Researchers At U.S. Universities Are Reportedly Helping China To Track Its Citizens

Researchers At U.S. Universities Are Reportedly Helping China To Track Its Citizens

The report from the FT's Madhumita Murgia states that at least nine academic papers have been co-written by US academics alongside firms that either sell surveillance technology to the Chinese government, or alongside institutions with links to nation's military, such as China’s National University of Defense Technology (NUDT).

Defense against the Darknet, or how to accessorize to defeat video surveillance

Defense against the Darknet, or how to accessorize to defeat video surveillance

"The idea behind this work is to be able to circumvent security systems that use a person detector to generate an alarm when a person enters the view of a camera," explained Wiebe Van Ranst, a PhD researcher at KU Leuven, in an email to The Register .

Bellingcat - Creating an Android Open Source Research Device on Your PC - bellingcat

Bellingcat - Creating an Android Open Source Research Device on Your PC - bellingcat

Installation: Genymotion and VirtualBox. For this guide, we will use Genymotion to set up an Android virtual device on Windows. Just like with a real phone, you can search for and install apps onto your Android virtual device through the Google Play store.

Microsoft accused of being 'complicit' in persecution of 1 million Muslims after helping China develop sinister AI capabilities

Microsoft accused of being 'complicit' in persecution of 1 million Muslims after helping China develop sinister AI capabilities

US politicians slammed Microsoft for partnering with a Chinese military university on AI research that experts say could be used in Beijing's unprecedented persecution of its Muslim minority, with one prominent senator calling the partnership "deeply disturbing," and accusing Microsoft of being "complicit" in Chinese human rights abuses.

Two Thirds of Hotel Sites Leak Guest Booking Info to Third-Parties

Two Thirds of Hotel Sites Leak Guest Booking Info to Third-Parties

Third-party services running on most hotel websites have access to guest booking information, including personal data and payment card details. "This information could allow these third-party services to log into a reservation, view personal details, and even cancel the booking altogether," Wueest says.

Does Google meet its users’ expectations around consumer privacy? This news industry research says no

Does Google meet its users’ expectations around consumer privacy? This news industry research says no

Do you expect Google to collect data about a person’s locations when a person is not using a Google platform or app?.

Massive bank app security holes: You might want to go back to that money under the mattress tactic

Massive bank app security holes: You might want to go back to that money under the mattress tactic

Decompiling the app also allows an adversary to understand how the app detects jailbroken mobile devices, which, once vulnerabilities (such as API keys, private keys, and credentials) are found in the source code, results in theft of money through banking trojans, username/password theft or account takeover using overlay screens, and the theft of confidential data."

EFF’s New ‘Threat Lab’ Dives Deep into Surveillance Technologies—And Their Use and Abuse

EFF’s New ‘Threat Lab’ Dives Deep into Surveillance Technologies—And Their Use and Abuse

EFF is proud to announce its newest investigative team: the Threat Lab. Using a combination of research skills, the Threat Lab will take a deep dive into how surveillance technologies are used to target communities, activists, or individuals.

HTTPS Isn't Always As Secure As It Seems

HTTPS Isn't Always As Secure As It Seems

Vulnerabilities that are full-on "leaky" involve more deeply flawed encryption channels between browsers and web servers that would enable an attacker to decrypt all the traffic passing through them.

Facebook and Google: This is What an Effective Ad Archive API Looks Like

Facebook and Google: This is What an Effective Ad Archive API Looks Like

The 10 experts are based at Oxford University, the University of Amsterdam, Vrije Universiteit Brussel, Stiftung Neue Verantwortung, and other institutions. To do this work effectively, there must be fully functional, open APIs that enable advanced research and the development of tools to analyse political ads targeted to EU residents.

There is mysterious ‘undocumented technology’ hidden on Intel computer chips, researchers say

There is mysterious ‘undocumented technology’ hidden on Intel computer chips, researchers say

‘We found out that it is possible to access Intel VISA on ordinary motherboards, with no specific equipment needed,’ said Positive Technologies expert Maxim Goryachy. Intel told Metro that the VISA vulnerability was real, but said it ‘required physical access’ meaning that hackers couldn’t activate it over the internet and begin stealing information.

36 Undiscovered Flaws in 4G LTE Revealed by a New Security Tool

36 Undiscovered Flaws in 4G LTE Revealed by a New Security Tool

The way LTEFuzz works is that by using controllable open-source LTE software that can dynamically generate test cases and inject them into live networks, the KAIST team was able to see how specific various devices responded to potential attacks.

Android ecosystem of pre-installed apps is a privacy and security mess

Android ecosystem of pre-installed apps is a privacy and security mess

Researchers found that many of these pre-installed apps have access to very intrusive permissions out of the box, collect and send data about users to advertisers, and have security flaws that often remain unpatched.

