NJ Supreme Court: Defendants must divulge cellphone passcodes

NJ Supreme Court: Defendants must divulge cellphone passcodes

The New Jersey Supreme Court ruled Monday that a criminal defendant can be compelled to reveal his cellphone passcode to investigators, rejecting the argument that such a move violates the right against self-incrimination guaranteed by the Fifth Amendment of the U.S. Constitution.

China expands Great Firewall to block HTTPS traffic that uses TLS 1.3 and ESNI

China expands Great Firewall to block HTTPS traffic that uses TLS 1.3 and ESNI

Chinese censors upgraded the GFW to be able to block HTTPS traffic that uses TLS 1.3 and ESNI.TLS 1.3 (Transport Layer Security) and ESNI (Encrypted Server Name Indication) are new technologies that augment HTTPS – the secure way in which website users “talk” with the websites they visit over the internet.

Contact tracing: why some people are giving false contact details to bars and restaurants

Contact tracing: why some people are giving false contact details to bars and restaurants

While many bars, pubs and restaurants didn’t have to worry too much about data scandals before, reports of staff using people’s personal details to try and hook up with customers is potentially highly damaging – not just for those businesses, but for the whole hospitality sector.

How Malicious Tor Relays are Exploiting Users in 2020 (Part I)

How Malicious Tor Relays are Exploiting Users in 2020 (Part I)

The 3 sharp drops in figure 1 (marked with 1, 2, 3) depict the events when some of these malicious Tor exits got detected, reported and removed from the network by the Tor directory authorities.

Privacy Advocates Demand Ban on Facial Recognition in Schools in Response to Damning Study on the Technology

Privacy Advocates Demand Ban on Facial Recognition in Schools in Response to Damning Study on the Technology

Privacy advocates on Monday urged lawmakers to ban facial recognition in schools in response to a new study finding that use of the technology in educational settings would likely lead to a number of negative consequences including the normalization of surveillance and worsening of racial biases.

Barclays Faces Employee Spying Probe

Barclays Faces Employee Spying Probe

The UK's Information Commissioners Office, which enforces privacy laws - including the EU's General Data Protection Regulation - has confirmed the Barclays probe to Information Security Media Group."We have an ongoing investigation relating to Barclays' alleged use of employee monitoring tools," an ICO spokeswoman tells ISMG.

DBD#5: Would you trust Google with your finances?

DBD#5: Would you trust Google with your finances?

This week I am covering Google branching out to banking and how Starling will beat Monzo and Revolut to the post to become the first profitable UK challenger bank.

Whoops, our bad, we just may have 'accidentally' left Google Home devices recording your every word, sound, sorry

Whoops, our bad, we just may have 'accidentally' left Google Home devices recording your every word, sound, sorry

Yet punters noticed their Google Homes had been recording random sounds, without any wake word uttered, when they started receiving notifications on their phone that showed the device had heard things like a smoke alarm beeping, or glass breaking in their homes – all without giving their approval.

Anomaly Six Accused Of Feeding U.S. Gov User Location Data From Hundreds Of Apps

Anomaly Six Accused Of Feeding U.S. Gov User Location Data From Hundreds Of Apps

A new Wall Street Journal report alleges that Anomaly Six, a company that was formed by two U.S. Military vets, is a federal contractor that has managed to get its location data SDK embedded into over 500 mobile applications that are used by hundreds of millions of smartphone owners.

Blackstone to acquire Ancestry.com for $4.7 billion

Blackstone to acquire Ancestry.com for $4.7 billion

(Reuters) - Blackstone Group Inc (BX.N) said on Wednesday it agreed to acquire genealogy provider Inc from private equity rivals for $4.7 billion, including debt, placing a big bet on family-tree chasing as well as personalized medicine.

Chicago to use social media to track tourists violating quarantine; city dismisses comparison to 'Big Brother'

Chicago to use social media to track tourists violating quarantine; city dismisses comparison to 'Big Brother'

Chicago is doubling down on efforts to enforce its emergency coronavirus travel order, as officials will now be reviewing the social media posts of possible violators as the pandemic continues.

Snapdragon chip flaws put >1 billion Android phones at risk of data theft

Snapdragon chip flaws put >1 billion Android phones at risk of data theft

“While DSP chips provide a relatively economical solution that allows mobile phones to provide end users with more functionality and enable innovative features—they do come with a cost,” researchers from security firm Check Point wrote in a brief report of the vulnerabilities they discovered.

Google's secret home security superpower: Your smart speaker with its always-on mics

Google's secret home security superpower: Your smart speaker with its always-on mics

"Your Nest speakers and displays will notify you if a critical sound is detected, like a smoke alarm or glass breaking, by sending an alert to the Home app," the company wrote in a blog post.

COVID-19 contact tracing applications are privacy snares, Defcon

COVID-19 contact tracing applications are privacy snares, Defcon

COVID contact tracing apps boast the power of gathering personal data that exposes your activities, movements, and relationships.Experts believe governments must avoid this data-hungry mindset in contact tracing apps.

