Nevada considers technology to scan cellphones after crashes

Nevada considers technology to scan cellphones after crashes

(AP) — Most states ban texting behind the wheel, but a legislative proposal could make Nevada one of the first states to allow police to use a contentious technology to find out if a person was using a cellphone during a car crash.

Stores See a Future Without ‘May I Help You?’ (They’ll Already Have Your Data)

Stores See a Future Without ‘May I Help You?’ (They’ll Already Have Your Data)

Orbital Insight can gather geolocation data from 10 to 20 percent of phones in any mall, he said, with pings every 15 minutes on average.

The Spy Equipment On Sale to Dictatorships at the UK's Secret Security Trade Fair

The Spy Equipment On Sale to Dictatorships at the UK's Secret Security Trade Fair

Image from Gamma Group’s sales brochures from the Security and Policing exhibition Britain’s biggest arms firm, BAE Systems, have also become the UK’s leading "lawful interception" company.

Want to Really Block the Tech Giants? Here's How

Want to Really Block the Tech Giants? Here's How

Advertisement For our purposes, what this meant was that when we were blocking the companies that do web hosting as a service—such as Amazon, Google, and Microsoft—websites they host would evade our firewall if they used a CDN from a third party because it didn’t look like the website was being sent from a tech giant.

Your iPhone keeps a detailed list of every location you frequent — here's how to delete your history and shut the feature off for good

Your iPhone keeps a detailed list of every location you frequent — here's how to delete your history and shut the feature off for good

There's a little-known feature built into your iPhone that keeps a history of every location you've been — and how many times you've been there.

Ring Doorbell Flaw Opens Door to Spying

Ring Doorbell Flaw Opens Door to Spying

A serious flaw in the popular Ring smart doorbell could allow an attacker on a shared WiFi network to spy on families’ video and audio footage, according to researchers.

Serious Amazon Ring vulnerability leaves audio and video feeds open to interception and spoofing

Serious Amazon Ring vulnerability leaves audio and video feeds open to interception and spoofing

As well as enabling a hacker to access audio and video feeds in a severe violation of both privacy and security, the vulnerability also means that an attacker could replace a feed with footage of their own.

What is Location Data … and Why Should You Care? | Data & Me

What is Location Data … and Why Should You Care? | Data & Me

We recently sat down with Gil Elbaz, CEO and Founder of Factual, a location data company powering innovation in product development, mobile marketing and real-world analytics.

Denver to encrypt police radio traffic, blocking the public — but not news organizations — from listening

Denver to encrypt police radio traffic, blocking the public — but not news organizations — from listening

RELATED: Denver police could be next to go silent as more Colorado agencies encrypt their radio traffic News organizations will have to sign a memorandum of understanding with the city before gaining access, and the city attorney’s office was working this week to finalize what that document will say, Pazen said.

How to remove DarkMatter Certificates from Firefox

How to remove DarkMatter Certificates from Firefox

Cyber-security company DarkMatter, based in the United Arab Emirates, applied to become a top-level certificate authority in Mozilla's root certificate program recently. Summary Article Name How to remove DarkMatter Certificates from Firefox Description Cyber-security company DarkMatter, based in the United Arab Emirates, applied to become a top-level certificate authority in Mozilla's root certificate program recently.

How to Regulate the Internet Without Becoming a Dictator

How to Regulate the Internet Without Becoming a Dictator

Governments can exert some influence over the internet within their borders without being authoritarian—if they act in a way that protects citizens from cybersecurity threats, such as identity theft or computer hacking—provided those actions are also backed by democratic laws and procedures that prevent the abuse of power (e.g., using cyberinsecurity as an excuse for censorship).

Tor traffic from individual Android apps detected with 97 percent accuracy

Tor traffic from individual Android apps detected with 97 percent accuracy

Image: ZDNet, Tor Project Italian academics say they've developed an algorithm that can detect the patterns of Android app activity inside Tor traffic with an accuracy of 97 percent.

My own Creepy Facebook Surveillance Moment

TL;DR: Blank Facebook account I opened 8.5 years ago and never used receives recommendation, out of the blue, to check out a small store I only just learned existed and started patronizing.

Tracking my phone's silent connections

Tracking my phone's silent connections

Looking at data flow The number of DNS queries is an easy start, but, next I wanted to learn more about the actual servers my phone is talking to.

What Amazon’s purchase of Eero means for your privacy

What Amazon’s purchase of Eero means for your privacy

How worried should you be that Amazon flips the switch on Eero and it’s no longer the privacy-minded router it once was? eero does not track customers’ internet activity and this policy will not change with the acquisition.

Russia considers 'unplugging' from internet

Russia considers 'unplugging' from internet

Major disruption The draft law, called the Digital Economy National Program, requires Russia's ISPs to ensure that it can operate in the event of foreign powers acting to isolate the country online.

