Japan’s minister of cybersecurity has never used computer

Japan’s minister of cybersecurity has never used computer

TOKYO (AP) — Japan’s minister in charge of cybersecurity is in the spotlight for acknowledging he has never used a computer and making comments showing he has no idea what a USB port might be.

Mark Zuckerberg reportedly ordered all Facebook executives to use Android phones

Mark Zuckerberg reportedly ordered all Facebook executives to use Android phones

“We’ve long encouraged our employees and executives to use Android because it is the most popular operating system in the world,” said Facebook in response to the New York Times article.

A Facebook patent would use your family photos to target ads

A Facebook patent would use your family photos to target ads

Facebook has filed a patent that would make it easier to target whole families with ads by analyzing the photos they post.

Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data

Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data

The 2018 Cost of a Data Breach Study from the Ponemon Institute and IBM pegs average costs per data breach globally at $3.86 million, including IT expenses, insurance, notification, and lost customers and business.

Amazon’s Accent Recognition Technology Could Tell the Government Where You’re From

Amazon’s Accent Recognition Technology Could Tell the Government Where You’re From

Characteristics, or “voice features,” like language accent, ethnic origin, emotion, gender, age, and background noise would be immediately extracted and tagged to the user’s data file to help deliver more targeted advertising.

Schneier on Security

We project that about 60% of the searches for individuals of European-descent will result in a third cousin or closer match, which can allow their identification using demographic identifiers. We demonstrate that the technique can also identify research participants of a public sequencing project.

Foreshadow/L1TF Intel Processor Vulnerabilities: What You Need to Know

Foreshadow/L1TF Intel Processor Vulnerabilities: What You Need to Know

Microsoft’s Patch Tuesday for August includes an update that fixes Foreshadow and Foreshadow-NG (aka L1 Terminal Fault or L1TF), security flaws affecting the speculative execution feature of Intel CPUs, similar to the Spectre and Meltdown vulnerabilities.

Troy Hunt: Beyond Passwords: 2FA, U2F and Google Advanced Protection

Troy Hunt: Beyond Passwords: 2FA, U2F and Google Advanced Protection

For example, if you physically have someone's mobile phone in your hand and it's unlocked, you could login to an account by initiating a password reset, receiving the email in their email client then entering the "2nd factor" token sent via SMS or generated by a soft token app on the device.

Minister in Charge of Japan’s Cybersecurity Says He Has Never Used a Computer

Minister in Charge of Japan’s Cybersecurity Says He Has Never Used a Computer

Japanese lawmakers were aghast on Wednesday when Yoshitaka Sakurada, 68, the minister who heads the government’s cybersecurity office, said during questioning in Parliament that he had no need for the devices, and appeared confused when asked basic technology questions.

Facing EPIC Lawsuit, FAA Scraps Secretive Drone Committees

The FAA's Drone Advisory Committee, facing an open government lawsuit from EPIC, has scrapped the secretive committees that developed drone policy. EPIC has a long history of promoting government transparency and advocating for privacy protections against drones.

Fake fingerprints can imitate real ones in biometric systems – research

Fake fingerprints can imitate real ones in biometric systems – research

Based on those insights, the researchers used a common machine learning technique, called a generative adversarial network, to artificially create new fingerprints that matched as many partial fingerprints as possible.

Dutch government report says Microsoft Office telemetry collection breaks GDPR

Dutch government report says Microsoft Office telemetry collection breaks GDPR

Investigators said that Microsoft collects up to 25,000 types of Office events, data which is made available to up to 30 engineering teams.

HTTP/3: Come for the speed, stay for the security

HTTP/3: Come for the speed, stay for the security

In 2013, Google introduced a new experimental protocol called Quick UDP Internet Connections (QUIC), that would make HTTP requests faster and more secure. Google estimates that traditional TCP-based HTTP requests take about 100ms because the client has to establish a connection with the server before it asks for anything.

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

This account of how Mr. Zuckerberg and Ms. Sandberg navigated Facebook’s cascading crises, much of which has not been previously reported, is based on interviews with more than 50 people.

A new Venezuelan ID, created with China's ZTE, tracks citizen behavior

A new Venezuelan ID, created with China's ZTE, tracks citizen behavior

As part of a $70 million government effort to bolster “national security,” Venezuela last year hired ZTE to build a fatherland database and create a mobile payment system for use with the card, according to contracts reviewed by Reuters.

CBS6 Investigates: Internet Privacy

CBS6 Investigates: Internet Privacy

“There should be a right to privacy and we should establish standards and then who's going to implement those standards and enforcement,” said Congressman Paul Tonko, D-Amsterdam. He said that lawmakers have been holding hearings to figure out the best way to establish some privacy on the internet.

