Defense against the Darknet, or how to accessorize to defeat video surveillance

Defense against the Darknet, or how to accessorize to defeat video surveillance

"The idea behind this work is to be able to circumvent security systems that use a person detector to generate an alarm when a person enters the view of a camera," explained Wiebe Van Ranst, a PhD researcher at KU Leuven, in an email to The Register .

Vendors must start adding physical on/off switches to devices that can spy on us

Vendors must start adding physical on/off switches to devices that can spy on us

A device equipped with a hardware “off” switch for the camera and microphone isn’t yet on the market, as far as I know.

One Month, 500,000 Face Scans: How China Is Using A.I. to Profile a Minority

One Month, 500,000 Face Scans: How China Is Using A.I. to Profile a Minority

The technology is not mature — in 2017 Yitu promoted a one-in-three success rate when the police responded to its alarms at a train station — and many of China’s cameras are not powerful enough for facial recognition software to work effectively.

How to Live Without Google and Other Evil Tech Giants

How to Live Without Google and Other Evil Tech Giants

Chapters: Operating Systems Mobile Operating Systems Mobile App Stores Desktop Operating Systems Web Browsing Web Browsers Browser Addons Search Engines Communication Mail Providers Mail Apps Instant Messaging Social Media Localization Video Video Players Video Streaming Movie/TV Streaming Audio Audio Players Music Stores/Streaming Photo More Operating Systems.

How to make Your Router More Secure on the Internet

How to make Your Router More Secure on the Internet

Michael Horowitz, a router security expert, wrote, "I think it is a mistake to use a consumer router. Horowitz says that manufacturers of consumer-grade routers are concerned with making a profit, not with making secure routers.

Researchers Tried To Crack An Android Phone To See If FBI Could

Researchers Tried To Crack An Android Phone To See If FBI Could

Data encryption on smartphones involves a key that the phone creates by combining 1) a user’s unlock code, if any (often a four- to six-digit passcode), and 2) a long, complicated number specific to the individual device being used.

CAN YOU BE HACKED BY THE WORLD AROUND YOU?

CAN YOU BE HACKED BY THE WORLD AROUND YOU?

As someone who researches 3-D modeling, including assessing 3-D printed objects to be sure they meet quality standards, I’m aware of being vulnerable to methods of storing malicious computer code in the physical world.

Amazon Workers Are Listening to What You Tell Alexa

Amazon Workers Are Listening to What You Tell Alexa

Amazon’s review process for speech data begins when Alexa pulls a random, small sampling of customer voice recordings and sends the audio files to the far-flung employees and contractors, according to a person familiar with the program’s design.

Malware and Firmware Trojans

Malware and Firmware Trojans

1 Malware 1.1 The Importance of a Malware Free System 1.2 The Utility of Antivirus Tools 1.3 Preventing Malware Infections 1.4 Detecting Malware Infections 1.5 Watering Hole Attacks 2 Firmware Trojans 2.1 Virtualizers and Hardware Compromise 2.2 The Promise of Libre Firmware 3 References Malware[edit ].

Prosecutors Dropping Child Porn Charges After Software Tools Are Questioned

Prosecutors Dropping Child Porn Charges After Software Tools Are Questioned

Drawing upon thousands of pages of court filings as well as interviews with lawyers and experts, ProPublica found more than a dozen cases since 2011 that were dismissed either because of challenges to the software’s findings, or the refusal by the government or the maker to share the computer programs with defense attorneys, or both.

How to protect kid’s online privacy?

How to protect kid’s online privacy?

The advancement of cell phones and access to the internet enable young teens and children to use social messaging apps all day long. In my opinion, I would suggest you monitor the digital activities of teens using cell phone spy apps.

Reasons to Abandon Windows For Linux

Reasons to Abandon Windows For Linux

Although you can download individual applications from websites and install them with a package manager that automates the process similar to Windows, finding new programs on Linux is generally as simple as searching for it in the software repository and clicking install.

Loki registers as the first Australian not-for-profit privacy firm

Loki registers as the first Australian not-for-profit privacy firm

The Loki Foundation will also use blockchain to support a developer community that will build a suite of software and online applications that enhance digital privacy.

Private Internet Access (PIA) VPN Service Forges First OEM Partnership with Purism to Offer Hardware and Software Bundles with Powerful Privacy Protection

Private Internet Access (PIA) VPN Service Forges First OEM Partnership with Purism to Offer Hardware and Software Bundles with Powerful Privacy Protection

“Combining our privacy protecting VPN capabilities with Purism’s line of products will provide the ultimate security package to users,” said Ted Kim, CEO of Private Internet Access.

Internet And Privacy Issues of Personal Computer

Internet And Privacy Issues of Personal Computer

It’s always best to protect your personal computer. Another thing which the privacy software needs to possess is a way of eliminating cookie trackers. The software should offer malware detection and browser cleaning. Program that protects privacy will continue to defend you even when you’re not online.