Russia to disconnect from the internet as part of a planned test

Russia to disconnect from the internet as part of a planned test

Russian authorities and major internet providers are planning to disconnect the country from the internet as part of a planned experiment, Russian news agency RosBiznesKonsalting (RBK) reported last week.

Man evades capture for 15 years by using fingerprint implants

Man evades capture for 15 years by using fingerprint implants

A drug trafficker who managed to evade capture for 15 years by cutting and burning the skin of his fingertips and having it replaced with micro-implants has been arrested by Spanish police.

Are You a Woman Traveling Alone? Marriott Might Be Watching You.

Are You a Woman Traveling Alone? Marriott Might Be Watching You.

Marriott employees all over the world are being trained to help spot sex trafficking at our hotels." The brief Twitter exchange, which occurred in January, revealed some of the hidden presumptions behind Marriott's efforts to stop sexual exploitation.

Google Screenwise: An Unwise Trade of All Your Privacy for Cash

Google Screenwise: An Unwise Trade of All Your Privacy for Cash

Since Google doesn’t ask you to install a root certificate like Facebook did, they can’t decrypt HTTPS traffic, but the app can see anything on your screen, as detailed by the “Content on Screen” section of its privacy policy .

Chinese face-recognition technology spots wanted man at 60,000-people concert

Chinese face-recognition technology spots wanted man at 60,000-people concert

The most funny and cyberpunk dystopia part was, during a test run, if the jaywalkers don't want to pay a fine, traffic police has given them another opinion: posting an warning of your misbehave on your social media account!The mass-deployment may be coming soon.And it is rumored that the subways would soon require a proof of identity.

F-Droid - Free and Open Source Android App Repository

A host (list) can be configured as allow, deny, or ignore. Custom DNS Servers can be configured as well, using the same UI, but no differentiation is made between ignored and denied servers.

DHS: Multiple US gov domains hit in serious DNS hijacking wave

DHS: Multiple US gov domains hit in serious DNS hijacking wave

Further Reading A DNS hijacking wave is targeting companies at an almost unprecedented scale The DHS’ Cybersecurity and Infrastructure Security Agency (CISA) issued the directive on Tuesday, 12 days after security firm FireEye warned of an unprecedented wave of ongoing attacks that altered the domain name system records belonging to telecoms, ISPs, and government agencies.

How to Preserve Your Privacy on Android Without Tearing Your Hair Out

How to Preserve Your Privacy on Android Without Tearing Your Hair Out

The fact of the matter is, most Android users want access to the Play Store, Google apps, and high-security apps (e.g. banking) that rely on Google’s TrustZone system. This turns off the unique advertising ID that Google and Play Store apps use to track you.

San Diego’s Smart Streetlights Yield a Firehose of Data

San Diego’s Smart Streetlights Yield a Firehose of Data

This data is only just starting to feed into the way the city designs and manages traffic flows, and any consumer applications remain far in the future, says Erik Caldwell , the city of San Diego’s interim deputy chief operating officer for smart and sustainable communities.

Reminder: All those “smart” devices are a growing security threat

Reminder: All those “smart” devices are a growing security threat

But those very same devices, many of which have no real security protections, are also becoming part of what are called “botnets,” vast networks of tiny computers vulnerable to hijacking by hackers.

How to Encrypt Your DNS With DNSCrypt on Ubuntu and Debian

How to Encrypt Your DNS With DNSCrypt on Ubuntu and Debian

$ sudo apt install dnscrypt-proxy Configure Your DNS Server There really isn't much that needs to be done in the way of configuration to get DNSCrypt working.

Tor Is Easier Than Ever. Time to Give It a Try

Tor Is Easier Than Ever. Time to Give It a Try

Read all of WIRED’s year-end coverage Content delivery network and internet infrastructure provider Cloudflare also launched an onion service in September that makes it easier to access the most secure versions of its client sites on Tor. Through its new setup, Cloudflare helps to extend protections on user anonymity without knowing anyone's identity, even on its own service.

"Everything Is Fake": Ex-Reddit CEO Confirms Internet Traffic Metrics Are Bullshit

"Everything Is Fake": Ex-Reddit CEO Confirms Internet Traffic Metrics Are Bullshit

"It's all true: Everything is fake," tweeted Former Reddit CEO Ellen Pao regarding a Wednesday New York Magazine article which reveals that internet traffic metrics from some of the largest tech companies are overstated or fabricated.

How to browse the web securely and privately

How to browse the web securely and privately

Gift Guide: The best security and privacy tech to keep your friends safe You’ll need a secure DNS What does it mean that “your internet provider knows what sites you visit,” anyway? Most devices automatically use the resolver that’s set by the network you’re connected to — usually your internet provider.

More