Genetic testing firms share your DNA data more than you think

Genetic testing firms share your DNA data more than you think

Driving the news: This month FamilyTreeDNA came under fire for voluntarily giving the FBI routine access to its database of more than 1 million users' data, allowing agents to test DNA samples from crime scenes against customers' genetic information to look for family matches.

Privacy: A hole in the virtual medicine cabinet

Privacy: A hole in the virtual medicine cabinet

If you happen to have entered that information into popular prescription drug-tracking Android phone apps, some of it might be shared with data giants like Google, Amazon and Facebook. During the installation process, users are required to grant app developers permission to start collecting personal information.

New BitLocker attack puts laptops storing sensitive data at risk

New BitLocker attack puts laptops storing sensitive data at risk

Image: Denis Andzakovic A security researcher has come up with a new method of extracting BitLocker encryption keys from a computer's Trusted Platform Module (TPM) that only requires a $27 FPGA board and some open-sourced code.

Federal agency looking at fitness trackers for public sector workers

Federal agency looking at fitness trackers for public sector workers

"Interactive insurance policies give consumers the opportunity to receive discounts on premiums for sharing health-related information through wearable tracking devices," says the memo.

'Yelp for conservatives' MAGA app leaks users data

'Yelp for conservatives' MAGA app leaks users data

ZDNet has contacted 63red and its founder about Baptise's findings earlier today so the company can take action and update its app to protect users' data.

China database lists 'breedready' status of 1.8 million women

China database lists 'breedready' status of 1.8 million women

An open database in China contains the personal information of more than 1.8 million women, including their phone numbers, addresses, and something called “BreedReady” status, according to a researcher.

U.S. users are leaving Facebook by the millions, Edison Research says

U.S. users are leaving Facebook by the millions, Edison Research says

Kimberly Adams: In your survey you found an estimated drop of 15 million fewer Facebook users in the U.S. today than in 2017. Courtesy of Edison Research and Triton Digital Adams: Do you have any sense as to why people are leaving Facebook in particular?

Accessibility vs Security: Breaking CAPTCHAs by exploiting their accessibility features

Accessibility vs Security: Breaking CAPTCHAs by exploiting their accessibility features

We built an automated system that solves audio captchas using existing speech recognition services. In the paper, we also discussed that all other audio captchas can be solved by leveraging existing speech recognition services.

9 Digital Identity Trends That Will Make or Break Businesses in 2019

9 Digital Identity Trends That Will Make or Break Businesses in 2019

4. Deepfakes mean “Fake News” With the proliferation of emerging “deepfakes” technologies, news and social media channels will be under pressure to guard against fraud.

THINK FACEBOOK CAN MANIPULATE YOU? LOOK OUT FOR VIRTUAL REALITY

THINK FACEBOOK CAN MANIPULATE YOU? LOOK OUT FOR VIRTUAL REALITY

LOOK OUT FOR VIRTUAL REALITY Elissa Redmiles , University of Maryland As Facebook users around the world are coming to understand, some of their favorite technologies can be used against them.

Ultrasound Tracking Could Be Used to Deanonymize Tor Users

Ultrasound Tracking Could Be Used to Deanonymize Tor Users

In tests carried out by Mavroudis, the researcher has intercepted some of the traffic these ultrasound beacons trigger on behalf of the phone, traffic which contains details such as the user's real IP address, geo-location coordinates, telephone number, Android ID, IMEI code, and device MAC address.

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

While this algorithm is efficient and fast, there have been recent improvements in attacks (PDF Warning) against the signature scheme GeMSS is based on that suggest that there may be problems that could surface with more research.

How Has Tor Helped You? Send Us Your Story.

How Has Tor Helped You? Send Us Your Story.

Last September, we asked to hear stories about how Tor has helped protect people online. How To Share Your Story There are several ways you can tell us how Tor has helped you.

University of Michigan Internet-Wide Scanning Research

University of Michigan Internet-Wide Scanning Research

The data collected through these connections consists only of information that is already publicly visible on the Internet. It helps computer scientists study the deployment and configuration of network protocols and security technologies.

China Uses DNA to Track Its People, With the Help of American Expertise

China Uses DNA to Track Its People, With the Help of American Expertise

It was underwritten in part by Thermo Fisher, a company that has come under intense criticism for its equipment sales in China, and Illumina, a San Diego company that makes gene sequencing instruments.

Researchers warn of serious password manager flaws

Researchers warn of serious password manager flaws

'Although password managers provide some utility for storing login/passwords and limit password reuse, these applications are a vulnerable target for the mass collection of this data through malicious hacking campaigns.' ISE researchers concentrated their efforts on four of the most popular password management services around: 1Password, in both legacy and current forms, Dashlane, KeePass, and LastPass.

Tor traffic from individual Android apps detected with 97 percent accuracy

Tor traffic from individual Android apps detected with 97 percent accuracy

Image: ZDNet, Tor Project Italian academics say they've developed an algorithm that can detect the patterns of Android app activity inside Tor traffic with an accuracy of 97 percent.

More