E-readers reading your reading: A serious invasion of privacy?

E-readers reading your reading: A serious invasion of privacy?

I feel there are bigger things to worry about than whether Kobo knows what page of Fifty Shades (no, not really) I'm currently on, or if the Amazon lot are astonished to see that not only has my husband got all the paper editions of the George RR Martin books, but he's just bought them all as ebooks as well as they were "too heavy to carry to work".

Defense against the Darknet, or how to accessorize to defeat video surveillance

Defense against the Darknet, or how to accessorize to defeat video surveillance

"The idea behind this work is to be able to circumvent security systems that use a person detector to generate an alarm when a person enters the view of a camera," explained Wiebe Van Ranst, a PhD researcher at KU Leuven, in an email to The Register .

Facebook is partnering with a big UK newspaper to publish sponsored articles downplaying 'technofears' and praising the company

Facebook is partnering with a big UK newspaper to publish sponsored articles downplaying 'technofears' and praising the company

Facebook has partnered with The Daily Telegraph, a broadsheet British newspaper, to run a series of features about the company, Business Insider has found – including stories that defend it on hot-button issues it has been criticised over like terrorist content, online safety, cyberbullying, fake accounts, and hate speech.

Saudis gained access to Amazon CEO Bezos' phone: Bezos' security chief

Saudis gained access to Amazon CEO Bezos' phone: Bezos' security chief

WASHINGTON (Reuters) - The security chief for Amazon chief executive Jeff Bezos said on Saturday that the Saudi government had access to Bezos’ phone and gained private information from it.

Robots Vs Robocalls

Robots Vs Robocalls

AI-backed text-to-speech technology applied to sales solicitation enables the robocall to simulate a back-and-forth conversation and make real-time adjustments to follow-up questions based on keywords, context, etc., making human-robot differentiation more difficult.

Can a VPN keep you safe from 36 new 4G LTE security vulnerabilities?

Can a VPN keep you safe from 36 new 4G LTE security vulnerabilities?

A team of four researchers from South Korea’s KAIST, the country’s premier tech institution, have discovered 36 new vulnerabilities in 4G LTE that have wide ranging security and privacy implications.

Amazon’s Antitrust Antagonist Has a Breakthrough Idea

Amazon’s Antitrust Antagonist Has a Breakthrough Idea

Once-robust monopoly laws have been marginalized, Ms. Khan wrote, and consequently Amazon is amassing structural power that lets it exert increasing control over many parts of the economy.

Artificial intelligence senses people through walls

Artificial intelligence senses people through walls

The researchers use a neural network to analyze radio signals that bounce off people’s bodies, and can then create a dynamic stick figure that walks, stops, sits, and moves its limbs as the person performs those actions.

From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic

From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic

"These unintentional microphones sense speech with high enough fidelity for the Shazam service to recognize a song recorded through the hard drive." The team's research work, scheduled to be presented in May at the 2019 IEEE Symposium on Security and Privacy , explores how it's possible to alter HDD firmware to measure the offset of a disk drive's read/write head from the center of the track it's seeking.

Flaws in 4G and 5G can lead to spying on location and calls, researchers find

Flaws in 4G and 5G can lead to spying on location and calls, researchers find

Attack works by making several calls In the paper, the researchers outline an attack called Torpedo, which can be used to determine whether a device is in a certain location. The attack exploits an issue in how devices send “paging” information when calls or texts are received.

Profs prep promising privacy-protecting proxy program... Yes, it is possible to build client-server code that safeguards personal info

Profs prep promising privacy-protecting proxy program... Yes, it is possible to build client-server code that safeguards personal info

In a paper scheduled to be presented on Thursday at the USENIX Networked Systems Design and Implementation conference , co-authors Frank Wang (MIT), Ronny Ko and James Mickens (Harvard) describe a system called Riverbed – not to be confused with an identically named IT company – that consists of a proxy service to oversee the handling of data locally and on remote servers.

Protecting user privacy: an approach for untraceable web browsing history and unambiguous user profiles

Protecting user privacy: an approach for untraceable web browsing history and unambiguous user profiles

In this paper, we aim to study the following problem: how many links and what links should be added to a user’s browsing history to boost user privacy while retaining high utility. When it comes to selecting actual links to hit the desired topic counts, PBooster needs access to the user’s friend list on social media.

Long untouchable, web giants now know what it feels like to be hunted

Long untouchable, web giants now know what it feels like to be hunted

When in 2011, for example, the Guardian printed shocking revelations of tabloid phone-hacking and, particularly, the news that reporters had hacked the mobile phone of the murdered schoolgirl Milly Dowler, many observers concluded that this indicated a crisis for the British newspaper industry. Social media platforms will only change their behaviour when compelled to do so by legislation.

