Federal Researchers Complete Second Round of Problematic Tattoo Recognition Experiments

Federal Researchers Complete Second Round of Problematic Tattoo Recognition Experiments

The latest experiment was called Tatt-E, which is short for “Tattoo Recognition Technology Evaluation.” Using tattoo images collected by state and local law enforcement from incarcerated people, NIST tested algorithms created by state-backed Chinese Academy of Sciences and MorphoTrak, a subsidiary of the French corporation Idemia.

Companies Using Push Notifications for Mobile App Uninstall Tracking

Companies Using Push Notifications for Mobile App Uninstall Tracking

Using uninstall tracking based on push notifications well-known companies that provide mobile apps are still able to reach out to consumers in efforts to lure them back – and potentially aim targeted advertising efforts at them – even though they have deleted the application.

Microsoft made $1.3 billion in cash payments in GitHub deal

Microsoft made $1.3 billion in cash payments in GitHub deal

(Reuters) - Microsoft Corp (MSFT.O) said in a filing late Thursday it had made $1.3 billion in cash payments in connection to its acquisition of coding hosting startup GitHub. Software developers use GitHub to host and share code as they write it, often using it to distribute open source software.

Preannouncement: Relaunch of mailbox.org

Preannouncement: Relaunch of mailbox.org

After eight months of busy work behind the scenes, we can now announce that from next week, mailbox.org will present itself in a new outfit. Our team is really looking forward to the relaunch and the new “mailbox.org 2.0”.

Pssst... Wanna buy a digital identity? Only $50

Pssst... Wanna buy a digital identity? Only $50

It finds that for under $50, criminals can sell a person's complete digital life on the dark web, including data from breached social media accounts; banking details; remote access to servers or desktops; data from popular services like Uber, Netflix, and Spotify; and accounts for gaming websites, dating apps and porn websites, which might include credit card information.

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

The paper outlines that some SSD drives (including Samsung and Crucial) do not actually encrypt the data properly, and that they can be easily by-passed without a system password.

Microsoft Office Was Hackers' Favorite App Target This Year

Microsoft Office Was Hackers' Favorite App Target This Year

Kaspersky blocked 796.8 million attacks around the globe in Q1 2018, and the company found that one popular productivity suite was the victim of more than 47 percent of exploits: Microsoft Office.

Your mall is watching you

Your mall is watching you

“We never felt at ease with that because it could be used for discrimination.” The general manager of Saskatoon’s Centre Mall, David Bubnick, says via email that the aggregated information helps “identify visitor trends, which helps us determine our retail mix and offer new retailers and services to suit the community.” A Cineplex Digital Media spokesperson echoed the reassurance, adding “there is no personal identification, no pictures stored and no tracking or profiling of individuals.”

New Signal privacy feature removes sender ID from metadata

New Signal privacy feature removes sender ID from metadata

Plenty of messaging apps use strong encryption to make it next to impossible for law enforcement officers or other potential adversaries to read communications sent between parties. Sealed sender, which puts most user information inside the encrypted message, uses two new devices to get around this potential privacy risk:

In Groundbreaking Decision, Feds Say Hacking DRM to Fix Your Electronics Is Legal

In Groundbreaking Decision, Feds Say Hacking DRM to Fix Your Electronics Is Legal

The Librarian of Congress and US Copyright Office just proposed new rules that will give consumers and independent repair experts wide latitude to legally hack embedded software on their devices in order to repair or maintain them.

An open letter to Tim Cook, from

An open letter to Tim Cook, from

At /e/Foundation, we’re building a new mobile ecosystem for users first: it respects their personal data privacy, it’s open source, and we are making it as attractive as possible, for Mom and Dad users.

6 Cybersecurity Tools You’ll Need to Know About in 2019

6 Cybersecurity Tools You’ll Need to Know About in 2019

Incapsula is another leading cybersecurity company offering a truly impressive array of cloud-based security and website acceleration services. Employees are rewarded for identifying components of real and simulated attacks via HoxHunt, creating a gamified user experience that helps detect gaps in personal threat response as well as company-wide vulnerabilities.

ASUS Z390 Motherboards Automatically Push Software into Your Windows Installation

ASUS Z390 Motherboards Automatically Push Software into Your Windows Installation

Our Windows 10 image is based on Windows 10 April 2018 Update and lacks in-built drivers for the integrated network controllers.Upon first boot, with the machine having no LAN or Internet connectivity, we were greeted by an ASUS-specific window in the bottom right corner of our screen, asking whether we'd like to install the network drivers and download "Armoury Crate".

Report: Israeli spyware helping dictatorships track dissidents, minorities

Report: Israeli spyware helping dictatorships track dissidents, minorities

The investigation, based on 100 sources in 15 countries, including many current and former employees of the Israeli companies producing the cyber products, concluded that the Israeli regulatory bodies that are supposed to ensure that exports aren’t used for illegal or immoral purposes by the client governments are not stopping the sales even when there is clear evidence of abuse.