Google 'betrays patient trust' with DeepMind Health move

Google 'betrays patient trust' with DeepMind Health move

Google has been accused of breaking promises to patients, after the company announced it would be moving a healthcare-focused subsidiary, DeepMind Health, into the main arm of the organisation. Google says the restructure is necessary to allow DeepMind’s flagship health app, Streams, to scale up globally.

Private by Design: How we built Firefox Sync

Private by Design: How we built Firefox Sync

Where does it go?” With the Firefox Sync design, you enter a passphrase of your choosing and it is used to derive an encryption key that never leaves your computer.

Google’s G Suite Twitter account is the latest to get hacked in bitcoin scam

Google’s G Suite Twitter account is the latest to get hacked in bitcoin scam

Google’s official G Suite Twitter account is the latest victim of an ongoing bitcoin scam that has been plaguing the social media platform for the last few weeks, joining companies like Target (which saw a similar hack this morning), via The Next Web.

Unpatched Android OS Flaw Allows Adversaries to Track User Location

Unpatched Android OS Flaw Allows Adversaries to Track User Location

CVE-2018-9489, now patched as mentioned, allows adversaries to explore and attack the local WiFi network, or identify and physically track any Android device, by exposing a range of WiFi information.

Google’s “Smart City of Surveillance” Faces New Resistance in Toronto

Google’s “Smart City of Surveillance” Faces New Resistance in Toronto

The group represents the latest and largest effort by Torontonians to start having the kinds of public conversations, teach-ins, and debates that should have “taken place last year, when this project was first announced,” according to Bianca Wylie, co-founder of Tech Reset Canada and one of the lead organizers of the opposition to Sidewalk Toronto.

The father of the web is redefining the internet, and he’s not asking for permission

The father of the web is redefining the internet, and he’s not asking for permission

In response to the growing threat of data-hungry internet enterprises, Sir Tim Berners-Lee’s new initiative, Inrupt, is aiming to decentralize the web and rewrite the rules of online business with its new open-source project, Solid.

Facebook Failed to Police How Its Partners Handled User Data

Facebook Failed to Police How Its Partners Handled User Data

Facebook failed to closely monitor device makers after granting them access to the personal data of hundreds of millions of people, according to a previously unreported disclosure to Congress last month.

Facebook bug let websites read ‘likes’ and interests from a user’s profile

Facebook bug let websites read ‘likes’ and interests from a user’s profile

“This allowed information to cross over domains — essentially meaning that if a user visits a particular website, an attacker can open Facebook and can collect information about the user and their friends,” said Masas.

EFF, Human Rights Watch, and Over 70 Civil Society Groups Ask Mark Zuckerberg to Provide All Users with Mechanism to Appeal Content Censorship on Facebook

EFF, Human Rights Watch, and Over 70 Civil Society Groups Ask Mark Zuckerberg to Provide All Users with Mechanism to Appeal Content Censorship on Facebook

EFF, Article 19, the Center for Democracy and Technology, and Ranking Digital Rights wrote directly to Mark Zuckerberg today demanding that Facebook implement common sense standards so that average users can easily appeal content moderation decisions, receive prompt replies and timely review by a human or humans, and have the opportunity to present evidence during the review process.

EPIC Urges Agencies to Abandon Data Practices that Extend Detention of Children

The proposed rule also conflicts with a Privacy Impact Assessment, which fails to assess this risk. EPIC had previously warned Congress about the misuse of immigrant data by the DHS.

FCC Net Neutrality Repeal: Ignoring the Digital Privacy of Millions of Users

FCC Net Neutrality Repeal: Ignoring the Digital Privacy of Millions of Users

Pai, the former Verizon lawyer, even halted a data security rule that would require ISPs to take “reasonable” steps to protect customer information from unauthorized use or access, making sure Internet providers aren’t at fault if your data is exposed.

Google Internet Traffic Is Briefly Misdirected Through Russia, China

Google Internet Traffic Is Briefly Misdirected Through Russia, China

In a notice posted on Monday on its website, Google said it had resolved the issue as of 2:35 p.m. Pacific Standard Time, and that its services were operating as expected.

EFF to U.S. Department of Commerce: Protect Consumer Data Privacy

EFF to U.S. Department of Commerce: Protect Consumer Data Privacy

On Friday, November 9, 2018, EFF submitted a letter in response to the U.S. Department of Commerce's request for comment on "Developing the Administration's Approach to Consumer Privacy," urging the agency to consider any future policy proposals in a users' rights framework.

The Motherboard Guide to Not Getting Hacked

The Motherboard Guide to Not Getting Hacked

The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks , smart home robots that could kill you , and your telecom providers who routinely lose customer data and unwittingly help hackers steal your phone number (and sometimes your money.) Meanwhile, an ever-growing and increasingly passive surveillance apparatus that has trickled down to state and local police is an ever-present threat to our digital privacy and increasingly uses technology that is developed by Silicon Valley giants who are supposedly consumer-focused.

More