How the EverCrypt Library Creates Hacker-Proof Cryptography

How the EverCrypt Library Creates Hacker-Proof Cryptography

“When we say proof, we mean we prove that our code can’t suffer these kinds of attacks,” said Karthik Bhargavan, a computer scientist at Inria in Paris who worked on EverCrypt.

Valve Software dreams of analyzing your brainwaves to tailor in-game rewards

Valve Software dreams of analyzing your brainwaves to tailor in-game rewards

Many of Ambinder's suggestions for what a game maker might do with this data sound like heart-rate sensor experiments , such as adjusting difficulty based on a player's feelings at a given moment.

Security researcher pleads guilty to hacking into Microsoft and Nintendo

Security researcher pleads guilty to hacking into Microsoft and Nintendo

A 24-year-old security researcher narrowly avoided prison today, after admitting to hacking into Microsoft and Nintendo servers and stealing confidential information. Clark, who was employed at the Malwarebytes security company at the time of the Microsoft hack, was also previously cautioned by British police after being arrested for his role in the massive Vtech data breach in 2015.

Huawei Security ‘Defects’ Are Found by British Authorities

Huawei Security ‘Defects’ Are Found by British Authorities

Garrett Marquis, a spokesman for the National Security Council, said the United States commended Britain “for taking a hard look at its telecommunications vendors in order to ensure the maximum security of its networks.” He added, “We share many of the concerns listed in the Oversight Board’s report.”.

The most (un)realistic story about privacy

The most (un)realistic story about privacy

But after a while, this whole privacy and data related things started to seem a little bit boring to Mr. X.

UK officials just massively bolstered the US campaign against Huawei, finding its equipment has 'major defects'

UK officials just massively bolstered the US campaign against Huawei, finding its equipment has 'major defects'

LONDON — Britain publicly chastised China's Huawei Technologies for failing to fix long-standing security flaws in its mobile network equipment and revealed new "significant technical issues," increasing pressure on the company as it battles Western allegations that Beijing could use its gear for spying.

AI-based predictive policing systems widely used in US and UK, despite concerns about privacy, and flaws in the approach

AI-based predictive policing systems widely used in US and UK, despite concerns about privacy, and flaws in the approach

For example, Motherboard found that numerous US police forces in cities and municipalities that are home to over 1 million people use a system from a company called PredPol. According to the home page, “PredPol uses a machine-learning algorithm to calculate predictions.

Android ecosystem of pre-installed apps is a privacy and security mess

Android ecosystem of pre-installed apps is a privacy and security mess

Researchers found that many of these pre-installed apps have access to very intrusive permissions out of the box, collect and send data about users to advertisers, and have security flaws that often remain unpatched.

Hackers attacked one million-plus Asus users through malicious update

Hackers attacked one million-plus Asus users through malicious update

Moscow-based cyber security provider Kaspersky Lab said the attack took place between June and November last year and was used to deliver a software update with a “backdoor” that would give hackers access to infected machines.

Finland to investigate Nokia-branded phones after data breach report

Finland to investigate Nokia-branded phones after data breach report

HELSINKI (Reuters) - Finland’s data protection ombudsman said on Thursday he would investigate whether Nokia-branded phones had breached data rules after a report said the handsets sent information to China.

Facebook stored hundreds of millions of user passwords in plain text

Facebook stored hundreds of millions of user passwords in plain text

Facebook stored hundreds of millions of user passwords in plain text. Facebook is once again making headlines after the company discovered it had been storing hundreds of millions of users passwords in plain text for years.

Google will give Android users a choice of browser and search engine in Europe

Google will give Android users a choice of browser and search engine in Europe

Related Google is unbundling Android apps: all the news about the EU’s antitrust ruling “On Android phones, you’ve always been able to install any search engine or browser you want, irrespective of what came pre-installed on the phone when you bought it,” Walker says.

Amazon's Rekognition software lets cops track faces: Here's what you need to know

Amazon's Rekognition software lets cops track faces: Here's what you need to know

Civil liberties groups such as the ACLU have already raised concerns about the speedy adoption of facial recognition tech among US law enforcement agencies and the potential for its abuse, particularly against immigrants and people of color.

The government uses images of vulnerable people to test facial recognition software.

The government uses images of vulnerable people to test facial recognition software.

When a company, university group, or developer wants to test a facial recognition algorithm, it sends that software to NIST, which then uses the full set of photograph collections to determine how well the program performs in terms of accuracy, speed, storage and memory consumption, and resilience.

EM Client

EM Client

Most folks usually write something when they want to complain - I do as well (LOL) - but I also like to say Thank You when you get a real good and well supported piece of software. Neil Martin Just a note to say thanks for building a damn good email client to replace Outlook.

More