Hacker leaks 2.3 million Indonesian citizenship data for download

Hacker leaks 2.3 million Indonesian citizenship data for download

What’s worse for Indonesian citizens is that the threat actor is claiming to have access over 200 million Indonesian citizenship data which they plan to leak on the hacker forum where the electoral data is currently being traded.

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

A man walks past Google offices in Beijing in 2014.Photo: Greg Baker/AFP (AP)Microsoft had “no security measures” on a program that had humans transcribe user voice recordings from its Skype video calling service and Cortana assistant, the Guardian reported on Friday, even when those workers were located in China.

Skype audio graded by workers in China with 'no security measures'

Skype audio graded by workers in China with 'no security measures'

A Microsoft programme to transcribe and vet audio from Skype and Cortana, its voice assistant, ran for years with “no security measures”, according to a former contractor who says he reviewed thousands of potentially sensitive recordings on his personal laptop from his home in Beijing over the two years he worked for the company.

Facebook Scraping, Still a Privacy Disaster

Facebook Scraping, Still a Privacy Disaster

If someone were to scrape a list of people who belong to a particular Facebook group, or who like a certain page, they could easily upload their profile URLs to a PSE.

‘I just don’t like them’: Robbie Williams hasn't owned a phone since 2006

‘I just don’t like them’: Robbie Williams hasn't owned a phone since 2006

Despite being one of the UK’s most successful pop stars, with millions of social media followers to keep updated, Robbie Williams has revealed he hasn’t owned a phone since 2006.

Edward Snowden says 'the most powerful institutions in society have become the least accountable'

Edward Snowden says 'the most powerful institutions in society have become the least accountable'

Former NSA contractor Edward Snowden speaks via video link at the Web Summit technology conference in Lisbon, Portugal on November 4, 2019.

Google contractors reportedly targeted homeless people for Pixel 4 facial recognition

Google contractors reportedly targeted homeless people for Pixel 4 facial recognition

But the New York Daily News reports that a Google contractor may be using some questionable methods to get those facial scans, including targeting groups of homeless people and tricking college students who didn’t know they were being recorded.

Feds Sue Edward Snowden, Move to Seize Book Proceeds

Feds Sue Edward Snowden, Move to Seize Book Proceeds

"The United States' ability to protect sensitive national security information depends on employees' and contractors' compliance with their non-disclosure agreements, including their pre-publication review obligations," said US assistant attorney general Jody Hunt in a statement.

North Carolina County Loses $1.7 Million to BEC Scam

North Carolina County Loses $1.7 Million to BEC Scam

The scammers impersonated a building contractor that was constructing a new high school in the County and succeeded in redirecting a $2.5 million payment to their account.Advanced email security solutions such as SpamTitan can identify and block these BEC threats.

Fearing ‘Spy Trains,’ Congress May Ban a Chinese Maker of Subway Cars

Fearing ‘Spy Trains,’ Congress May Ban a Chinese Maker of Subway Cars

A Chinese state-owned company called CRRC Corporation, the world’s largest train maker, completed the $100 million facility this year in the hopes of winning contracts to build subway cars and other passenger trains for American cities like Chicago and Washington.

Microsoft Contractors Listened to Xbox Owners in Their Homes

Microsoft Contractors Listened to Xbox Owners in Their Homes

Contractors working for Microsoft have listened to audio of Xbox users speaking in their homes in order to improve the console’s voice command features, Motherboard has learned.(Microsoft did not explicitly say humans may review audio recordings from its products in its privacy policy until after Motherboard's earlier reporting on Skype and Cortana).

Bernie Sanders calls for a ban on police use of facial recognition

Bernie Sanders calls for a ban on police use of facial recognition

Sen. Bernie Sanders (I-VT) has called for a complete ban on the police use of facial recognition as part of his campaign’s broader plan for criminal justice reform.

Apple Contractors Hear "Sexual Acts" On Accidental Siri Recordings

Apple Contractors Hear "Sexual Acts" On Accidental Siri Recordings

Speaking to the Guardian, the anonymous Apple contractor explained that their role is to “grade” the quality of Siri responses and check whether the voice assistant’s activation was accidental or not.

Apple contractors 'regularly hear confidential details' on Siri recordings

Apple contractors 'regularly hear confidential details' on Siri recordings

Apple contractors regularly hear confidential medical information, drug deals, and recordings of couples having sex, as part of their job providing quality control, or “grading”, the company’s Siri voice assistant, the Guardian has learned.

Hackers breach FSB contractor, expose Tor deanonymization project and more

Hackers breach FSB contractor, expose Tor deanonymization project and more

Hackers have breached SyTech, a contractor for FSB, Russia's national intelligence service, from where they stole information about internal projects the company was working on behalf of the agency -- including one for deanonymizing Tor traffic.

Oppo's under-screen camera is real and taking photos in Shanghai

Oppo's under-screen camera is real and taking photos in Shanghai

According to Oppo, this zoned-out area features a highly-transparent material plus a redesigned pixel structure for improved light transmittance. Oppo added that the under-screen camera itself also packs a larger sensor with bigger pixels, along with a larger aperture to get as much light as possible.