Staying off social media is not enough to protect your privacy, study says

Staying off social media is not enough to protect your privacy, study says

Even if you're not a user of a social media platform, it's possible to create a 95% accurate profile of you from your friends' accounts, according to new research.

Websites can steal browser data via extensions APIs

Websites can steal browser data via extensions APIs

The researcher also created a tool that lets users test if their extensions also contain vulnerable APIs that can be exploited by malicious websites. More details about Somé's work are available in a research paper entitled "EmPoWeb: Empowering Web Applications with Browser Extensions," available for download in a PDF format from here or here .

“Change Encryption Laws Or We'll Pay Zero Tax Elsewhere" Says Tech Giants — The Betoota Advocate

“Change Encryption Laws Or We'll Pay Zero Tax Elsewhere" Says Tech Giants — The Betoota Advocate

LOUIS BURKE | Culture | CONTACT Multinational tech companies are threatening to leave the country after the passing of the Access and Assistance Bill, which could cost the government up to $0 in taxes if they make good on their threat.

German federal office BSI publishes Telemetry analysis

German federal office BSI publishes Telemetry analysis

The research paper, which is available in English (partially) and German, provides a deep analysis of Telemetry functionality that Microsoft implemented in the company's Windows 10 operating system.

TRAI to analyse implications of over-the-top services’ growth

TRAI to analyse implications of over-the-top services’ growth

The Telecom Regulatory Authority of India (TRAI) on Monday re-started the discussion on “regulatory issues and economic concerns” with regard to over-the-top (OTT) services such as WhatsApp and Skype, with its consultation paper on ‘Regulatory Framework for OTT Communication Services’.

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

The paper outlines that some SSD drives (including Samsung and Crucial) do not actually encrypt the data properly, and that they can be easily by-passed without a system password.

Ethical Tech

Ethical Tech

Just products and software that respect the freedom and privacy of your loved ones: gifts you can feel good about. Plus, our crib notes below will help you explain why this version is better than the one they've heard of (and spread the word about software freedom, too).

Genome Hackers Show No One’s DNA Is Anonymous Anymore

Genome Hackers Show No One’s DNA Is Anonymous Anymore

In fact, according to new research led by Erlich, published today in Science, more than 60 percent of Americans with European ancestry can be identified through their DNA using open genetic genealogy databases, regardless of whether they’ve ever sent in a spit kit.

Aadhaar, the world's largest biometric identity database, approved by India's Supreme Court

Aadhaar, the world's largest biometric identity database, approved by India's Supreme Court

Key points: Indian residents cannot receive welfare food rations, other benefits without being entered into Aadhaar Until today, Indian residents have had to link their private bank accounts, mobile numbers and even school admissions to their profile in the government database.

Europe just voted to wreck the internet, spying on everything and censoring vast swathes of our communications

Europe just voted to wreck the internet, spying on everything and censoring vast swathes of our communications

Lobbyists for "creators" threw their lot in with the giant entertainment companies and the newspaper proprietors and managed to pass the new EU Copyright Directive by a hair's-breadth this morning, in an act of colossal malpractice to harm to working artists will only be exceeded by the harm to everyone who uses the internet for everything else.

Researchers Discover Computer Screens Emit Sounds that Reveal Data

Researchers Discover Computer Screens Emit Sounds that Reveal Data

What’s happening, according to the research, is that some components in the power supplies of LCD monitors, which is nearly all flat-screen displays, emit faint sounds as the load on them changes.

Guess What: Ad Blockers Don't Block Ads That Well

Guess What: Ad Blockers Don't Block Ads That Well

"For the Chromium-based browsers (Google Chrome and Opera), we found that because of the built-in PDF reader, an adversary or tracker can still initiate authenticated requests to third-parties," the paper said.

I wish I could quit you, but cookies find a way: How to sidestep browser tracking protections

I wish I could quit you, but cookies find a way: How to sidestep browser tracking protections

Modern browsers will place cookie files in response to both first- and third-party requests and they do so in a way that's open to security risks, like cross-site request forgery and cross-site script inclusion, and to privacy abuse, like third-party tracking.

Scottish Government to Delete Biometric Data After Retention Periods • Digit

Scottish Government to Delete Biometric Data After Retention Periods • Digit

Because retaining biometric data is deemed in opposition with a citizen’s right to privacy, the Scottish government is taking the approach that following the end of a prescribed retention period all records will be deleted, including those held as backup or copied and stored elsewhere.

Academics Discover New Bypasses for Browser Tracking Protections and Ad Blockers

Academics Discover New Bypasses for Browser Tracking Protections and Ad Blockers

Researchers looked at how browsers prevent third-party services —such as advertising companies— from tracking users via cross-site requests and persistent cookies. For their research, the KU Leuven team tested if browsers or extensions blocked cross-site requests for user cookie files initiated via: