Is Your Smartphone Really Cheating You?

Is Your Smartphone Really Cheating You?

Most of this information is utilized by applications to enhance the user experience—thereby ensuring that your phone apps switch swiftly among landscape and portrait modes, and keep you on the correct track for your commute—but a section of this information is logged and stored based on the decisions of the handset manufacturer.

The Motherboard Guide to Not Getting Hacked

The Motherboard Guide to Not Getting Hacked

The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks , smart home robots that could kill you , and your telecom providers who routinely lose customer data and unwittingly help hackers steal your phone number (and sometimes your money.) Meanwhile, an ever-growing and increasingly passive surveillance apparatus that has trickled down to state and local police is an ever-present threat to our digital privacy and increasingly uses technology that is developed by Silicon Valley giants who are supposedly consumer-focused.

Police: Woman remotely wipes phone in evidence after shooting

Police: Woman remotely wipes phone in evidence after shooting

Grant, 24, of Willow Avenue, may have been the driver of a vehicle involved in an Oct. 23 drive-by shooting on Van Vranken Avenue, near Lang Street, so they obtained her phone, according to police allegations filed in court.

Cloudflare brings its privacy-focused 1.1.1.1 DNS switching app to phones

Cloudflare brings its privacy-focused 1.1.1.1 DNS switching app to phones

If you’re concerned about your government snooping on your browsing history, or simply want an easy way to access sites blocked in your part of the world, Cloudflare’s got you covered with a new app for Android and iOS.

IOS 11 Horror Story: the Rise and Fall of iOS Security

IOS 11 Horror Story: the Rise and Fall of iOS Security

If the attacker has your iPhone and your passcode is compromised, you lose your data; your passwords to third-party online accounts; your Apple ID password (and obviously the second authentication factor is not a problem).

We Need Decoy Operating Systems on Smartphones

We Need Decoy Operating Systems on Smartphones

Whether it violates the Fourth Amendment of the U.S. Constitution or not, it’s an unfortunate fact that U.S. Customs and Border Protection agents routinely force travelers entering the country to unlock their phone for inspection under the threat of confiscation or prolonged detainment.

Librem 5 Development Kits: we are getting there! – Purism

Librem 5 Development Kits: we are getting there! – Purism

So once the PCBs finally arrived, on the same day we set up all the machines and worked until 5 a.m. to make the first 10 “golden sample” prototypes of the development base boards:

Net Neutrality, Surveillance, Privacy and the World We Live In.

Net Neutrality, Surveillance, Privacy and the World We Live In.

In plain English this means that Spectrum, for example, can contact Netflix, or the like, and demand, “if you want your content to continue being delivered at full customer bandwidth, then you now need to pay us a premium fee.” This, in fact, is not a new issue and companies like Google, Spotify and Riot Games have already complained because their service is slower than it should be.

Starting November 1st, Chinese police can go to any Chinese ISP to copy your data

Starting November 1st, Chinese police can go to any Chinese ISP to copy your data

It goes on top of a law passed in 2016 that mandates ISPs store 6 months of IP address connection data and makes it very clear that your internet traffic is available to be monitored.

Your Smartphone’s Location Data Is Worth Big Money to Wall Street

Your Smartphone’s Location Data Is Worth Big Money to Wall Street

They circled Tesla’s 370 acres in Fremont, Calif., on an online map, creating a digital corral to isolate smartphone location signals that emanated from within it. Thasos, which leases databases of trillions of geographic coordinates collected by smartphone apps, set its computers to find the pings created at Tesla’s factory, then shared the...

Passcodes are protected by Fifth Amendment, says court

Passcodes are protected by Fifth Amendment, says court

Regardless of the “foregone conclusion” standard, producing a passcode is testimonial and has the potential to harm the defendant, just like any other Fifth Amendment violation would, the Florida court said.

Feds took woman’s iPhone at border, she sued, now they agree to delete data

Feds took woman’s iPhone at border, she sued, now they agree to delete data

According to the agency's most recent figures (Fiscal Year 2017), out of 397 million international travelers, only 30,200 digital border searches were conducted—or approximately 0.007 percent.

A new standard for government based data collection – PrivaSecTech

I would like to see every government organization publish whom they have shared personal information with. In summary, related to the specific case at hand, I feel that StatsCan like every other organization in Canada, including political parties, should be bound by privacy laws.

Apple's T2 security chip disconnects a MacBook's microphone when users close the lid

Apple's T2 security chip disconnects a MacBook's microphone when users close the lid

Apple revealed today that all new notebooks that come with a built-in T2 security chip will now disconnect the built-in microphone at the hardware level when users close their devices' lids.

IPhone bug gives access to your private photos

IPhone bug gives access to your private photos

Jose Rodriguez, a Spanish amateur cybersecurity specialist, has discovered a bug in iOS 12 that allows an attacker with physical access to a locked iPhone to access all of its photos.