Google ‘accidentally’ enabled smart speakers to listen passive sounds

Google ‘accidentally’ enabled smart speakers to listen passive sounds

“Your Nest speakers and displays will notify you if a critical sound is detected, like a smoke alarm or glass breaking, by sending an alert to the Home app.”.

Report: Hundreds of apps have hidden tracking software used by the government

Report: Hundreds of apps have hidden tracking software used by the government

A new report exposes how a federal contractor secretly puts government tracking software into hundreds of mobile apps.Since the data Anomaly Six collects is technically anonymous and since it isn’t selling the data for commercial purposes — i.e. advertising or marketing — it’s fine to do this within the eyes of the law.

Privacy and Voting

Privacy and Voting

Literally anyone anywhere with no record or oversight can go to your state or county election website, type in a few details about you (usually last name and date of birth are sufficient) and pull up your full name, date of birth, home address, phone number, email, sex, and more.

Google 'Spying' On People's App Use, Lawsuit Claims

Google 'Spying' On People's App Use, Lawsuit Claims

by Wendy Davis @wendyndavis, Yesterday Google employees “spy” on smartphone users, collecting their sensitive data and information about their use of other companies' apps, New York resident Robert McCoy alleges in a new class-action complaint.

The changing face of privacy in a pandemic

The changing face of privacy in a pandemic

China’s cavalier approach to privacy has seen the country deploy drones, artificial intelligence, and security cameras to enforce quarantines and monitor public spaces.There are two main approaches to contact tracing apps, and both versions rely on anonymized IDs to record interactions with nearby devices, which allows for complete privacy.

A U.S. government contractor embedded tracking software in the apps of millions of smartphone users

A U.S. government contractor embedded tracking software in the apps of millions of smartphone users

According to the report: A small U.S. company with ties to the U.S. defense and intelligence communities has embedded its software in numerous mobile apps, allowing it to track the movements of hundreds of millions of mobile phones world-wide, according to interviews and documents reviewed by The Wall Street Journal.

Privacy News Online | Weekly Review: August 7, 2020

Privacy News Online | Weekly Review: August 7, 2020

A pair of hacks at genealogy site GEDMatch has laid bare serious privacy issues with online databases of DNA information.Privacy News Online is brought to you by Private Internet Access, the world’s most trusted VPN service.

The Department of Justice wants to stop California from having net neutrality

The Department of Justice wants to stop California from having net neutrality

In the case of broadband privacy which was passed at the state level in Maine , the internet service providers (ISPs) actually tried to stop the law from being enacted by claiming that their right to selling profiles of user internet activity and history is part of their constitutional right to free speech .

Lawmakers Ask California DMV How It Makes $50 Million a Year Selling Drivers' Data

Lawmakers Ask California DMV How It Makes $50 Million a Year Selling Drivers' Data

In an earlier email to Motherboard, the California DMV said data requesters may include insurance companies, vehicle manufacturers, and prospective employers.

Investment firm buys Utah’s Ancestry.com for $4.7 billion

Investment firm buys Utah’s Ancestry.com for $4.7 billion

“Our entire leadership team is thrilled to have the opportunity to partner with Blackstone to further accelerate Ancestry’s global leadership in family history and consumer genomics, and to help us achieve our mission to empower journeys of personal discovery to enrich lives,” Margo Georgiadis, Ancestry president and CEO, said in a statement.

Hackers hit university online exam tool

Hackers hit university online exam tool

A data security breach involving an online examination tool used by Australian universities is under investigation."Any breach of security and privacy of this type is of course deeply concerning and we will continue to work with ProctorU to understand the circumstances of the breach and determine whether any follow-up actions are required on our part," the spokeswoman said.

Achilles: Small chip, big peril.

Achilles: Small chip, big peril.

In this research dubbed “ Achilles ” we performed an extensive security review of a DSP chip from one of the leading manufacturers: Qualcomm Technologies.Check Point Research decided not to publish the full technical details of these vulnerabilities until mobile vendors have a comprehensive solution to mitigate the possible risks described.

Trump admin shrugs off FCC court loss to fight Calif. net neutrality law

Trump admin shrugs off FCC court loss to fight Calif. net neutrality law

Despite the FCC's preemption order being overturned in court, the DOJ's amended complaint yesterday argued that California's net neutrality law "is preempted by federal law and therefore violates the Supremacy Clause of the United States Constitution.".

Redcar and Cleveland Attack Recovery Cost Over £10m

Redcar and Cleveland Attack Recovery Cost Over £10m

Whilst the council had industry standard tools deployed to secure its computer network at the time of the attack, which it said had been configured to provide optimum protection, it has since made additional improvements to its cyber-defenses, with further upgrades planned.

The US is building a new Great Firewall

The US is building a new Great Firewall

“With parent companies based in China, apps like TikTok, WeChat, and others are significant threats to the personal data of American citizens, not to mention tools for Chinese Communist Party content censorship,” said Mike Pompeo, the secretary of state.

Peter Dutton confirms Australia could spy on its own citizens under cybersecurity plan

Peter Dutton confirms Australia could spy on its own citizens under cybersecurity plan

Dutton said law enforcement agencies would target terrorists, paedophiles and drug traffickers operating in the dark web – promising proposed new powers will apply “to those people and those people only”.

More