The report from the FT's Madhumita Murgia states that at least nine academic papers have been co-written by US academics alongside firms that either sell surveillance technology to the Chinese government, or alongside institutions with links to nation's military, such as China’s National University of Defense Technology (NUDT).
"The idea behind this work is to be able to circumvent security systems that use a person detector to generate an alarm when a person enters the view of a camera," explained Wiebe Van Ranst, a PhD researcher at KU Leuven, in an email to The Register .
Installation: Genymotion and VirtualBox. For this guide, we will use Genymotion to set up an Android virtual device on Windows. Just like with a real phone, you can search for and install apps onto your Android virtual device through the Google Play store.
US politicians slammed Microsoft for partnering with a Chinese military university on AI research that experts say could be used in Beijing's unprecedented persecution of its Muslim minority, with one prominent senator calling the partnership "deeply disturbing," and accusing Microsoft of being "complicit" in Chinese human rights abuses.
Third-party services running on most hotel websites have access to guest booking information, including personal data and payment card details. "This information could allow these third-party services to log into a reservation, view personal details, and even cancel the booking altogether," Wueest says.
Decompiling the app also allows an adversary to understand how the app detects jailbroken mobile devices, which, once vulnerabilities (such as API keys, private keys, and credentials) are found in the source code, results in theft of money through banking trojans, username/password theft or account takeover using overlay screens, and the theft of confidential data."
EFF is proud to announce its newest investigative team: the Threat Lab. Using a combination of research skills, the Threat Lab will take a deep dive into how surveillance technologies are used to target communities, activists, or individuals.
The 10 experts are based at Oxford University, the University of Amsterdam, Vrije Universiteit Brussel, Stiftung Neue Verantwortung, and other institutions. To do this work effectively, there must be fully functional, open APIs that enable advanced research and the development of tools to analyse political ads targeted to EU residents.
‘We found out that it is possible to access Intel VISA on ordinary motherboards, with no specific equipment needed,’ said Positive Technologies expert Maxim Goryachy. Intel told Metro that the VISA vulnerability was real, but said it ‘required physical access’ meaning that hackers couldn’t activate it over the internet and begin stealing information.
The way LTEFuzz works is that by using controllable open-source LTE software that can dynamically generate test cases and inject them into live networks, the KAIST team was able to see how specific various devices responded to potential attacks.
Researchers found that many of these pre-installed apps have access to very intrusive permissions out of the box, collect and send data about users to advertisers, and have security flaws that often remain unpatched.
Driving the news: This month FamilyTreeDNA came under fire for voluntarily giving the FBI routine access to its database of more than 1 million users' data, allowing agents to test DNA samples from crime scenes against customers' genetic information to look for family matches.
If you happen to have entered that information into popular prescription drug-tracking Android phone apps, some of it might be shared with data giants like Google, Amazon and Facebook. During the installation process, users are required to grant app developers permission to start collecting personal information.
Image: Denis Andzakovic A security researcher has come up with a new method of extracting BitLocker encryption keys from a computer's Trusted Platform Module (TPM) that only requires a $27 FPGA board and some open-sourced code.
"Interactive insurance policies give consumers the opportunity to receive discounts on premiums for sharing health-related information through wearable tracking devices," says the memo.
An open database in China contains the personal information of more than 1.8 million women, including their phone numbers, addresses, and something called “BreedReady” status, according to a researcher.
Kimberly Adams: In your survey you found an estimated drop of 15 million fewer Facebook users in the U.S. today than in 2017. Courtesy of Edison Research and Triton Digital Adams: Do you have any sense as to why people are leaving Facebook in particular?
We built an automated system that solves audio captchas using existing speech recognition services. In the paper, we also discussed that all other audio captchas can be solved by leveraging existing speech recognition services.
4. Deepfakes mean “Fake News” With the proliferation of emerging “deepfakes” technologies, news and social media channels will be under pressure to guard against fraud.
LOOK OUT FOR VIRTUAL REALITY Elissa Redmiles , University of Maryland As Facebook users around the world are coming to understand, some of their favorite technologies can be used against them.
In tests carried out by Mavroudis, the researcher has intercepted some of the traffic these ultrasound beacons trigger on behalf of the phone, traffic which contains details such as the user's real IP address, geo-location coordinates, telephone number, Android ID, IMEI code, and device MAC address.
While this algorithm is efficient and fast, there have been recent improvements in attacks (PDF Warning) against the signature scheme GeMSS is based on that suggest that there may be problems that could surface with more research.
Last September, we asked to hear stories about how Tor has helped protect people online. How To Share Your Story There are several ways you can tell us how Tor has helped you.
It was underwritten in part by Thermo Fisher, a company that has come under intense criticism for its equipment sales in China, and Illumina, a San Diego company that makes gene sequencing instruments.
'Although password managers provide some utility for storing login/passwords and limit password reuse, these applications are a vulnerable target for the mass collection of this data through malicious hacking campaigns.' ISE researchers concentrated their efforts on four of the most popular password management services around: 1Password, in both legacy and current forms, Dashlane, KeePass, and LastPass.