Breaking Down China's Social Credit System [Advanced Guide]

Breaking Down China's Social Credit System [Advanced Guide]

The following factors are used by the Chinese government when calculating a social credit score for a business: If the company has consistently paid their taxes on time Whether the business acquires and maintains necessary licenses If the organization in question is compliant with relevant environmental-protection requirements Whether the quality of the business’s products or service meet the national standards.

Why You Need Multi-Factor Authentication (MFA)

Why You Need Multi-Factor Authentication (MFA)

This is a piece of information or a device that is given to you to confirm your identity at the time of accessing your account like a one-time password or a push notification from an app.

Activists Turn Facial Recognition Tools Against the Police

Activists Turn Facial Recognition Tools Against the Police

He gave a surprising reason.“I am involved with developing facial recognition to in fact use on Portland police officers, since they are not identifying themselves to the public,” Mr. Howell said.

Cybersecurity company finds hacker selling info on 186 million U.S. voters

Cybersecurity company finds hacker selling info on 186 million U.S. voters

But the fact that so many names, email addresses, phone numbers and voter registration records were found for sale in bulk on the so-called dark web underscores how easily criminals and foreign adversaries can deploy it as the FBI said Iran has done recently, by sending emails designed to intimidate voters.

Police chiefs, community denounce 'hateful' video comparing Ottawa chief to Hitler

Police chiefs, community denounce 'hateful' video comparing Ottawa chief to Hitler

César Ndéma-Moussa, seen here in 2017, says he is 'strongly convinced' the fact Ottawa Police Service Chief Peter Sloly is Black played a role in the decision to create the video.

Why You Should Embrace Automated License Plate Readers

Why You Should Embrace Automated License Plate Readers

If you want to keep your community safe, you can use technology that identifies vehicles, tracks leads, and helps law enforcement capture the evidence to solve crime.In fact, with the use of automated license plate readers, law enforcement officers have a better chance of decreasing the crime rate.

Car manufacturers are challenging traditional auto insurers: Who will win the tech race?

Car manufacturers are challenging traditional auto insurers: Who will win the tech race?

As Elon Musk highlighted in Tesla’s Q2 earnings call on July 22, Tesla hopes to use its crash data not only to improve their insurance operations but also to learn how to adjust their car designs for less expensive repairs in the future.

Privacy News Online | Weekly Review: September 25, 2020

Privacy News Online | Weekly Review: September 25, 2020

The way that apps like Telegram, WhatsApp, and Signal do contact discovery has privacy flaws – chief among them is the fact that an attacker can enumerate users, that’s when they use contact discovery to test whether certain numbers are registered or not.

Amazon Unveils Drone That Films Inside Your Home. What Could Go Wrong?

Amazon Unveils Drone That Films Inside Your Home. What Could Go Wrong?

Dave Limp, the executive responsible for Amazon’s devices, said it had made major investments in camera security, such as two-factor authentication and end-to-end encryption, that will roll out this year.The product came to be because of technological advances and consumer interest in indoor security cameras, Mr. Limp said.

Twitter used phone numbers gathered for account security to sell ads

Twitter used phone numbers gathered for account security to sell ads

New York (CNN Business)Twitter "inadvertently" used phone numbers and email addresses its users provided for account security purposes to target ads, the company said Tuesday.Twitter users are asked to provide information like their phone number to help secure their account through services such as two-factor authentication.

Lawmakers Ask California DMV How It Makes $50 Million a Year Selling Drivers' Data

Lawmakers Ask California DMV How It Makes $50 Million a Year Selling Drivers' Data

In an earlier email to Motherboard, the California DMV said data requesters may include insurance companies, vehicle manufacturers, and prospective employers.

Achilles: Small chip, big peril.

Achilles: Small chip, big peril.

In this research dubbed “ Achilles ” we performed an extensive security review of a DSP chip from one of the leading manufacturers: Qualcomm Technologies.Check Point Research decided not to publish the full technical details of these vulnerabilities until mobile vendors have a comprehensive solution to mitigate the possible risks described.

Amazon CEO Jeff Bezos ‘can’t guarantee’ policy against using seller specific data hasn’t been violated

Amazon CEO Jeff Bezos ‘can’t guarantee’ policy against using seller specific data hasn’t been violated

At the “Online Platforms and Market Power” virtual antitrust hearing today, Amazon CEO Jeff Bezos spoke about a policy intended to prevent the company from using seller-specific data to help determine what products it should manufacture and sell itself.

Fact check: 'Cashless' society isn't imminent, wouldn't eliminate cash

Fact check: 'Cashless' society isn't imminent, wouldn't eliminate cash

“When people talk about a cashless society, even though a small coffee shop may literally be zero cash, or some place like a Sweet Green — from a macroeconomic standpoint, I don’t think the vision is for the Treasury to never print money ever again,” Santana told USA TODAY.

Is It Safe to Own Used or Refurbished Phones? Here Are The Things You Should Know!

Is It Safe to Own Used or Refurbished Phones? Here Are The Things You Should Know!

Important things that you should know if you own a used or refurbished phone to avoid data privacy breach that might compromise your personal information.Every time hackers discover a new hole to exploit your device, the phone maker or manufacturer immediately fixes it by sending some updates.

Please leave our clipboards alone.

Please leave our clipboards alone.