Ethical Tech

Just products and software that respect the freedom and privacy of your loved ones: gifts you can feel good about. Plus, our crib notes below will help you explain why this version is better than the one they've heard of (and spread the word about software freedom, too).

Buggy software in popular connected storage drives can let hackers read private data

Buggy software in popular connected storage drives can let hackers read private data

The researchers Paulos Yibelo and Daniel Eshetu said the software running on three of the devices they tested — NetGear Stora, Seagate Home and Medion LifeCloud — can allow an attacker to remotely read, change and delete data without requiring a password.

The Employer-Surveillance State

The Employer-Surveillance State

Michel Anteby, a Boston University sociologist and business scholar who has watched how monitoring affects employees at the TSA and other workplaces, has also noticed that the more employees are watched, the harder they try to avoid being watched, and the harder management tries to watch them.

Whonix and Tor Limitations

Whonix and Tor Limitations

For example, it is poor operational security to use the same Whonix-Workstation to check email via Tor, while simultaneously publishing an anonymous document. If a user selects a new entry and exit relay each time the Tor network is used, the attacker can correlate all traffic sent with a probability of (c/n)2.

Schneier on Security

The primary reason computers are insecure is that most buyers aren't willing to pay -- in money, features, or time to market -- for security to be built into the products and services they want.

Mark Zuckerberg Is Trying to Transform Education. This Town Fought Back.

Mark Zuckerberg Is Trying to Transform Education. This Town Fought Back.

As the school year in Connecticut went on, some parents tried to move their kids into classes that weren’t using the platform — but administrators said they couldn’t, because it would disrupt the distribution of students to teachers.

Google: Third-Party Apps Must Stop Scanning Gmail for Ad Targeting

Google: Third-Party Apps Must Stop Scanning Gmail for Ad Targeting

The new restrictions, which go into effect on Jan. 9, ban developers of Gmail add-ons from using your email data for any internet-based advertising or handing it off to marketing firms.

Google+ shutting down after users' data is exposed

Google+ shutting down after users' data is exposed

Google said it would continue to offer private Google+ powered networks for businesses currently using the software. In the past, the company had been reluctant to share data on how often Google+ was used, but now, facing the fall out of exposed data, the firm appears keen to play down its importance.

How to Live Without Google

How to Live Without Google

We host @duckduckgo.com addresses on FastMail, an independent, paid service that also includes calendar and contacts support across all devices. Ghost is both a hosted (paid) and self-installable blogging platform, tracker-free by default and run by a non-profit foundation.

Apple's New Proprietary Software Locks Kill Independent Repair on New MacBook Pros

Apple's New Proprietary Software Locks Kill Independent Repair on New MacBook Pros

A separate internal training presentation obtained by Motherboard about how to use the diagnostics states that the “Apple Service Toolkit and Apple Service Toolkit 2 are available only to persons working at Apple-authorized service facilities.” This means that it will become impossible for you to repair your new MacBook Pro at home, or for an independent repair provider to repair it for you.

Online survival Kit

Online survival Kit

Before you even think about making your computer secure or installing software for encrypting communications or data, you should adopt some good habits by following these common sense tips to help you avoid having your email account or computer hacked.

BlackVue dashcams share cars' mapped GPS locations, stream video feeds

BlackVue dashcams share cars' mapped GPS locations, stream video feeds

Cloud-ready @BlackVue #dashcams illegally broadcast your EXACT GPS location, AND LIVE VIDEO from inside your car, without permission, PUBLICLY on the internet!

Australia's surveillance laws could damage internet security globally, overseas critics say

Australia's surveillance laws could damage internet security globally, overseas critics say

The submission's signatories are concerned about any attempt, anywhere in the world, to undermine encryption — the process that keeps online products and services secure, said Sharon Bradford Franklin, its co-author and Open Technology Institute's director of cybersecurity policy in Washington, DC.

Interview: Searx, the web search engine that respects your privacy

Interview: Searx, the web search engine that respects your privacy

We spoke to Adam Tauber, main developer of the free software search engine Searx. netzpolitik.org: What makes Searx different from other privacy-focused (meta)search engines like DuckDuckGo or Startpage? netzpolitik.org: And MetaGer, another meta-search engine focused on privacy, based in Germany?

As facial-recognition technology grows, so does wariness about privacy. Use at a school in Seattle fuels debate.

As facial-recognition technology grows, so does wariness about privacy. Use at a school in Seattle fuels debate.

Vance, a senior director of product management at the Seattle tech company, leads the team that created Secure, Accurate Facial Recognition — or SAFR, pronounced “safer” — a technology that the company began offering free to K-12 schools this summer.

SAP, Microsoft and Adobe announce data alliance

SAP, Microsoft and Adobe announce data alliance

FRANKFURT (Reuters) - Business software companies SAP, Microsoft and Adobe said on Monday they were forming a data alliance that will make it easier for clients running their applications to get a better overview of the customer.

More