Court: Teen’s driving killed someone, but he can’t be forced to give up passcode

Court: Teen’s driving killed someone, but he can’t be forced to give up passcode

A Florida state appellate court has ruled that an inebriated teenager involved in a car crash that resulted in the death of another person cannot be compelled to provide a passcode to his iPhone 7—the boy can indeed invoke a Fifth Amendment privilege, protecting him against self-incrimination.

Nobody’s Cellphone Is Really That Secure

Nobody’s Cellphone Is Really That Secure

Given the wealth of insecurities and the array of eavesdropping techniques, it’s safe to say that lots of countries are spying on the phones of both foreign officials and their own citizens.

When Trump Phones Friends, the Chinese and the Russians Listen and Learn

When Trump Phones Friends, the Chinese and the Russians Listen and Learn

And since becoming president, Mr. Trump has agreed to a slightly cumbersome arrangement of having two official phones: one for Twitter and other apps, and one for calls.

How to encrypt your entire life in less than an hour

How to encrypt your entire life in less than an hour

Hackers were then able to use his email and password to gain access to his Twitter and Pinterest accounts. Tip #5: Send private text messages with Signal If you want reasonably private browsing (no system can ever be 100% secure), you should use Tor.

Apple Reportedly Blocked Police iPhone Hacking Tool and Nobody Knows How

Apple Reportedly Blocked Police iPhone Hacking Tool and Nobody Knows How

On Wednesday, he cited sources from the forensic community who’ve told him that Apple’s efforts to keep bad actors and law enforcement from cracking into its users’ phones have paid off. In March, Forbes reported that GrayShift counts at least one ex-Apple security engineer as part of its team.

Why the NSA Called Me After Midnight and Requested My Source Code

Why the NSA Called Me After Midnight and Requested My Source Code

Maybe people would die, or at least Dave instilled that impression on me as he politely asked if I would be willing to give him my source code; all the while, apologizing for not being able to tell me anything more about the situation.

My phone is spying on me, so I decided to spy on it

My phone is spying on me, so I decided to spy on it

For about a week I'm going to intercept and record every bit of data sent from my two most personal internet-connected devices: my phone and my laptop. I think lots of requests will be sharing data with big companies like Facebook, Google, Twitter, Apple and Microsoft.

Apple Just Killed The 'GrayKey' iPhone Passcode Hack

Apple Just Killed The 'GrayKey' iPhone Passcode Hack

Uncloaked by Forbes in March, Atlanta-based Grayshift promised governments its GrayKey tech could crack the passcodes of the latest iOS models, right up to the iPhone X. Multiple sources familiar with the GrayKey tech tell Forbes the device can no longer break the passcodes of any iPhone running iOS 12 or above.

How smartphone apps track users and share data

How smartphone apps track users and share data

Researchers at Oxford university analysed approximately a third of the apps available in Google’s Play Store in 2017 and found that the median app could transfer data to 10 third parties, with one in five apps able to share data with more than 20.

Samsung patents a fingerprint reader that works on the entire screen

Samsung patents a fingerprint reader that works on the entire screen

The first patent showed an implementation of the fingerprint reader on the screen similar to what we see on other smartphones, where only part of the screen can be used as a fingerprint scanner. However, the second patent describes a more advanced fingerprint scanner that uses the full-screen screen and a low-power independent processor.

UK police are buying top secret hacking tech to break into iPhones

UK police are buying top secret hacking tech to break into iPhones

At least three police forces in England have spent thousands of pounds on new hacking technology to get into iPhones, according to financial documents seen by WIRED.

Apple is distancing itself again from Google and Facebook with a new privacy website

Apple is distancing itself again from Google and Facebook with a new privacy website

Part of the website focuses on Apple's privacy features and the ways it limits the data it collects. The other part focuses on how a user can limit the data that's collected about him or her, including a new portal for downloading your personal data and deleting your Apple account.

Google will stop bundling its apps on Android phones in response to EU fine

Google will stop bundling its apps on Android phones in response to EU fine

In response to the European Union's $5 billion antitrust ruling in July, Google will change how it bundles its apps on Android phones and charge a licensing fee for phone makers that want to pre-install apps like Gmail, Maps, and YouTube in the EU.

35 Million U.S. Voter Records for Sale on the Dark Web

35 Million U.S. Voter Records for Sale on the Dark Web

Apparently, the data that is being offered for sale comes from updated statewide voter lists, and includes millions of full addresses, phone numbers, and names.

This Smartphone App Can Spot Depression Even Before You Find It

This Smartphone App Can Spot Depression Even Before You Find It

This is why a startup named Mindstrong Health from Palo Alto, California is trying to help people find out about their conditions in the most ingenious way — through a smartphone app!

More