenile defense attorney in Cook County.

RCMP Has Yet to Complete Privacy Assessment on Social Media Surveillance Tech

RCMP Has Yet to Complete Privacy Assessment on Social Media Surveillance Tech

More than a year after the RCMP started using new technology to monitor Canadians’ social media use — and three years after it purchased the surveillance software — it still hasn’t completed the required privacy impact assessments.

The US Military Is Creating the Future of Employee Monitoring

The US Military Is Creating the Future of Employee Monitoring

It’s not looking at any other cyber data that’s available” — perhaps 20 percent of the available digital information on a person, Nehmer said at a November briefing put on by company, C3, a California-based technology company serving as a partner on the pilot.

The privacy risks of unchecked facial-recognition technology

The privacy risks of unchecked facial-recognition technology

The Washington state Legislature this session took up what would have been a landmark bill to put a moratorium on the acquisition and use of facial recognition technology by government agencies.

In-car monitoring: Surveillance tech will make your car less private

In-car monitoring: Surveillance tech will make your car less private

Startup Caaresys imagines its radar-based system monitoring the respiration and heart rates of everyone in the car, with a particular focus on sensing a child that might be hidden from view in the back and potentially left behind in the car.

Artificial intelligence senses people through walls

Artificial intelligence senses people through walls

The researchers use a neural network to analyze radio signals that bounce off people’s bodies, and can then create a dynamic stick figure that walks, stops, sits, and moves its limbs as the person performs those actions.

After the quantified self, the quantified employee; but what about privacy?

After the quantified self, the quantified employee; but what about privacy?

But technology has moved on in the intervening time, and there are now other ways to keep an eye on employees , as an article in the Washington Post describes: Devices worn on employees’ bodies are an increasingly valuable source of workforce health intelligence for employers and insurance companies.

Popular apps stop sharing users' personal data with Facebook

Popular apps stop sharing users' personal data with Facebook

On Friday the publication reported that at least 11 apps were sharing sensitive user information - including blood pressure and menstrual cycles - with the social media giant.

FastMail loses customers, faces calls to move over anti-encryption laws

FastMail loses customers, faces calls to move over anti-encryption laws

“Still, we have seen existing customers leave, and potential customers go elsewhere, citing this bill as the reason for their choice “We are [also] regularly being asked by customers if we plan to move.” Gondwana’s comments are similar to those of Senetas, which said it now “regularly fields questions” from customers about how encryption-busting laws might impact the products they have installed and are using.

Neighbourhood Watched

Neighbourhood Watched

We are campaigning alongside Liberty for the public to have a greater say as to whether their local police force should be allowed to use such highly intrusive technologies.

Putting data privacy in the hands of users

Putting data privacy in the hands of users

A new platform developed by MIT and Harvard University researchers ensures that web services adhere to users’ preferences on how their data are stored and shared in the cloud.

Firefox 67 to display breach alerts

Firefox 67 to display breach alerts

Mozilla plans to extend the functionality of Firefox Monitor by displaying breach alerts to users of the browser. The feature was passive at that time; users could check whether an account -- email address -- was found on hacked passwords lists, and they could sign up to receive alerts when a particular account was discovered on new leaked lists.

Data breach monitoring for emails

Data breach monitoring for emails

You’re always in control It’s important to note that one can always retract their email address from Badrap.io’s email data breach monitoring. I’m not gonna give my email inbox to anyone By giving another person permission to monitor your email address for data breaches, you’re not giving access to your actual email inbox.

How Much Does Your Car Know About You?

How Much Does Your Car Know About You?

Automakers claim to use this data for driver and vehicle safety and to enhance driving efficiency. Although some of the information that your car is collecting may seem unnecessary, much of it is used to enhance safety – and this could be keeping you safe.

Top security and privacy TED Talks from 2018

Top security and privacy TED Talks from 2018

For example, he was able to figure out what time the family wakes up in the morning because the Amazon Echo would start playing songs from Spotify between 6 a.m. and 8 a.m. How tech companies deceive you into giving up your data and privacy “How tech companies deceive you into giving up your data and privacy” is a somewhat related 2018 TED Talk that falls under the heading of TED Salon.

New Report Demands Digital Independence for Palestine

New Report Demands Digital Independence for Palestine

7amleh is urging industry, regulatory, and government bodies to take specific steps to ensure Palestinians have full access to an independent telecommunications infrastructure and with it their rights.

Google confirms it uses dummy phone numbers to record calls with local services

Google confirms it uses dummy phone numbers to record calls with local services

VANCOUVER—A spokesperson for Google has confirmed the service they’ve launched in Vancouver and Toronto to connect potential customers to trusted service providers funnels customers through ostensibly local phone numbers that are actually owned by Google for the purpose of call monitoring.

How much privacy should children have from their own parents?

How much privacy should children have from their own parents?

For parents who really want to ensure that their children can be located at all times, a new generation of GPS tracking devices are placed on young people using hard-to-remove ankle bracelets.

The FBI ‘Can Neither Confirm nor Deny’ That It Monitors Your Social Media Posts

The FBI ‘Can Neither Confirm nor Deny’ That It Monitors Your Social Media Posts

Indeed, in its letter responding to our FOIA request, the FBI said that simply acknowledging its use of social media surveillance would “risk circumvention of the law.” The bureau seems to be saying that if people knew that the government is monitoring what they’re saying on social media, they’d be less likely to say it.

More