Yesterday, I tweeted calling out Microsoft’s LinkedIn showing that it was accessing my clipboard every keystroke.However, the real problem and thing that scares me is the fact that ANY app has the ability to access the clipboard without permission.

Uncovered: 1,000 phrases that incorrectly trigger Alexa, Siri, and Google Assistant

Uncovered: 1,000 phrases that incorrectly trigger Alexa, Siri, and Google Assistant

The findings demonstrate how common it is for dialog in TV shows and other sources to produce false triggers that cause the devices to turn on, sometimes sending nearby sounds to Amazon, Apple, Google, or other manufacturers.

This Game Is Collecting Your Steam Log Ins For “Marketing Purposes,” But Can’t Ensure Data Security

This Game Is Collecting Your Steam Log Ins For “Marketing Purposes,” But Can’t Ensure Data Security

In fact, most of us don’t even know what personal data many Steam games collect which is why even the most invasive EULA agreements slide right by us.However, NETICTECH cannot ensure or warrant the security of any data against any possible loss or unauthorized access.

New paper warns of Cambridge Analytica type privacy risks in G Suite Marketplace Apps

New paper warns of Cambridge Analytica type privacy risks in G Suite Marketplace Apps

A new research paper presented at IEEE 41 calls attention to the fact that Google Suites App Marketplace – whose apps are able to tap into the powerful Google API to read contacts, emails, calendar, etc – allows unverified apps to ask for and oftentimes receive sensitive user data.

Student finds privacy flaws in connected security and doorbell cameras

Student finds privacy flaws in connected security and doorbell cameras

Ring, Nest, SimpliSafe and eight other manufacturers of internet-connected doorbell and security cameras have been alerted to "systemic design flaws" discovered by Florida Tech computer science student Blake Janes that allows a shared account that appears to have been removed to actually remain in place with continued access to the video feed.

Computer science student discovers privacy flaws in security and doorbell cameras

Computer science student discovers privacy flaws in security and doorbell cameras

Ring, Nest, SimpliSafe and eight other manufacturers of internet-connected doorbell and security cameras have been alerted to systemic design flaws discovered by Florida Tech computer science student Blake Janes that allows a shared account that appears to have been removed to actually remain in place with continued access to the video feed.

So this is how privacy dies...

So this is how privacy dies...

For all of human history, ambient privacy was an inevitable fact of life because it required considerable effort to record something for posterity.My friend might be willing to wear a tracking device or upload every moment of their day to a platform whose founder thinks 'privacy is no longer a social norm;' I am not.

Hungary suspends some GDPR privacy protections as part of COVID-19 “state of emergency”

Hungary suspends some GDPR privacy protections as part of COVID-19 “state of emergency”

The ruling party doesn’t seem to understand why the entire world is upset by the overreach of power and the fact that the state of emergency doesn’t have a set date to end.

Hacker buys old Tesla parts on eBay, finds them full of user data

Hacker buys old Tesla parts on eBay, finds them full of user data

The moral of these stories is that it’s up to individuals to perform factory resets when selling a car, returning a rental vehicle, or having an infotainment system serviced.

My identity was stolen. This is what I learned.

My identity was stolen. This is what I learned.

Using my cellphone number, this person had received text codes as part of a two-factor authentication to access my accounts.Having an online account text an authorization code was supposed to be an added security measure.

Marriott Suffers Second Breach Exposing Data of 5.2 Million Hotel Guests

Marriott Suffers Second Breach Exposing Data of 5.2 Million Hotel Guests

The company has already taken the step of disabling the passwords of Marriott Bonvoy members who had their information potentially exposed in the incident, and they will be notified to change their passwords during the next login, as well as prompted to enable multi-factor authentication.

Why Don’t We Just Ban Targeted Advertising?

Why Don’t We Just Ban Targeted Advertising?

Republican senator Orrin Hatch, then 84 years old, asked how Facebook could make any money by offering a free service.Above all, they’ve tried to browbeat the companies into adopting better policies around things like fact-checking, content moderation, and political ads.

Smart home developers raise concerns about Alexa and Google Assistant security

Smart home developers raise concerns about Alexa and Google Assistant security

"[Status update] data gives platforms [like Google and Amazon] a privileged position that no one manufacturer enjoys," said Brad Russell, the Research Director of smart home devices at research firm Parks Associates Inc. Tyler Lizenby/CNET While Amazon says it doesn't sell the data it gathers to third parties or uses it for targeted advertising, that data is still of tremendous value to the company.

It's time for Congress to sunset NSA's call data program

It's time for Congress to sunset NSA's call data program

The Privacy and Civil Liberties Oversight Board, of which I am a member, recently issued a comprehensive public report on the government's use of the now-defunct call detail records (CDR) program under the USA FREEDOM Act. The report includes never before released facts about the program and its compliance and data integrity challenges that ultimately led the National Security Agency (NSA), wisely, to suspend the program in early 2019.

Exclusive: Live Facial Recognition Is Coming to U.S. Police Body Cameras

Exclusive: Live Facial Recognition Is Coming to U.S. Police Body Cameras

The company originally started as a spy equipment manufacturer and paintball retailer based in Hollywood.“With Realtime Facial Recognition, WOLFCOM hopes to give our friends in Law Enforcement tools that will help them identify if the person they are talking to is a wanted suspect, a missing child or adult, or a person of interest,” Wolfcom founder Peter Austin Onruang wrote in a May 14, 2019, email to the Noble Police Department in Oklahoma.

More