Hack of U.S. Border Surveillance Contractor Is Way Bigger Than the Government Lets On

Hack of U.S. Border Surveillance Contractor Is Way Bigger Than the Government Lets On

As of this week, that includes more than 400 GB of data stolen by an unknown actor from Perceptics, a discreet contractor based in Knoxville, Tennessee, that works for Customs and Border Protection (CBP) and is, regardless of whatever U.S. officials say, right now the epicenter of a major U.S. government data breach.

Google Confirms Creepy New Privacy Problem

Google Confirms Creepy New Privacy Problem

The Nest spycam problem came to light when the gadget site Wirecutter published a report on how someone sold his Nest Cam Indoor and then discovered that he was "still able to access images from his old camera."

Buyer Beware: Used Nest Cams Can Let People Spy on You

Buyer Beware: Used Nest Cams Can Let People Spy on You

Note: After our story broke yesterday, a Google representative sent us the following statement: “We were recently made aware of an issue affecting some Nest cameras connected to third-party partner services via Works with Nest.

Hackers Steal Traveller Data From US Customs And Border Protection

Hackers Steal Traveller Data From US Customs And Border Protection

CBP reportedly said “none of the image data has been identified on the dark web or internet”, but declined to answer questions about the scope of the attack and stolen data, and refused to name the subcontractor involved.

'Malicious cyber attack' exposes travelers' photos, says US customs agency

'Malicious cyber attack' exposes travelers' photos, says US customs agency

“This breach comes just as CBP seeks to expand its massive face recognition apparatus and collection of sensitive information from travelers, including license plate information and social media identifiers,” Neema Singh Guliani, American Civil Liberties Union senior legislative counsel, said in a statement.

Federal Business Opportunities: Opportunities

Federal Business Opportunities: Opportunities

This is a COMBINED SYNOPSIS/SOLICITATION for commercial items prepared in accordance with the format in FAR subpart 13.5 and 12.6 as supplemented with additional information included in this notice. 52.212-5, Contract Terms and Conditions Required to Implement Statutes or Executive Orders – Commercial Items.

How to unlock an iPhone you've forgotten the password to, even if it's disabled

How to unlock an iPhone you've forgotten the password to, even if it's disabled

Dave Johnson/Business Insider Instead, you need to reset the iPhone to its factory settings and then restore your apps and data from a backup. After it's erased, it'll be returned to its factory settings and you can follow the directions to restore the iPhone with a recent backup.

Tesla cars keep more data than you think, including this video of a crash that totaled a Model 3

Tesla cars keep more data than you think, including this video of a crash that totaled a Model 3

That's because the computers on Tesla vehicles keep everything that drivers have voluntarily stored on their cars, plus tons of other information generated by the vehicles including video, location and navigational data showing exactly what happened leading up to a crash, according to two security researchers.

FEMA 'unnecessarily' shared data of 2.3 million disaster victims with contractor

FEMA 'unnecessarily' shared data of 2.3 million disaster victims with contractor

The US Federal Emergency Management Agency has shared the personal and financial information of more than 2.3 million disaster victims with one of its contractors, a government report has revealed. The OIG report found that FEMA shared too much information about disaster victims with one of its contractors.

Private info of 2.3M disaster victims wrongly released by U.S. emergency management

Private info of 2.3M disaster victims wrongly released by U.S. emergency management

The Federal Emergency Management Agency wrongly released to a contractor the personal information of 2.3 million survivors of devastating 2017 hurricanes and wildfires, potentially exposing the victims to identity fraud and theft, a government watchdog reported Friday.

Does 2-Factor Authentication Stop Phishing Attacks?

Does 2-Factor Authentication Stop Phishing Attacks?

There are various methods that can be used to bypass 2-factor authentication, for instance, if a user is directed to a phishing page and enters their credentials, the hacker can then use those details in real-time to login to the legitimate site.

What is Two-Factor or Multi-Factor Authentication?

What is Two-Factor or Multi-Factor Authentication?

The second factor could be the access to your phone, your fingerprint, facial recognition, or a secret question. When a hacker tries to break into your account, they will also need access to the authenticator app on your phone.

Troy Hunt: Beyond Passwords: 2FA, U2F and Google Advanced Protection

Troy Hunt: Beyond Passwords: 2FA, U2F and Google Advanced Protection

For example, if you physically have someone's mobile phone in your hand and it's unlocked, you could login to an account by initiating a password reset, receiving the email in their email client then entering the "2nd factor" token sent via SMS or generated by a soft token app on the device.

Four Puzzling Issues Of Identity Authentication In The Digital Era

Four Puzzling Issues Of Identity Authentication In The Digital Era

Password-less Authentication Use of PIN to eliminate passwords Biometrics in two/multi-factor authentication for better security Advantage of physical tokens as against onetime codes by SMS